A&s #I209 May 2016

Page 1


CONTENTS

May 2016 www.asmag.com

iot

Adoption of IoT for Warehouse Management ......................34 Viewpoint

IoT: Implications and Challenges for Security .....................................................28 Smart Workplace Access in a Secure Mobile World ................................................30

P. 34

Business talk

Systems Integrators Rising Up to the Challenge ..............................................50

integrated systeM

How Access Control Systems Are Designed in IoT

Market update

Italian Security Leaders – Top 25: Growing Without Compromise ......................54 Korea Embracing Cloud and IoT in Physical Security ........................................60 sMart technology

Benefits of Multi-sensor Panoramic Cameras in Open Space Video Surveillance ................................................64

P. 40 Vertical solution

Emerging Trends in School Emergency Notification

sMahoMe MAY 2016 ● www.asmag.com

Emerging Product Trends in Germany ......68 Contents ...................................................14 Editor’s Note ............................................16 Application Cases ...................................18

14

Products of the Month ...........................22 News Features ........................................24 Show Preview .........................................72

P. 44 Show Calendar ........................................74 Companies in This Issue........................75 New Products ..........................................76


a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄

How to Prepare for the Internet of“Security”Things Era? he Internet of Things (IoT) is not new in terms of its concept. Over the past few years, we have frequently talked about how IoT would influence different industries/vertical markets to achieve purposes which were nearly possible to be accomplished in the past. This year, from ISC West to other important trade shows, like Secutech Taipei, the most frequently raised topic was IoT, which was discussed on a much higher level. In the era of the Internet of “Security” Things, cybersecurity is constantly being mentioned right now. When every physical security device is connected to the Internet, it will become vulnerable just like other connected devices. The outcome of compromising security for connectivity will be immeasurable. In addition, interoperability, and not just “compatibility” among all the connected products, is prerequisite. The achievement of which by the security industry is still a long way off.

MAY 2016 ● www.asmag.com

IoT is heavily influencing many industries. The residential sector is the most obvious one as it shows the fastest growth. Connected smart home devices are taking over traditional residential security devices to not only secure our lovely homes, but also to save energy, monitor health, and make life more convenient. In an office environment or health institute setting, we have had

many discussions regarding the merge of physical credentials for physical access with digital ones for access to the cyberspace. This will surely trigger some cooperation between the physical security and IT teams. Next, industries that are innovating retail, manufacturing factories, and safe/smart cities will follow and implement IoT sensors/devices to increase operational and managerial efficiency.

Executive Editor-in-Chief Managing Director / Publisher General Manager

Editorial

General Press Jill Lai Alf Chang William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin

Editor-in-Chief Senior Consultant Reporter Reporter Reporter Editor

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Executive Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Circulation

Michelle Shih Michelle Chu

Officer michelle.shih@newera.messefrankfurt.com Marketing Coordinator michelle.chu@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Manager

willy.wang@newera.messefrankfurt.com

Project Manager Project Manager

eva.tsai@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com

asmag.com

Willy Wang Secutech

Eva Tsai Jason Cheng

International Advertising

Finally, what does the industry need to prepare for the IoT future? First, acquiring network security knowledge is important, not only for system providers but also for the systems integrators. Then, think about the other purposes that security devices/systems can achieve via connecting with others. A lot of business opportunities can be created, such as wearable devices, drones, and robots, which are now equipped with surveillance cameras. Eventually, security providers or integrators will need to learn how to communicate with end-user multiple functional teams when doing IoT business. In this issue, you can see how different aspects of “IoT” are being discussed in a variety of subjects. We have also included some highlights from SIA Education seminars at ISC West 2016. Hope you like it.

[Headquarters]

Audrey Fang Nori Chang

Coordinator Coordinator

audrey.fang@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Osman Kanatli Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana

U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

jill.lai@newera.messefrankfurt.com

16

John Shi Hubert Duh Charlie Wong


ApplicAtion cAses a&s presents snapshots of security cases from across the globe to provide up-to-date information on how products and solutions are being employed in different industries.

Source: Greenwood Village PD Crime Lab

>> Law Enforcement

Hikvision Secures Crime Lab in Colorado

Hikvision Digital Technology provided a video surveillance solution to a crime lab in Colorado, U.S. The resulting system allowed the Greenwood Village Police Department to protect their forensic evidence from external threats, as well as improve employee accountability and monitor departmental procedures. Hikvision’s 6-megapixel fisheye camera provided broad yet precise coverage of the evidence room. It is a cost-effective solution for the police department as it can effectively capture images from every corner of the indoor spaces and eliminate blind spots. 1.3-megapixel mini-dome cameras were employed to stand guard in the vehicle processing room and the room where highly sensitive property confiscated by the police is stored. Video recordings of this room also provided forensic accountability for the department’s procedural integrity. Hikvision’s professional series 16-channel NVR rounds out the solution. The 48TB recorder used offered the department the ability to add cameras to the system as needed in the future. Video Content Analysis (VCA) features, such as motion detection, further maximized storage efficiency, reducing saved data when it isn’t needed.

MAY 2016 ● www.asmag.com

>> Entertainment

Milestone Safeguards Ostrich Nests at Dublin Zoo Milestone Systems’ open platform IP video management software (VMS) is helping the Dublin Zoo in Ireland to protect its animals and their offspring from night-time attacks.

18

Zookeepers reported decreasing ostrich egg counts, as well as unexplained flamingo injuries and deaths occurring during the night. A Milestone VMS solution integrating XProtect corporate software with Axis Communications’ infrared cameras pinpointed wild badger thefts and wild otter attacks as the sources of the problems. Keepers were also keen to explore the use of video cameras for studying animal activities while safeguarding the welfare of creatures under their protection. In addition to prevention measures aimed at stopping the overnight animal attacks, perimeter security, animal welfare, and animal behavior studies were also positively impacted. The installed system provided them with live and recorded video that can be viewed on five different PC viewing stations via the XProtect Smart Client. The zoo’s operations manager and 12 of the 44 keepers employed were also able to access images around the clock via Milestone’s mobile app if they wished to keep an eye on the animals that were under their charge overnight.

>> Manufacturing

SCATI Enhances Operations for Spanish Manufacturer A Spanish manufacturing plant needed to improve the logistic process

of its facilities through which hundreds of heavy vehicles pass each day. In response to this problem, the company employed SCATI’s license plate reading platform that will enable lorry parking access management. SCATI’s PLATE solution was integrated with the company’s SAP management system, enabling it to read license plates automatically and match them against a centralized database to allow access to authorized vehicles. Infrared lighting along with IP and box cameras were utilized to provide reliable readings under various lighting and weather conditions. Installed sensors allowed the operators to open the vehicle access barriers. The implementation of the solution and its video processing software allowed the reading of any license plate within 30 milliseconds. In addition, the company can prevent vehicles included in their blacklists from entering the facility since the system can send alarms to the control center after detecting a license plate. If the company needs to obtain recorded videos, users can perform searches by date or day and license plate. They can also access real-time video if necessary.

>> Homeland Security

Veridos Border Control Solution Used in Morocco

The Kingdom of Morocco has awarded Veridos with the design and implementation of a national border control system at land borders, airports, and sea ports, including the entire IT infrastructure necessary for the project. The resulting solution was based on Veridos’ verification platform, VeriGO, which enabled the integration of pre-existing infrastructures and databases. VISOTEC passport readers and corresponding software, VISOCORE Inspect, were employed to allow Moroccan border control officers


360- degree Cameras Spilling Over to Security to Enforce Clearer Views

Editor’s Note:

360-degree cameras are beginning to dominate the commercial market, gaining popularity through its use in virtual reality (VR) applications, which can be used not only for entertainment, but also as a teaching tool. For example, a doctor can record an operation using a 360-degree camera then import it into a VR headset. This would allow students to be able to relive the operation over and over and help them prepare for when they would need to perform it themselves. Now, these cameras are starting to make their way into the security industry. The use of which can eliminate issues such as dewarping and blind spots that may be present in other traditional surveillance cameras.

