A&S #I203 Nov.2015

Page 1

110222-封面台.indd 1

2015/11/11 上午3:06


Nov 2015 ASIA CORNER

PRODUCT EXPLORATION

Modern Public Parking Lots Get Smart

56

P.

Australian Security Continues Steady Climb

76

P.

The security market in Australia is mature; however, compared to other mature markets like in the U.S. or parts of Europe, the adoption of IP, electronic access control, and recurring-monthly-revenue models have been much slower. Despite this, Australia remains a tech-savvy security market with many opportunities for new entrants.

Today’s public parking has become quite different from what we had in the past. Lots that were formerly maintained by staff on duty on a 24/7 basis have given way to smart, automated facilities equipped with advanced video surveillance, access control, and license plate recognition (LPR) systems that are meant to keep the sites secure and easy to use.

SMAHOME

5 Ongoing Smart Home Industry Scene

80

P.

VERTICAL MARKET

Every day there is something new for the smart home. Looking back over the most important news releases in the first half of the 2015, SMAhome outlines the five ongoing industry trends that may change the future of smart home development.

9 Smart Home Startups

82

P.

According to Gartner, startups and small electronics companies spent US$78.3 billion on semiconductors in 2014, representing 23 percent of the total semiconductor market. Jim Tully, VP of Gartner said recently, “50 percent of IoT solutions will come from startups.”

NOV 2015 Ɣ www.asmag.com

Choosing the Right Type of Wireless Systems for City Surveillance

62

P.

16

Apart from deploying cameras, cities must also take into account the best way to connect cameras and other systems with command and control centers. This article discusses some of the available solutions for cities wishing to deploy wireless networks for surveillance.

Contents........................................p.14 Editor’s Note .................................p.18 Application Cases .........................p.20 Products of the Month ..................p.26 Show Calendar ..............................p.84 Show Preview................................p.86 New Products ................................p.88 Companies in This Issue ................p.91


Security 50 for 2015:

a&s International, published by Messe Frankfurt New Era Business

What’s Behind the Industry Shakeout

Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

ISSN 1997-6267

n this issue, we are proud to present the Security 50 report and ranking for 2015. From this year’s ranking, we can clearly see the shakeout of the current industry, which we highlighted in several of our past issues. This time, via Security 50, we are able to support our statements with actual figures. Thanks to the contributions from the top 50, we are able to have a clearer picture of the whole industry.

NOV 2015 Ɣ www.asmag.com

The shakeout in the security industry doesn’t mean the market is not growing. I have been talking to many industry experts that have helped us make some quick conclusions. To begin with, the security market is very fragmented with many vendors specialized in different key technologies and products. Due to the commoditization of security products and the world expansion of some major Chinese brands, mostly in video surveillance, we are now seeing the consolidation of certain brands. This year, it was extra obvious. However, consolidation doesn’t mean the security market is not growing. The market demand is still there, but I would say, the market needs something different from the past. In the past, a simple device could satisfy most needs, but now, the customers might need a solution with some special technologies or customer support, such as video analytics, biometrics, facial recognition, or cloud service, to actually solve their problems. Overall, I would say, the industry is developing in a good direction. But, the companies who can’t come up with something to differen-

18

tiate themselves definitely will suffer. In this year’s Security 50 report, the expansion of some major Chinese brands is also greatly affecting the industry. The top 50 companies are starting to do something different to maintain their worldwide market share. In access control, the situation is a little bit different. The consolidation, is mostly coming from the acquisition of new technologies or expansion to new markets, since the access control market is still very varied by its geographic regions. In addition to the world top four or five brands, it is hard to see other international brands dominate the global market. In the intrusion alarm part, the market is even more fragmented. The brands are only strong in certain countries and regions, but not able to become global leaders. However, if there is explosive growth in the home automation market, it might benefit the global expansion of some brands. Hope you enjoy this year’s Security 50 report. You can also find the report and ranking online, please check http://www.asmag.com/rankings/ or scan the QR code below.