IC720 360° x 360° IP Camera

T

he IC Realtime series product is a situational awareness IP camera designed to see everything with no blind spots. It adopts a dual lens design and is powered by a Qualcomm Snapdragon 800 series processor, enabling it to maintain reliable, 24/7 operation. The use of both H.264 video compression and AAC audio compression technology enables the highest quality of recorded audio/video, while maintaining the lowest bitrate utilization. This camera and app delivers a virtual reality monitoring experience where the user can continuously pan 360-degrees vertically and horizontally. Supplier: IC Realtime

URL: www.ic720.com

• Two Sony IMX172 12-MP CMOS image sensors • Uses a smart device to move or swipe in any direction to see other points of view • 180-degrees field of view, with a resolution of 3000 x 3000 per lens • Over 20 patented products and technologies • Mounts to the ceiling or wall via a traditional Double-Gang J Box • Easily moves the smart device in any direction to reveal and explore different views

rICoh TheTa S SPherICal Vr DIgITal Camera

BuBlCam

A

T

• Dual 12-MP, 1/2.3" image sensors provide an interpolated 14.4MP output in order to produce stills with a 5376 x 2699 equirectangular resolution • Auto, shutter priority, and ISO priority exposure modes are available for shooting stills and auto exposure mode is available for video recordings or live streaming • Sensitivity range of ISO 100-1600 is available for all recording modes to benefit working in a variety of lighting conditions • When shooting stills, shutter speeds ranging from 1/6400 second to one minute are possible • Built-in Wi-Fi allows user to connect to a mobile device or tablet in order to gain live view images, adjust camera settings, and wirelessly transfer stills and videos for instant online sharing • A 1/4"-20 tripod mount is incorporated into the bottom of the camera body for increased stability

• Edits raw JPG and MP4 with any standard editing software • Saves contents to a MicroSD card or cloud storage • Bubl’s 360-degree videos and stills with 100 percent of the spherical range are compatible with virtual reality headsets, including Google Cardboard, Samsung’s Gear VR, and Oculus Rift • Weighs under 300 grams • The patent-pending tetrahedral design allows the four 190-degree lens to overlap, capturing everything within a “digital bubl”

Supplier: Ricoh

Supplier: Bubl

sleek and unique device that allows users to capture 360-degrees stills and Full HD movies with a single click, the Theta S from Ricoh features updated imaging components and performance attributes for producing broad-field imagery in a variety of ways. Dual 12-megapixel, 1/2.3” image sensors pair with bright f/2 twin lenses in order to capture high-resolution spherical images with each exposure and features a sensitivity range of ISO 100-1600 for performance in various lighting conditions. Automated exposure settings are used for both stills and video recordings. Manual settings can be employed when shooting stills for extended exposure times up to one minute long.

MAY 2016 ● www.asmag.com

22

URL: www.theta360.com

he Bublcam, also known as Bubl, is an innovative 360-degree camera, inside and out. The camera has been developed to be light and extremely portable (it’s slightly larger than a baseball). It was also created to provide users with the ability to capture 14-megapixel spherical photos and videos at 1080p at 15 fps and 720p at 30 fps. The software suite lets users experience looking up, down, and all around in any direction. It utilizes Wi-Fi to allow users to live stream directly from computers, mobile devices, and via the web. For industrial applications, Bubl can work with electric utilities, transit operators, and other large enterprises to enhance maintenance strategies and improve efficiencies as part of a complete assessment management plan. Assets can be visualized in any location, from every angle.

URL: www.bublcam.com


news feature

Will 5G be the Answer to Mainstream Connected Devices? Internet of Things (IoT) has taken the world by storm, where various industries, including security, are making use of the technology with connected devices and systems to produce valuable information. But what happens when stable BY Lisa Hsu Internet can’t reach everywhere?

With fast wireless connection for cloud computing, data services, and other connected devices, 5G can facilitate a range of advanced capabilities, user experiences and devices, for example, self-driving cars with built-in intelligent traffic routing, improved city infrastructures, intelligent machines and sensors, augmented reality, and more.

I

ntroducing the 5G network, which may

infrastructures, intelligent machines and

be announced to the world as early as

sensors, augmented reality, and more.

2020, will allow for faster service, less

Aicha Evans, Corporate VP and GM of the

latency, and enable more devices to be

Communication and Devices Group at Intel

connected across the globe. The speedy

predicted in an Intel report that transmissions

network will support the massive growth of IoT

that took seconds, minutes, or even days to load

and enable devices to communicate with each

or send will be delivered in milliseconds when

other seamlessly through the convergence of

5G technology becomes available.

mobile communications and computing. Growing demand for high Internet speeds to have real-time response is among one of the major factors pushing the development of

What Does This Mean For Security?

Increasingly, video surveillance and IoT are

latest technologies such as the 5G network.

being integrated as products such as cameras

5G can offer Internet speeds between 10

and recorders move to IP and are connected

Gbps (gigabytes per second) to 100 Gbps.

together on the Internet. The launch of the

Furthermore, 5G delivers an ultra-low latency

5G network will bring a whole new array of

range between 1ms and 10ms, whereas 4G

opportunities to the security industry. The

technology offers a low latency range between

faster and more robust network would mean

40ms and 60ms.

more connected and autonomous devices and

With fast wireless connection for cloud

systems, as well as better quality images and

computing, data services, and other connected

faster streaming. Gathering information through

devices, 5G can facilitate a range of advanced

analytics will become more mainstream as the

capabilities, user experiences, and devices.

data produced will provide more information

For example, self-driving cars with built-in

and knowledge, which helps organizations

intelligent traffic routing, improved city

produce better business strategy plans. However, security players are likely to face certain challenges in order to accommodate for the upgraded network, such as storage issues to manage data, hardware compatibility for 5G, and other technical difficulties ahead. The

MAY 2016 â—? www.asmag.com

launch of 5G may be a big motivator for more advanced equipment to appear in security, but players must first understand the different wireless protocols that define the standards for networking devices and know what benefits certain security applications.

24


Seagate on How to Choose an HDD and Customer Feedback on SRS Seagate Technology, the leading storage solutions provider, launched a clinic consultation service at Secutech 2016 to demonstrate to its customers the importance of using the right drive for the right environment and give recommenBY Jill Lai dations based on their requirements.

I

n order to choose the right hard drive

any organization. Seagate’s Surveillance

for a video surveillance system,

HDDs allow customers and SIs to optimize

it is important to first understand

their drive reliability in a DVR or NVR

the main purpose of using video

environment. Adding the Seagate Rescue

surveillance systems and identify the

services (SRS) helps to protect the data

main points of the operators.

Another major problem that systems integrators might have with their current storage system is the unexpected data loss. Seagate, therefore, introduced the Seagate Rescue Services (SRS) to their customers.

against unexpected situations such as

Rex Dong, Senior Director for Asia

vandalism, virus, or unintentional deletion

OEM Sales at Seagate Technology, further

and also serves as incremental support to

explained, “First understand the workload

help SIs better optimize their resources in

of a security system so you can determine

the field.”

the performance the system requires from

The company then shared one of its

the drive. Will the system be used for fast

customer’s story that tells how SRS helps

video analytics like facial recognition,

to recover lost data. It is said that two

or will it more simply be used to record

men broke into a jewelry store in China,

contents and play it back only when an

s t o l e U S $ 2 0 0 , 0 0 0 w o r t h o f j e w e l r y,

incident needs reviewing? If it is, then these

and destroyed the store’s surveillance

factors are important to understand the

camera and DVR. After numerous failed

level of performance you’ll expect from the

attempts by the data recovery agency,

drive. Next, consider what implications this

the Chinese police contacted Seagate.

workload will have on your system design.

Its SRS team successfully repaired the

All surveillance applications expect support

damaged DVR that allowed police access

24/7, but how does this affect your storage

to the surveillance footage to identify the

requirements? Through Secutech and our

suspects.

clinic consultation, we are able to help the

D o n g s ai d , “To d a y, w e c o n ti n u e t o

systems integrators (SIs) and customers to

improve the customer experience for data

solve their problems and meet their needs for

recovery so people feel informed and

surveillance storage solutions.”

up-to-date on the progress of their recovery

Systems Integrators’ Feedbacks on SRS

through email updates. The customers can also track and monitor their recovery status from Seagate’s website. From the

Another major problem that SIs might

service hotline, case submission website to

have with their current storage systems is

the drop-off point, etc., we’re committed

unexpected data loss. Seagate, therefore,

to providing customers a smooth and

introduced the Seagate Rescue Services

hassle-free data recovery process.”

(SRS) to its customers. Dong said, “The storage and access to data are critical for

25


he Internet of Things (IoT) has become a catch-all phrase that encompasses all the communication that occurs among physical objects such as interconnected computer networks, sensors, and devices. It is clearly intertwined with the concept of Big Data, which is not surprising as increased interconnectivity will lead to a rise in the amount of information that can be generated by these ecosystems.

Evolving ioT landscapE

MAY 2016 â—? www.asmag.com

There is a proliferation of new devices that are coming online and producing data. Based on a recent report by Gartner, 5.5 million new devices will be connected every day in 2016. In part due to strategic actions taken by cellular or Wi-Fi carriers looking for new growth opportunities in the mature market, this boom in numbers is creating more opportunities for devices to be interconnected and produce even more data. The impact of these figures is quite far-reaching, extending beyond the technology industry to influence trends in fields such as retail, healthcare, and security. The implications of this development has even led McKinsey Global Institute to forecast that US$36 trillion operating costs of key industries will be directly impacted by IoT. Although IoT is trending right now, it is certainly not a new concept, especially when it comes to the security industry. This is because it has become common practice for security practitioners to incorporate various different technologies and components into one system. Therefore, the question is how IoT and Big Data differs from before and why it is attracting so much attention.

ioT valuE proposiTion There has never been a shortage of data presented by these systems. What is

28

IoT: Implications and Challenges for Security The evolution of the Internet of Things has reshaped and transformed businesses and industries, bringing with it various benefits and risks, as well as challenging existing best security practices. ISC West organized a seminar to discuss the topic, featuring a panel of speakers from Axis Communications, Central Station Alarm Association International (CSAA), Honeywell, and Securitas Electronic Security. COMPILED BY the a&s editorial team (Source: SIA Education seminar at ISC West 2016)

different is not the actual amount itself, it is how it is being presented and used. With bandwidth becoming faster and more readily available, consumers are finding it increasingly easier for them to connect different devices. The information collected is also managed differently than before as it is now commonly aggregated and mined in data warehouses. Additionally, through the use of web browsers, smartphones, or fitness trackers like Fitbit, the data is automatically transformed into something that consumers can understand, access, and use to add value to their lives. With all these data coming in, it is difficult to pinpoint which information is important or to determine how it is going to be used. Nevertheless, the value of collecting the data for future analysis cannot be underestimated. The promise of Big Data lies in its potential for associations over time when the software matures to be able to create information that is meaningful and useful for the users.


Big daTa for siTuaTional awarEnEss In the security industry, Big Data has traditionally been used for two purposes: to prevent bad things from happening and, in instances that something bad happened, to perform forensic investigation. However, people are now looking toward harnessing the data to enable them to use the system proactively by potentially predicting what threats would be present and eliminating them beforehand. Furthermore, the data can also be leveraged in businesses to improve operational efficiency and this can already be seen in the retail space. The omnichannel approach many retailers employ to understand and use customer behavior data is an example of IoT at work.

implicaTions for sEcuriTy Demands from users for better broadband experiences is expected to grow even further in the near future

The rising demand for immediacy and connectivity can end up creating the so-called 'internet of insecure things' or 'internet of risk.' and this would in turn drive up the need for security. This is because the rising demand for immediacy and connectivity can end up creating the so-called “internet of insecure things” or “internet of risk.” The more devices gets connected to a system, the more breach points the system will potentially have. Cybercriminals will try to find the weakest parts of the systems, which could be the video or the security system, and use it as a backdoor to access the company’s network. Furthermore, many enterprises are now facing the challenge of incorporating devices that may or may not follow best practices into their systems due to the popularity of the “bring your own device” (BYOD) trend in the workplace; hence, necessitating regulating policies that will protect both the employees and the company’s private information. To prevent or minimize the possibility of cyberattacks, many consumers turn toward safety standards such as UL, Triple DES, and ONVIF. However, this can actually lull them into a false sense of security as devices and systems with these labels may not be completely safe. Since the creation of these standards takes time and collaboration, it is entirely possible that it is a year or two behind where the market is at the moment. On the other hand, hackers are continuously formulating new attacks and finding ways to get around existing standards.

rolE of ThE sEcuriTy indusTry in ioT

IoT is constantly developing and security practitioners would be wise to get involved early so as not to be left behind. It would be important for them to continue to communicate and be aware of what is happening with their As the “bring your own device” trend continues to gain popularity in workplaces, it would be important for companies to find the balance between convenience and security. vendor partners and end customers in order to determine and execute the right strategies. It is equally important to collaborate with outside consultants, such as from the IT department, to better identify weak links and come up with possible solutions to make the system more secure. This would also involve developing good security development practices for vendors that is supported by strict and continuous testing programs. Another important point would be to make it easier for the end users to apply, because at the end of the day, it doesn’t matter how secure the system can be if the end users don’t go through the process of securing it.

29


Smart Workplace access in a Secure MobIle World Mobile technologies have now penetrated every aspect of our lives, including the workplace. It would be wise for enterprises to take advantage of this trend to not only increase convenience, but also to enhance existing physical access control systems. By Alex Tan, Director of Sales, Physical Access Control System, ASEAN, HID Global

MAY 2016 ● www.asmag.com

obile technologies have brought in new levels of choice and confidence to access control. From smartphones to wearables and tablets, mobile devices are ever present in today’s office environment, always on-hand to serve a variety of purposes. It has become the go-to technology of the new millennium, offering convenience and portability. In light of these developments, leveraging mobile technology to access doors, parking facilities, and gates – not to mention networks, other enterprise applications, and so much more – is a logical step in the evolution of access control. These advancements have encouraged a more secure identity lifestyle built around the convenience

30

and ubiquity of mobile devices. It would be, perhaps, the next logical step that organizations and employees consider the use of smart devices to enable physical access (mobile access control). This article will highlight the benefits to consider when implementing mobility initiatives which would enable organizations to answer end-user demand for convenience and choice in a new mobile-first world.

Smart DeviceS are everywhere The convenience that mobile connectivity offers is changing the way we live, work, and play. By extending access control functionality to a mobile device, it allows end users to securely and conveniently access the workplace using their smart devices. In this era of mobility and cloud computing, enterprises and individuals are increasingly concerned about the security and protection of their physical environment. Correctly implemented, secure mobile access has the potential to change how we

Leveraging mobile technology to access doors, parking facilities, and gates – not to mention networks, other enterprise applications, and so much more – is a logical step in the evolution of access control.


interact and remains taking wearableS into account The wearables market is growing exponentially. The International a critical front line of Data Corporation (IDC) Worldwide Quarterly Wearable Device Tracker defense for enterprises. reported the shipment of 78.1 million units in 2015, a 171.6 percent Confidence and increase compared to the previous year. It is, therefore, only a matter education in the use of time before wearables and other mobile products join the device of contactless applicaecosystem and give users even more choices and flexibility. tions and technologies Indeed, another research by Gartner also stated that wearable such as wearables, devices would offer many opportunities for customers and employees NFC, Bluetooth, mobile and that the array of devices available would evolve rapidly in the wallets, iBeam, and short term. It is because of this rapidity that these truly mobile, iBeacon are continu“always-on� devices are the ideal natural candidates for access control ously growing and so Alex Tan, Director of Sales, Physical Access applications because of the ready-to-use convenience they offer. is the understanding of Control System, ASEAN, HID Global which technologies are tranSactional experience best suited for mobile access control. Imagine a world where access fits in the palm of your hand. Smart devices are No matter what the technology, ubiquitous and always at hand; thus, becoming the most valued technology we own. mobile devices offer an unparalleled Using mobile devices to open doors is therefore seen as a marriage of security and way to change the way we open doors. convenience, offering an individual the ability to securely access doors, gates, and However, security administrators and areas not open to the general public through his mobile device. IT directors will need to review which Secured mobile access solutions allow for the secure creation, issuance, and mobile-related technologies will management of digital credentials into smart devices. In today’s more progressive allow them to best engage with their solutions, digital credentials or Mobile IDs can be securely managed and revoked employees to create the optimal access remotely from a central management portal. As mobile devices proliferate, their users experience on their premises. can always utilize connected networks.