中華郵政北台字第1571號 執照登記為雜誌交寄 Parson Lee Joseph Lee John Shi

Senior Consultant Consultant Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director/Publisher General Manager

Editorial

General Press Jill Lai Alf Chang Eifeh Strom William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin

Editor-in-Chief Senior Consultant Senior Editor Reporter Reporter Reporter Reporter

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu

Circulation & Subscription

Michelle Shih

Officer

michelle.shih@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Product Manager

jessica.yang@newera.messefrankfurt.com

Trade Fair Manager Manager Project Manager

echo.lin@newera.messefrankfurt.com peggy.wu@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com

asmag.com

Jessica Yang Secutech

Echo Lin Peggy Wu Eva Tsai

International Advertising [Headquarters]

Juihui Lin Kay Yang Audrey Fang

Manager Operation Officer Coordinator

juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha

USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam

bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2015 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

jill.lai@newera.messefrankfurt.com


Geutebruck Enhances Security at Kunstmuseum Singen in Germany

To view the most updated and complete content for application cases, please visit the “Vertical Markets” section of our website at www.asmag.com, or scan the QR code. For more information, contact as-pr@newera.messefrankfurt.com

APPLICATION CASES

Geutebruck surveillance systems have been used to secure many renowned cultural institutions. Now, it protects Kunstmuseum Singen, one of the largest municipal art museums located near Lake Constance, Germany. Centrally located within the city, its 1,000-squaremeter visitor and exhibition space houses rotating exhibitions that attract visitors from the four-country region. The museum’s security concept was modernized as part of renovations done in 2014. The new Geutebruck video system, which extends over two floors, was put into operation at the reopening. The setup included cameras that are attached to cable trays using magnets, allowing it to follow along the course of the exhibits which can change up to five times per year. Wherever they are set up, all images are made available to the museum guards centrally, providing an attractive yet useful solution.

Bosch Security Systems Secures Latin American Conference Center

IDIS Delivers Monitoring Solution for Park Grand Paddington in London NOV 2015 Ɣ www.asmag.com

Park Grand Paddington, part of the Shaftesbury Hotels property group in London, wanted to upgrade their existing analog surveillance system. Their aging cameras could not provide reliable evidence in the event of an incident and the system required considerable external support and maintenance. A centralized IDIS DirectIP HD surveillance solution was installed featuring

20

two 32-channel NVRs, 64 full-HD dome cameras, multiple refuge call points, integrated alarms, network equipment, and IDIS client software in an integrated package. The system’s plug-and-play functionality and auto-configuration dramatically reduced installation time. It also provides long-term storage capacity, while enabling rapid retrieval of high-resolution images, with minimal maintenance, ensuring a low cost of ownership. Centralized functionality allows every IP camera to be controlled without individual configuration, while supporting simultaneous live-view, record, playback, remote access, and audio/video back-up. Shaftesbury Hotels is already extending the IDIS solution to a second hotel.

Bosch Security Systems has modernized the video surveillance and fire detection systems of one of the biggest Latin American conference centers, Corferias in Bogota, Columbia. The center added 150 IP cameras to its original 100 analog video cameras, which constantly monitor the entire 50,000-square-meter compound, along with new modular fire panels. The Bosch video management system (BVMS) controls the cameras and works with the video recording manager and the automatic network replenishment technology to ensure that video records are saved locally and keeps video footage available at all times. The operators can remotely manage the


*

APPLICATION CASES

camera system or stream live as well as recorded footage via the BVMS and the video security mobile app. They can also integrate and centrally operate video surveillance, fire detection, and third-party security features through the Bosch building integration system.

Assa Abloy Aperio Secures Student Accommodation in East Anglia Assa Abloy Aperio was chosen as the access control solution at Crome Court, the newest student accommodation for the University of East Anglia, U.K. The full integration of Aperio with the Gallagher Command Center provides the university with a cost-effective solution that is suited to doors which require some level of security. “Unlike other systems, Aperio provides audit trails online, allowing for the real-time monitoring of doors,� said Jason Boyce, Sales Manager at Gallagher. “In addition, the fact that Gallagher and Aperio systems can operate with the same data on the card has allowed for a tighter, seamless integration, which saves the customer money, as they do not have to code cards twice.�

Hikvision Surveillance System Protects Bespoke Vehicle Company Hikvision Digital Technology and their South African partner Sensor Security have successfully completed the implementation of an IP surveillance system to protect GRW’s bespoke vehicle manufacturing premises. Surveillance of the large facility and protection from unauthorized access were key security concerns as manned patrols of the perimeter had proved ineffective. The new system features full HD real-time video, IP66 vandal-proof housing, true day/night operation, digital WDR, as well as 3D DNR. “The integration of analytics with the Hikvision Smart IP surveillance cameras is a significant added advantage, flagging alarms only when intrusion occurs within the specified range,� says Edmund Casaleggio, Sales Executive at Sensor Security. “We did not need to use alarm inputs and outputs to connect passives and actives on the DVR/NVR, and this will save significantly on future maintenance of the system. It also reduced installation time significantly.�

Fluidmesh Networks Upgrades Willow Lane Business Park Security in UK

NOV 2015 Ć” www.asmag.com

Milestone Systems Used in Texas School District Security Upgrade Milestone Systems’ open platform IP video management software (VMS) is the flexible foundation for continuing expansion

22

by the Mission Consolidated Independent School District (Mission CISD) in South Texas, U.S. Their previous analog systems had too many limitations that hampered investigations into incidences. The open platform software offered much flexibility and choice and the Milestone Federated Architecture allows for remote access of the system. Arecont Vision megapixel video cameras were also installed as they can provide high-resolution videos and monitor larger areas. As of early 2015, Mission CISD operates more than 600 IP cameras and 260 analog cameras, with encoders to convert analog video to digital. There is a dedicated server at each campus, with multiple servers in select locations. Perimeters are protected around each campus, and cameras are deployed at points of entry in school gymnasiums, cafeterias, libraries, hallways, and playgrounds.

When Willow Lane Trading Estate in Surrey, England, was required to upgrade their analog video surveillance system, the business park chose the wireless solutions from Fluidmesh Networks. The new system needed to be wholly wireless and designed to enable substantial expansion. The system employed Fluidmesh 2x2 MIMO-based wireless radios designed for back hauling mission-


SECURITY 50 2015:

SPECIAL R EPORT ..............................................................................................................................

FINDING THE

RIGHT FIT AFTER INDUSTRY SH A By Jill Lai

a&s reviews 2014 & 2015 financial reports of 50 worldwide leading security manufacturers. Global market demand is still high; however, multiple factors have caused the security industry to shake up. This year’s report shows how Chinese companies have risen and how its opponents are ready for the competition. The new market order is soon to come. Sponsors

NOV N NO OV 220 2015 01155 Ɣ Ɣ www.asmag.com www.asmag.com

30


.............................................................................................................2015 SECURITY 50 RANKING

AKE-UP

lobal market demand for security equipment reached another historical height in 2014 and 2015. Terrorist attacks and civil unrest keep pushing end customers in various market sectors to invest in security equipment for safer environments. According to IHS 2014 report, the global market size of video surveillance and access control was estimated to be US$15 billion and $3.5 billion in 2014. Furthermore, these markets are forecast to grow to approximately $23.6 billion and $4.9 billion annually by the end of 2018, respectively. The global demand for security remains; however, multiple factors have remodeled the security industry landscape. Two big Chinese companies have been leveled up to the international stage, while their opponents have been left behind or forced to branch out. Meanwhile, the changeable global economic and political status has also made future growth for many companies uncertain.

TOP 50 GROW, SHADOWED BY MULTIPLE FACTORS The top 10 companies with the highest sales revenue in 2014 remain the same. The biggest change is brought by Hikvision Digital Technology and Dahua Technology, both of which grew quite enormously. Hikvision grew 57.5 percent moving up in the ranks to number 2, replacing Bosch Security Systems. Dahua grew 35.5 percent and surpassed the Global Technologies Division of Assa Abloy to rank fifth. Safran and Assa Abloy still maintained healthy growth with their new innovations for access control and high demand from national projects. On the other hand, Samsung Techwin weakened a bit in 2014. After the acquisition this year, the company’s Korean operations was renamed as Hanwha Techwin. Axis Communications’ ranking was influenced most from the growth of Tyco Security Products and FLIR Systems, rounding out the top 10. Looking at the financial reports of the top 50 companies in 2014, companies maintained mild growth but a major reduction of net profit was observed in many companies in 2014 and also the first half of 2015. The

We see a rising need for highly advanced products that enables interconnected solutions. The Milestone Husky is an advanced futureproof intelligent NVR that enables our partners to deliver the perfect solutions asked for by our mutual customers. Peter Biltsted, MEA Director, Milestone Systems

31


SPECIAL R EPORT .......................................................................................................... S