31


NTERNET THINGS

OF

Adoption of IoT for Ware

Supply chain management is continuously improving, relying heavily on technology to improve work processes and efficiency. New use cases and ways in which businesses can improve their operations and enhance their efficiency are actively being tested as the industry is considering the move toward IoT-enabled solutions. BY Israel Gogol, Freelancer

MAY 2016 â—? www.asmag.com

34


house Management mazon Prime, the retail giant’s delivery program which promises same-day or two-day delivery for an annual membership fee, is proving to be a big hit. Attracted by the convenience of shopping online and instant gratification, people everywhere are slowly but surely changing the way they shop. This is correspondingly shaping the future of retail and how the

supply chain is being managed. This doesn’t come as a surprise to Daniel Dombach, Director of Industry Solutions for EMEA at Zebra Technologies. “What we see these days, if we look at the warehouse landscape and the way client expectations are shaping, is the expectation to get goods faster – tomorrow or end of day delivery. For that, you need a higher proximity of goods to the consumer and if you want to be flexible and agile in your operations, you need very good visibility of your inventory and to be able to change things fast. This is where IoT comes in. It is about retrieving data from all the sensors and transforming it to business valuable information.”

35


How

access control systems are designed in

Iot

BY William Pao

The Internet of Things (IoT) is a growing phenomenon, with billions of devices already connected to the Internet and more to come. Amidst this trend, access control, which has more and more migrated to IP, will be an integral part of IoT, connecting with other security and non-security devices. That said, access control systems must be designed to suit the overall IoT trend, helping users achieve better security and more streamlined operations.

MAY 2016 â—? www.asmag.com

ust as security products have increasingly moved toward IP, the same holds true for access control. A study by IHS cited that in 2014, 60 percent of the global access control panel market was already IP-based, and the growth is set to continue. In that sense, access control inevitably becomes a part of the Internet of Things framework, connecting with a variety of networked devices. “End users are demanding connectivity between devices across networks, and security directors within enterprise organizations require access control solutions that are accessible remotely for security teams to access at any time, day or night,� said Mitchell Kane, President of Vanderbilt

40


Industries. “Access control systems migrating to IP have certainly enabled more integration between systems and sensor devices,” said Daniel McVeagh, Senior Product Manager at Gallagher. “This is particularly evident at the control panel level, where automated decisions often need to be made in real time, without reliance on server connectivity. Examples of this are video system analytics triggering alarms directly in a security control panel, or a building management temperature sensor triggering an access control panel to lock down an area for safety reasons.”

Internet of thIngs In BuIldIngs (BIot) takIng off Global market for BIoT is expected to rise from US$22.9 billion in 2014 to over $85 billion in 2020. The networking and related services segment of the market will grow at 22.6% CAGR, rising from $9.5 billion in 2014 to $32.4 billion in 2020. Overall connectivity penetration rates across all building systems are only around 16%. This connectivity penetration rate will rise steadily over the coming years. Source: Memoori Business Intelligence

Benefits for All The convergence between access control and IoT has gained prominence in the residential sector, where smart locks trigger home automation devices such as lights and thermostats. “Residential will see many of these benefits because there is currently more IoT in the home than in commercial security installations,” said Steve Van Till, President and CEO of Brivo. But eventually — and one can certainly argue that this is already taking place — interest in access control-IoT convergence will spill into the commercial sector, where users can also enjoy the benefits such convergence brings. “In the commercial market, there is a key driver for convergence between disparate systems and for reducing energy usage while providing better diagnostics and flexibility,” said Mike Sussman, Technical Director at TDSi. ”If you look at enterprise, healthcare, high security ... all are making use of the Internet of Things, and most, if not all, have access to networks,” said Gareth Ellams, MD for Access Control at ASSA ABLOY. ”It's not sectorspecific anymore. It's

about making sure that the solution you want to put in place is the simplest and most effective.”

Designing Access control to suit iot

With IoT becoming an unstoppable force, access control needs to be designed to reflect this overall trend. In particular, access control systems in IoT are designed with the following things in mind: enabling integration with other networked systems, providing a better user experience, and leveraging data generated by the devices.

Interoperability

Gareth Ellams, MD, Access Control, ASSA ABLOY Thomas Herling, SVP, Global Business Owner, Electronic Access and Data, Kaba Mitchell Kane, President, Vanderbilt Industries Rob Martens, Futurist and Director of Connectivity Platforms, Allegion

IP-based access control systems can now be connected with other networked devices that are both security- and non-securityrelated. ”We are connecting with video surveillance systems, alarm systems ... and as IP knowledge becomes greater, we are finding easier ways to enable these systems to talk to each other,” said Ellams. ”Access control has almost become the backbone of building security and management systems, so a building now and in the future utilizes access control not just to open or close doors; it also drives other systems such as HVAC, lights, and various different products.” The key to integrating with other devices and achieving seamless interoperability lies in software and APIs, which have become more open than ever in the era of IoT. “The access control system and the components are providing open interfaces, allowing integration with surrounding systems,” said Thomas Herling, SVP of Global Business Owner in Electronic Access and Data at Kaba. “Originally in the access control space, it wasn't so open and flexible. Now over time, the APIs are easier to write, enabling more complex integrations with other products,” said Kurt Takahashi, SVP

41


Emerging Trends in School Emergency Notification BY Prasanth Aby Thomas

Security in schools continue to be a major topic of debate. While this is often centered on video surveillance and access control systems, emergency/ mass notification systems too have an important role to play in this vertical. In this article, we take a look at some of the new directions in school emergency notification solutions.

MAY 2016 â—? www.asmag.com

44


Safety in schools has, without a doubt, remained a concern ever since the fatal Sandy Hook shooting incident in 2012. Authorities have attempted to tighten control over learning evironments, but statistics clearly show there is much more to be done. n April 23, what should have been a fun-filled prom night in Wisconsin, U.S., turned out to be disaster after a gunman shot two students. Two months before that, four students were injured when a 14 year old with a shotgun opened fire at a school cafeteria in Ohio. In the same month, two school girls were killed in another gun-related incident in Arizona. These are just some of the latest shooting incidents that US schools have seen. According to Every Town for Gun Safety Support Fund, an organization fighting gun violence in the U.S., as of last year there have been at least 176 school shootings in America since 2013 — an average of nearly one a week. Safety in schools has, without a doubt, remained a concern ever since the fatal Sandy Hook shooting incident in 2012. Authorities have attempted to tighten control over the learning environments, but statistics clearly show there is much

Pat Scheckel, VP, Business Development, Singlewire Software

Joel Slutzky, Chairman of the Board, Maxxess Systems

more to be done. In terms of security technology, an area that requires careful consideration is the emergency notification systems. While most schools in the developed world would have some form of mass notification system, the current situation warrants modern communication solutions that can be effectively put to use in the event of a crisis. Fortunately, school authorities and security manufacturers are realizing this. “Recent security incidents in schools have led to the realization many institutions do not have the systems or procedures in place to properly respond to emergency situations,” said Pat Scheckel, VP of Business Development at Singlewire Software. “This has given rise to innovations that look to address the two most critical areas of emergency notification: speed and reach. Schools need systems that communicate between disparate technologies, notify people quickly, and reach users on multiple devices to ensure messages are being viewed.” Indeed, such innovations have given rise to several new directions in the emergency notification segment. These are not just limited to schools, but are becoming an integral part of the infrastructure even in areas like the corporate sector.

New DevelopmeNts employiNg moDerN techNology In a recent blog post, Oded Shekel, VP of Product Management at AtHoc, a subsidiary of Blackberry, identified six major trends that are set

45


Systems Integrators

Rising Up to the Challenge BY William Pao

Today’s security devices have become more network-centric. When all connected, they in essence form an “Internet of security things,” delivering greater safety, efficiency, and experience for the end user. This unstoppable force has created new challenges for systems integrators (SIs), who are faced with new demands and new needs from customers. We spoke with several SIs on how they rise up to these challenges and stay competitive in the market. This article also contains notes from an SIA Education seminar at ISC West 2016 titled “Integrators Meeting the Challenge,” featuring the following speakers: Ray Coulombe, Managing Director at SecuritySpecifiers; Andrew Lanning, CEO of Integrated Security Technologies; Joseph Lynch, CEO of Minuteman Security Technologies; and Brent Franklin, President of Unlimited Technology.

MAY 2016 ● www.asmag.com

ore and more, security systems such as video surveillance and access control have migrated to IP. New applications resulting from this trend, for example remote monitoring of sites and physical/logical access integration, benefit the end user in numerous ways. Against this backdrop, the systems integrator must develop strong IT capability and better understanding about network security to be able to deliver solutions that their clients truly need.

50

Integrated SolutIonS As security moves towards IP, it offers greater possibilities for systems to be integrated with one another. The end user therefore are looking for integrated solutions that help them

better secure and manage their facilities. “Customers want to have everything in one application or software. Like now, what you would like is to have an alarm system with camera. They would like to have everything in one. Everything is changing very fast, and you’ve got to change with the technology,” said Frederic Damance, GM of New Caledonia-based Prosystems. “Our customer was happy only with camera, but now they are looking for video analytics, real-time alarms, and everything. The software market is demanding, and video analytics software is demanding. When an incident happens, they need immediate response,” said Sajjad Ahmmad, Head of Data Center Solutions at Express Systems based in Bangladesh. The need for integrated solutions applies to virtually all areas, from enterprise to the smart home. “Till now, people do not have enough ideas about the importance of the smart home. People need it not only as a prestige — it’s part of life to monitor your house and to save energy for you, your country, and the next generation. People will understand more and more about integrated systems,” said Abdullah Al Malki, GM of ITQAN based in Saudi Arabia. To meet the customer’s needs, the systems integrator must have the necessary capability and skills to deliver these solutions. “We mainly work on home automation


systems, and we integrate security with intercom, sound system, and everything under one application,“ said Mohamed Salah, GM of Smart Home Safety Equipment, which is based in Sudan and has also opened offices in Ethiopia. “We do integration for clients from healthcare to higher education … they have all these different student or HR management systems. Integrating that to your access control system is very important for large facilities where you have multiple cameras and lots of people coming and going. We find ourselves doing a lot of that integration,” said a speaker at the ISC West seminar.

underStandIng of It eSSentIal Since more devices are now integrated on the Internet, the SIs must equip themselves with IT and software knowledge — or staff their companies with people with such knowledge — to ensure that the connected devices can communicate effectively with one another. “In our case we have network engineers who are very specialized and very good at what they’re doing. We have software developers who deal with a lot of enterprise customers, helping them with their software integration. Even within software we have Java Script software people vs. SQL database guys that are very good at managing databases,” said a speaker at the ISC West seminar. “Our issues are to make sure our technical staff

is educated enough. We’ve got specialists within our organization that are Cisco-certified engineers and technicians. We have to have those people to bring to the meetings to start those discussions with the end user’s IT department on

how our application can run on your networks,” said a speaker at the ISC West seminar. If the SI does not have the necessary IT skills, there are ways to get around that. “If you don't have the staff, you don't understand all that cyber stuff … talk to other integrators and find out what they are doing. Educate yourselves,” said a speaker at the ISC West seminar. “One of the things we saw early on was, if you feel like you are going to get in trouble with that customer, find an IT company that’s local to you, and partner with them — even if you have to pay them whatever dollars an hour. Have them walk in as your partner or as your company,” said a speaker at the ISC West seminar.

CyberSeCurIty gaInS ImportanCe As devices reside on the network, their vulnerability to hacking and intrusion becomes a serious issue. Worse, most end users look at these threats lightly, as a

51


ItalIan SecurIty leaderS

GrowinG without Compromise a&s italy and analyst KF economics (K Finance Group) recently released the fourth edition of the top 25 italian security Leaders. the past four years haven’t been brilliant for the italian economy as a whole; however, the mature sector still showed signs of growth without compromising on profitability. the survey analyzed data from 365 italian companies which were classified further into four operational categories: producers, distributors, systems integrators, and producers/distributors. BY a&s editorial team (adapted from a&s Italy)

ased on 2014’s revenue, the top five companies of the Italian Security 25 were Notifier Italia, Project Automation, Hesa, Cima, and Tecnoalarm. The list didn’t show many new entries or changes of position. Nevertheless, it would be worthwhile to note the entry of two new companies: Cima and Data General

Security, as well as the significant rise of Hikvision Digital Technology, which moved from the 50th to the 22nd position as a result of an impressive 98 percent growth. The average revenue of the Top 25 in 2014 was US$24.3 million – almost five times the average for the entire sample included in the survey, which amounted to an average of $5 million.

Figure 1: Distribution of EBITDA% and 2013-2014 Income Growth

Table 1: Distribution by EBITDA% and 2013-2014 Income Growth Sectors

Revenue (US$ millions)

EBIDTDA/Sales Average Average revenue growth

Anti-intrusion

194.1

18%

2%

Fire-fighting

92.9

10%

0%

25.1

-5%

1%

156.6

11%

39%

Video Surveillance

76.1

6%

43%

Various

61.6

7%

5%

Total producers

606.3

11%

17%

Distributor

218.9

6%

6%

Prod/Distr

100.7

1%

-2%

Systems integrator

232.0

9%

38%

1157.8

9%

18%

Access Control Physical security

MAY 2016 ● www.asmag.com

Total (SMEs and Corporate)

54

Variations over the past four years have not been marked. However, a comparison of the entire sector by revenue during the said time period revealed an industry slowdown in 2012, followed by an 8- to 10-percent improvement in EBITDA/sales margins. The distribution of revenue of the overall sample across the supply chain remained fairly stable (see Figure 2).

The dimension of the bubbles is equal to the revenue earned by the sector.


It needs to be pointed out that, to reflect the reality of the Italian security market as faithfully as possible, only firms, Italian or multinational, that had an Italian value-added tax (VAT) number and that were entirely dedicated to security were included. Also, all monetary figures have been converted from the euro to the US dollar at 1:1.13, the exchange rate on April 25 when this report was compiled.

Table 2: Top 25 Companies by Revenue 2014 2013 Company Name Classification Classification 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

2 1 3 n.d. 4 5 6 7 8 11 14 10 9 13 12 16

17

17

18 19 20 21 22 23 24 25

15 21 18 19 50 n.d. 22 20

NOTIFIER ITALIA SRL PROJECT AUTOMATION SPA HESA SPA CIMA S.P.A. TECNOALARM SRL SAIMA SICUREZZA SPA BENTEL SECURITY SRL SELESTA INGEGNERIA SPA UTC FIRE & SECURITY ITALIA SRL ATRAL ITALIA SRL INIM ELECTRONICS SRL HONEYWELL SECURITY ITALIA SPA VIDEOTEC SPA ELECTRONIC’S TIME S.R.L. GUNNEBO ITALIA SPA EL.MO. SPA DISTRIBUZIONE APPARECCHIATU- RE SICUREZZA DIAS SRL DAB SISTEMI INTEGRATI SRL AIKOM TECHNOLOGY S.R.L. SISTEMI INTEGRATI SRL SICURTEC SRL HIKVISION ITALY S.R.L. DATA GENERAL SECURITY S.R.L. COOPER CSA SRL SICURIT ALARMITALIA SPA TOP 25 Average SME and Corporations Average

Revenue (US$ million)

Revenue Growth

Lombardia Lombardia Lombardia Emilia-Romagna Piemonte Toscana Abruzzo Liguria Lombardia Emilia-Romagna Marche Lombardia Veneto Puglia Lombardia Veneto

49.0 43.7 39.9 35.4 34.3 30.9 30.5 25.1 24.8 22.6 22.2 21.8 21.6 19.8 19.6 19.4

3% -10% 1% 397% 3% -1% 7% -11% -8% -6% 19% -11% -17% 4% -4% 7%

Lombardia

18.8

10%

Distributor

Lazio Emilia-Romagna Emilia-Romagna Lombardia Lombardia Lazio Lombardia Lombardia

18.8 17.6 16.6 16.5 15.5 14.4 14.3 14.0 24.3 13.6

4% 21% -3% 1% 98% -37% 3% -4% 19% 18%

Systems Integrator Distributor Systems Integrator Distributor Producer Systems Integrator Producer Producer/Distributor

Region

Sector Producer Systems Integrator Distributor Producer Producer Producer Producer Producer Producer/Distributor Producer Producer Producer/Distributor Producer Distributor Producer/Distributor Producer

55


Asia at a Glance – Korea South Korea may be known as a cosmetic surgery capital, but it is also known for its advanced technology, fast Internet, and high-quality electronics. As the 4th largest economy in Asia, behind China, Japan, and India, there seems to be mixed feelings about the immediate effects of current geopolitical tensions on Korea’s economy.

In 2014, there were 5.6 million active enterprises in Korea.

Source: Statistics Korea

Total construction value amounted to US$210.2 billion in 2014, including both domestic and overseas construction. Source: Statistics Korea

KOREA

Korea has the fastest Internet in the world, with an average speed of 20.5 Mbps in Q3 2015. Source: Statista

Embracing Cloud and IoT in Physical Security Vast government investment in public infrastructure and highly advanced Internet infrastructure are two major drivers for the Korean physical security market. The market is growing and investment in cloud technology will lead the way to more opportunities in the near future. BY Israel Gogol, Freelancer

MAY 2016 ● www.asmag.com

he physical security market in Korea is growing and is driven by continued investment in IT infrastructure, making the replacement of analog cameras and the roll out of IP cameras easier. “From our research, we’re expecting the Korean security market to grow slightly from KRW1.2 trillion in 2015 to KRW1.3 trillion this year,” said Jay Jeong, GM of Sales Team in Americas and

60

Korea is ranked number 1 in the 2015 ICT Development Index. Source: ITU


The number of mobile phone users is expected to grow to 41.9 million in 2019. Source: Statista

Exports of oil and petrochemical products were down 36.6% and 21.4% in 2015 from 2014.

Source: Ministry of Trade, Industry, and Energy

The number one exported item is semiconductors, followed by mobile phones and flat-panel displays.

Source: Ministry of Science, ICT, and Future Planning

The consumer price index in February 2016 was 110.76, a rise of 1.3% year on year. Source: Statistics Korea

A record high US$20.9 billion in FDI pledges were received in 2015. Source: Reuters

13.7% of businesses have an established information security or privacy policy in place. Source: Korea Internet and Security Agency

Asia at IDIS; this amount is roughly equivalent to US$1 billion. The market has benefited from extensive government investment in safe and smart city projects over the past 10 years and an expected growth in residential and commercial construction is predicted to increase security spending as well. “Korea will probably maintain its lead in developing intelligent technology-based security services in the future,” said Jong-Sung Hwang, an ICT strategy expert who served in a number of key positions in the IT policy planning field in Korea and currently holds the position of VP at the National Information Society Agency. Hwang initiated the u-City project in 2005, one of the world’s first smart city projects, and later served as CIO of Seoul, in charge of launching the Smart Seoul 2015 initiatives. According to Hwang, the vast investment in smart city projects was one of the main drivers that accelerated the use of advanced IT technologies for physical security. These projects included investment in video surveillance and most important, connectivity and infrastructure. Korea is one of the most connected countries in the world, with high bandwidth accessibility, high cellular penetration, and plenty of investment in R&D. Korea’s technological prowess puts it at the forefront of technology. “We have done many projects in Korea and we have several resellers there. It is very similar to other countries with one exception; Korea is probably more technically competent than other countries. Some of the western countries do not have infrastructure as good as in Korea,” said Rustom Kanga, Founder and CEO of analytics provider iOmniscient.

BuSineSS environment

Security players seem to agree that in general the business environment in Korea is positive and easy to do business in. Language and cultural barriers exist; however, they do not pose any unusual difficulties that aren’t expected when entering a new market. “I see Korea as a fair and level playing field,” said Charles Cousins, MD of APAC and Japan at Genetec. “There is language barrier and cultural gap, but our local partners help with that. Our product is already localized to Korean and overall the business environment is conducive and it is easy to do business.” Government regulations meant to protect small-to-mediumsized manufacturers and systems integrator companies in certain projects are also a factor that may add to the challenge of market penetration. But overall, maintaining quality, reliability, and supplying proper technical support is a far greater challenge. “The protection of domestic manufacturers may add on to the challenge for market penetration. The major challenge may come from the increasing demand for quality and value for money,” explained Chris Cheung, Regional Sales Director for North Asia at Axis Communications.

61


High megapixel, multi-sensor panoramic cameras are a good solution to achieve seamless situational awareness in outdoor scenes. Multi-sensor cameras promise to deliver high quality images with a more aesthetic installation. An SIA education seminar during ISC West attracted many attendees who came to listen to speakers from Arecont Vision, Pelco by Schneider Electric, Genetec, and systems integrator Kratos Public Safety and Security discussing the topic. CoMpiLed By the a&s Editorial Team (Source: SIA Education seminar at ISC West 2016)

Benefits of Multisensor PanoraMic Cameras in oPen sPace Video surVeillance anoramic cameras are the fastest growing IP camera category, according to IHS. The predicted compound annual growth rate of 180- and 360-degree cameras for 2014 to 2019 is almost 30 percent. This is double the CAGR for PTZ cameras and way ahead of the figures given for boxed and fixed dome IP

MAY 2016 â—? www.asmag.com

64

cameras. This rapid growth rate indicates that there is still an upside in the market for these solutions. Multi-sensor cameras deliver several benefits, most noteworthy is its ability to replace several fixed cameras and lower camera count, as well as provide better situational awareness, giving operators a seamless panoramic view of the scene.

Lowered Camera Count Multi-sensor panoramic cameras enable the coverage of larger areas; thus, replacing the need to install several single-sensor cameras. This is because these cameras usually feature several lenses and sensors contained in a single housing with a single video/network output. Combining two sensors and lenses in one housing can allow the camera unit to cover an area of up to 180 degrees. On the other hand, fixed cameras provide a narrow field of view as they are typically limited to a 90-degree angle at most. Panoramic cameras can cover a field of view from 180 degrees when installed at the side of a building and up to 360 degrees in cases when it is, for example, mounted on a pole in a parking lot.

Lesser Number of Cameras, More Benefits Reducing the number of cameras required for a project brings several benefits to the table. All these advantages together can save both the integrators and end users time and money. One advantage of this is that less work is required for installation and cabling. Newer multi-sensor camera models are PoE-operated, allowing the same cable for network connection to be also used for power which eliminates the need for separate power cabling. Additionally,


Ways to address the demand for higher resolution videos 1. Reduce overhead by only streaming high-resolution videos when required

Video is encrypted, using a camera with a user-created encryption key

Cloud

Video archived on-premises

On-premises

Live stream megapixel @ 30 FPS

2. Transfer recordings of events and game days to the cloud for long-term retention Encrypted video transferred to the cloud after X days (user defined)

Live stream megapixel @ 30 FPS Archiver Remote stream VGA @10 FPS

Communication between cloud is secured over TLS connection

Users can access video stored either on-premises or in the cloud seamlessly

Source: Genetec

since the camera only has one IP and MAC address, it will potentially only require a single VMS license, significantly lowering the cost as compared to having several fixed cameras covering the same area. However, this might vary between VMS as some might be charged per stream. There is also an operational efficiency benefit because the investigator wouldn’t need to switch between various cameras and different screen views, but instead he can manage everything from one screen; thus, reducing investigation time. Last but not least is aesthetics. Aesthetics is an important

consideration for property managers and large campuses like hospitals and colleges. Instead of having several cameras mounted on the same wall pointing at different directions, one panoramic camera can solve this problem. For example, a four-sensor camera can effectively cover 270 degrees with one sensor facing forward, one facing down, and two others pointing to the sides that can act as PTZ replacements. In this way, one camera mounted on a corner of a building can replace four fixed cameras covering the same field of view.

Better SituationaL awareneSS The wide field of view panoramic cameras deliver gives operators greater situational awareness, especially since they won’t need to switch between several cameras or watch scenes via tiled view which would not be so intuitive. Multi-sensor cameras can blend and stitch together images from different sensors, allowing users an instant understanding of the scene and giving them the ability to zoom in on specific details. Fisheye cameras are one of the competitive alternatives for multi-

65


SMAhome

EmErging Product trends in Germany

MAY 2016 â—? www.asmag.com

68


By a&s SMAhome

The first quarter of 2016 was bustling with a handful of smart home-related tradeshows in Europe. Light + Building, the world's largest light and building automation trade fair highlighted the current market trends in Germany—energy efficiency, ease of use, and personalized home automation experience. The solutions are designed to enhance home security, comfort, and energy management.

Germany is the largest national economy and smart home market in Europe. In this region, the home automation market is composed of professional installation and retrofit markets. KNX and Internet Protocol (IP) are the two dominant network technologies for professionally installed systems in Germany. With increasing demands for add-on smart home devices and renovation in existing homes, wireless communication became widely adopted. Besides easy installation, wireless solutions are considered to be more affordable and accessible to the mass market.

Major CoMMuniCation ProtoCols Popular wireless communication standards include EnOcean, ULE, ZigBee, Z-Wave, and proprietary w i r e l e s s p ro t o c o l f ro m e Q - 3 . EnOcean is a popular wireless c o m m u n i c a t i o n p ro t o c o l in Europe with more than 150 manufacturing partners. EnOcean is famous for its battery-less and energy harvesting technology that generates power via movement, sunlight, heat and others from its environment. ZigBee is also a major wireless protocol, especially for smart lighting applications. ABB, a global leader in power and automation, launched the ABBfree@home wireless system under the Busch-Jaeger brand. The system is designed for installers and the retrofit market to install home automation

systems without re-wiring the home. Adapting a 2.4 GHz frequency communications protocol and mesh network technology, the system can be used for lighting, heating, blind control, and door communication. free@home wireless can be used as a stand-alone solution or as an extension to the wired version of free@home. Furthermore, the system supports voice control to provide more intuitive control. When it comes to connectivity, Bosch believes open standards and open platforms can make its technology as user-friendly as possible. Also, Bosch smart home systems are designed to be modular and expandable to make it easy to connect and be compatible with smart devices from other manufacturers. KNX is one of the dominant communication protocols for building and home automation and has already been adopted by 400 manufacturers and 50,000 systems integrators, including leading European companies like ABB, Gira, Legrand, Bosch, Philips, Jung, and Schneider-Electric. Through support of Apple HomeKit, users now can control KNX IoT-enabled home automation devices via their smart watches. nomos Box is a gateway that lets users control their connected home devices via an Apple Watch. The gateway supports different protocols with its nomos operating system (nOS). nOS is capable of connecting with IoT apps such as Samsung's SmartThings or

69


May – September 2016

WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

May 2016

Asian Securitex • Date: 2016/05/04–05/06 • Venue: Hong Kong Convention & Exhibition Centre, Hong Kong • Tel: +852-2804-1500 • Email: xhibit@hkesallworld.com • URL: www.asiansecuritex.com

Intersec Buenos Aires

July 2016

SecProTec East Africa • Date: 2016/07/12–07/14 • Venue: Kenyatta International Conference Centre (KICC), Nairobi, Kenya • Tel: +49-40-710070-51 • Email: stefan.freiberg@planetfair.de • URL: www.secproteceastafrica.com

Exposec • Date: 2016/05/10–05/12 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: international@cipanet.com.br • URL: www.exposec.tmp.br

International Oil & Gas Security Conference • Date: 2016/05/11–05/12 • Venue: The Kia Oval, London, U.K. • Tel: +44-207-111-1615 • Email: cristinar@irn-international.com • URL: www.oilgassecurity.com

Securex South Africa

Security Exhibition & Conference • Date: 2016/07/20–07/22 • Venue: Melbourne Convention & Exhibition Center, Melbourne, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au September 2016

MAY 2016 ● www.asmag.com

• Date: 2016/06/21–06/23 • Venue: ExCel London, London, U.K. • Tel: +44-20-7921-5000 • Email: rachel.eaton@ubm.com • URL: www.ifsec.co.uk

74

ASIS • Date: 2016/09/12–09/15 • Venue: Orlando, Florida, U.S. • Tel: +1-703-519-6200 • Email: asis@asisonline.org • URL: http://securityexpo.asisonline.org

Secutech Vietnam • Date: 2016/09/21–09/24 • Venue: Friendship Cultural Palace, Hanoi, Vietnam • Tel: +886-2-8729-1099 • Email: stvn@newera.messefrankfurt.com • URL: www.secutechvietnam.com

OFSEC • Date: 2016/09/05–09/07 • Venue: Oman International Exhibition Centre, Muscat, Sultanate of Oman • Tel: +968-2478-8476 • Email: info@muscat-expo.com • URL: www.muscat-expo.com/ofsec

• Date: 2016/05/24–05/26 • Venue: Gallagher Convention Centre, Johannesburg, Adria Security South Africa • Date: 2016/09/06–09/08 • Tel: +27-11-835-1565 • Venue: Kongresni Centar, Sarajevo, BiH • Email: info@specialised.com • Tel: +387-33-788-985 • URL: www.securex.co.za • Email: summit@asadria.com • URL: www.adriasecuritysummit.com June 2016

IFSEC International

• Date: 2016/09/07–09/09 • Venue: La Rural Trade Center, Buenos Aires, Argentina • Tel: +54-11-4514-1400 • Email: ezequiel.gorbaran@argentina.messefrankfurt.com • URL: www.intersec.ar.messefrankfurt.com

Summit

IFSEC Southeast Asia • Date: 2016/09/07–09/09 • Venue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia • Tel: +44-20-7921-8127 • Email: Agnius.Kazlauskas@ubm.com • URL: www.ifsecsea.com

Security Essen • Date: 2016/09/27–09/30 • Venue: MESSE ESSEN, Essen, Germany • Tel: +49-201-7244-0 • Email: info@messe-essen.de • URL: www.security-essen.de/impetus_provider/

Safety & Security Asia • Date: 2016/09/28–09/30 • Venue: Halls B & C, Marina Bay Sands, Singapore • Tel: +65-6278-8666 • Email: info@cems.com.sg • URL: www.safetysecurityasia.com.sg/

ISAF Istanbul • Date: 2016/09/29–10/02 • Venue: Istanbul Expo Center, Istanbul, Turkey • Tel: +90-212-503-32-32 • Email: marmara@marmarafuar.com.tr • URL: www.isaffuari.com/en/


Companies in This Issue Products of the Month • BUBL • IC REALTIME • RICOH Viewpoint • AXIS COMMUNICATIONS • CENTRAL STATION ALARM ASSOCIATION INTERNATIONAL (CSAA) • HID GLOBAL • HONEYWELL • SECURITAS ELECTRONIC SECURITY Vertical Solution • MAXXESS SYSTEMS • SINGLEWIRE SOFTWARE

Integrated System • ALLEGION • AMAG TECHNOLOGY • ASSA ABLOY • BRIvO • GALLAGHER • KABA • TDSI • TYCO INTERNATIONAL • vANDERBILT INDUSTRIES IoT • CISCO SYSTEMS • IBM RESEARCH • INFOR • ZEBRA TECHNOLOGIES

Next Issue

Business Talk • EXPRESS SYSTEMS • INTEGRATED SECURITY TECHNOLOGIES • ITQAN • MINUTEMAN SECURITY TECHNOLOGIES • PROSYSTEMS • SECURITYSPECIFIERS • SMART HOME SAFETY EQUIPMENT • UNLIMITED TECHNOLOGY Smart Technology • ARECONT vISION • GENETEC • KRATOS PUBLIC SAFETY AND SECURITY • PELCO BY SCHNEIDER ELECTRIC

Integrated System

Smart Technology

PARKING LOT MANAGEMENT

STORAGE MANAGEMENT SOLUTION

Special Feature

CYBERSECURITY IN PHYSICAL SECURITY SYSTEMS

Vertical Market AvIATION SECURITY

75


Mobotix 6 MP Vandalism Camera v25

Axis P3707-PE Multisensor Panoramic Camera

Features:

Features:

• P rofessional protection: stainless steel with reinforced dome cover • Shock detection: push or impact generates an alarm • Video sensor: MxActivitySensor reduces false alarms • Event recording: onboard SD card and direct to NAS • MxAnalytics: heat map and people analytics • Alarm notification: e-mail, FTP, and VoIP (SIP) • Communication: two-way audio option

• 8 MP with four varifocal camera heads • 360-degree coverage, or combination of overview and zoomed-in views in four different directions • 1080p resolution videos at 12.5/15 frames per second and 720p videos at full frame rate • Supports Axis Zipstream technology for reduced bandwidth and storage requirements • Camera heads can be rotated to support Axis Corridor Format

3xLOGIC VISIX VERA VX-VT-36 Outdoor Thermal Camera Features: • • • • • •

■ 3xLOGIC/U.S. ■ Email: webmail@3xlogic.com

■ Axis Communications/Sweden ■ Email: axis-sap@axis.com

■ Mobotix/Germany ■ Email: info-intl@mobotix.com

2 06x156 array size H.264 compression 4mm. fixed lens Standard analytics included Two-way audio IP66 weather-resistant

Visionic GB-502 PG2 Glass-Break Detector Features: • G lass-break detection technology delivers near-zero false alarm rate • Acoustic pattern recognition technology provides 360-degrees coverage • Maximum detection range for plate, tempered, laminated, wired, coated, and sealed insulating glass: 7.6m • PowerG two-way frequency hopping spread spectrum FHSS-TDMA technology provides wireless robustness and reliability

• L arge transmission range enables repeater-free installations • Visible link quality indication shown on the device reduces installation time ■ Visionic (part of Tyco Security Products)/Israel ■ Email: sales@visionic.com

Nedap AEOS Security Management Platform v3.2

Matrix Comsec Door Controllers With Multi Spectral Sensor

• E nables various integrations with third-party solutions • Improved integral security management platform • Supports latest access control card technologies • Ease of installation with AEOS Blue • Added value by providing better functionality

Features:

Features:

■ Nedap Security Management/Netherlands ■ Email: info@nedapsecurity.com

• • • • • • •

T ime attendance and access control Reads surface and subsurface of a finger Fast and intuitive user identification Works in extreme tough conditions 50,000 users and 500,000 events storage 3.5-inch touch screen Wi-Fi, Ethernet, 3G/4G

■ Matrix Comsec/India ■ Email: more@matrixcomsec.com

MAY 2016 ● www.asmag.com

76

VIVOTEK SD9364-EHL H.265 IR Speed Dome Features: • • • • • •

eal-time H.265, H.264 and MJPEG compression R Smart stream II to optimize bandwidth efficiency 60 fps at 1080p Full HD Vari-angle IR (VAIR) technology 30x zoom lens, 150 meters IR 360-degrees continuous pan and 220-degrees tilt

■ VIVOTEK/Taiwan ■ Email: sales@vivotek.com


Hundure RAC-820PMFV Finger Vein Access Controller

EverFocus 2 MP Full HD Ultra-Low Light Network Camera

SentryMobile S360-BW-G20 Body Worn Camera

Features:

Features:

Features:

• H igh security, using encryption with random code to save finger characteristic • Allows access for 6,000 users with 2 finger vein templates per user • Provides 32 working shifts and 32 siren schedules • Blacklist to prevent unknown usage of lost cards • Built-in TCP/IP communication interface to PC

• • • • • • •

• • • • • •

■ Hundure Technology/Taiwan ■ Email: overseas@hundure.com

1 /2.8 inch Sony progressive CMOS image sensor Full HD 1080p video, up to 60 fps Triple streams from H.265, H.264, and M-JPEG Ultra-low light and true day/night function 3DNR/WDR/2-way audio/defog function supported One push autofocus for remote image adjustment Triple power inputs supported: PoE/12VDC/24VAC

■ EverFocus Electronics/Taiwan ■ Email: sales@everfocus.com.tw

2 MP Maximum resolution: 1920 x 1080 Maximum frame rate: 30 fps Motion detection Automatic white balance Weather rating: IP67 (waterproof)

■ Sentry 360 Security/U.S. ■ Email: info@sentry360.com

Viscount Freedom 9.2B Access Control Platform Features: • T rue IT topology connects and interacts with cloud services • Potential for system breaches is reduced through elimination of control panels • Real-time authentication with Active Directory per card read • Built-in redundancy (no third-party application needed)

• C omplete web services application built on a REST API • Supports FICAM 13.02, FIP201, UL, and more ■ Viscount Systems/U.S. ■ Email: sales@viscount.com

Pelco Optera 12 MP Panoramic IP Camera

Videotec Ulisse2 Full IP PTZ Unit

Features:

• F ull IP PTZ unit for complete management and control of IP ONVIF-S cameras • 60 Mbit/s video stream for 4K cameras • Direct access to third-party cameras via browser for setup and diagnostics as a single IP address • Tested and certified from -40 to 65 degrees Celsius, IP66, and NEMA Type 4x • Sophisticated temperature control and demisting system

• C onstant, seamless situational awareness • Multiple immersive PTZ views at VMS • Zoom in for detailed live view or retrospectively with client-side dewarping • Up to 12-MP resolution for better detail at a distance • SureVision 2.0 for simultaneous WDR and low light performance • 8 Pelco video analytics behaviors ■ Pelco by Schneider Electric/U.S. ■ Email: sales@pelco.com

Features:

■ Videotec/Italy ■ Email: info@videotec.com

Veracity Trinity Directto-Disk Video Storage Features: • S erverless system – direct to storage from IP camera • High-performance megapixel camera recording • Simplified system architecture designed for high reliability • Camera-level failover feature • Ideal for unmonitored or remote access systems • Long archive periods possible for megapixel cameras ■ Veracity/U.K. ■ Email: sales@veracityuk.com

77


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 10 11 INSIDE FRONT COVER, 1 75 53 5 BACK COVER 17 4 79 2 47 8 12, 13 INSIDE BACK COVER 9 7 3 6

ADVERTISER CHENGDU POWERVIEW SCIENCE AND TECHNOLOGY CO., LTD. COMMAX CO., LTD. DAHUA TECHNOLOGY CO., LTD. FOCTEK PHOTONICS, INC. FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. HDPRO CO., LTD. HIKVISION DIGITAL TECHNOLOGY CO., LTD. IDIS CO., LTD. MEERE COMPANY INC. RICOM RIFATRON CO., LTD. SHENZHEN COMMANDER TECHNOLOGY CO., LTD. SIA RIOT ENGINEERING SONY CORPORATION DSBG. SYSTEM LSI DIVISION TAMRON CO., LTD. TECHPOINT INC. VIDEOTEC S.P.A. WEBGATE INC. ZEEANN CO., LTD.

MAJOR ITEM SURVEILLANCE SURVEILLANCE SURVEILLANCE LENS DOME COVER CCTV SURVEILLANCE SURVEILLANCE CAMERA LENS DVR CASING SURVEILLANCE SEMICONDUCTOR CAMERA CHIPSET IP CAMERA / SOFTWARE / VIDEOSERVER DVR CMOS IMAGE SENSOR

COUNTRY CHINA KOREA CHINA CHINA CHINA KOREA CHINA KOREA KOREA CHINA KOREA CHINA LATVIA JAPAN JAPAN USA ITALY KOREA KOREA

E-MAIL dennis@powerview.cn pcy@commax.co.kr overseas@dahuatech.com sales@foctek-lens.com sales@fjsmt.com sales@hdprocctv.com overseasbusiness@hikvision.com sales@idisglobal.com sales@cube-eye.co.kr sales@forecam.com contact@rifatron.com

MAJOR ITEM ALARM

COUNTRY KOREA

E-MAIL overseas@isaso.com

MAJOR ITEM RFID MODULE / LOCK / READER

COUNTRY TAIWAN

E-MAIL promag@gigatms.com.tw

sjw@yjdcase.com eu@luxriot.com newbiz@tamron.co.jp dma@techpointinc.com info@videotec.com support@webgateinc.com sales@zeeann.com

INTRUSION ALARM PAGE NO. 15

ADVERTISER KMT CO., LTD.

ACCESS CONTROL PAGE NO. 31

ADVERTISER GIGA-TMS INC.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

79


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.