The security industry has had quite an eventful year so far, with several incidents prompting increase in demand for integrated solutions. The market has also seen signs of consolidation, with a number of large mergers and acquisitions. With new technologies like the Internet of Things and initiatives like smart cities, the industry looks poised for more activity in the coming years. By Prasanth Aby Thomas

GLOBAL

NOV 2015 Ć” www.asmag.com

RUSH TO BE SMARTER AMID RISING SECURITY CONCERNS 44


............................................................................................................. 2015 SECURITY 50 RANKING

mong the numerous sentiments that have floated across the globe this year, a significantly common theme was “fear.” To be more precise, an increase of it. A quick scan of global media reports over the year would show reasons for it too. From the rise of terrorism and war-induced migrant crisis to modern technological developments that have spiked privacy concerns, 2015 has seen the world struggling to come to terms with the fact that security is indeed an issue that has to be dealt with. This is evident in market analyses too. A recent report from Transparency Market Research showed that the global physical security market will expand at a healthy CAGR of 14.9 percent from 2013 to 2019, driven by growing security concerns around the world and accelerating budget allocation for physical security by governments.

Tristan Haage, CSO, Mobotix

Hagai Katz, Senior VP, Business Development and Marketing, Magal Security Systems

INCREASED SECURITY CONCERNS A CUMULATIVE IMPACT The security industry is not oblivious to the rising safety concerns and its potential to boost market demand. Major security solutions providers, who have all seen their revenues rise this year, acknowledge the fact that there is an increased awareness on the need to be protected that has boosted demand for sophisticated security systems. “Certainly the continued high threat level in many of our major markets such as the U.S., Middle East, and Europe is resulting in the continued review of security policies and systems, particularly within the corporate enterprise and public sector spaces,” said Brian Song, MD at IDIS Europe. “This is compounded by many high profile cyber-attacks, and so organizations are looking for a very high Incidents such as the migrant crisis in Europe have spiked global demand for certain specific security solutions.

William Ku, Spokesman and VP, Brand Business Division, VIVOTEK

Leon Langlais, Senior Director, Growth Markets and Regional Strategies, Tyco Security Products

level of resilience from their network surveillance solutions.” Hagai Katz, Senior VP of Business Development and Marketing at Magal Security Systems listed the concerns in more concrete terms. He pointed out that issues range from serious problems like the continued militant activity in African countries, immigration concerns in Europe, and terrorist concerns in the Middle East to more isolated incidents like a drone intrusion into the White House and escape of a drug baron from a Mexican prison. William Ku, Spokesman and VP of the Brand Business Division at VIVOTEK agreed. “European migrant crisis and ISIS terrorism increase the new infrastructure and new government projects in the European and Middle East countries.” Others point out that it is in fact difficult to pick up individual events that have sparked a change in the market, ascribing it more to an aggregated effect of fragmented incidents across the globe. “While no single event can be cited as the cause of major shift, we are all well aware that unfortunately, the world is becoming more insecure due to a range of political, economic, and cultural factors,” said Bodil Sonesson, VP of Global Sales at Axis Communications. “But, surveillance technology has also been improving, with better quality images, smart analytics, etc., thereby helping society to better monitor environments, solve incidents, and prevent attacks.” But it’s not just increased or improved security solutions that are in demand. Along with security concerns, most customers have to contend with the weak global economic outlook; hence, what they look for is more customized solutions that can offer better ROI.

45


SPECIAL R EPORT .......................................................................................................... S

The Internet of Things (IoT) has become quite a phenomenon, as more and more networked devices are connected to the Internet and generate valuable data for users. Security players, meanwhile, have detected this trend and are adapting themselves to IoT, making products that are more networkable, integrative, and user friendly. In this article, some of our Security 50 companies discuss their ideas and thoughts on IoT, and how they have responded in the midst of the IoT craze.

IoT

By William Pao

SECURITY PLAYERS OPEN THEIR ARMS TO NOV 2015 Ć” www.asmag.com

IoT

50


............................................................................................................. 2015 SECURITY 50 RANKING

he term Internet of Things (IoT)was first coined by British entrepreneur Kevin Ashton back in 1999 to describe the concept of a globally connected network of RFID devices. Today, the connected vision has become quite a reality as IoT has found its way into different parts of our lives, from safe cities to smart buildings. In fact, according to a recent forecast by Gartner, the number of connected devices in use will reach 25 billion by 2020.

Arjan Bouter, Head of Sales, Nedap Security Management

INTELLIGENCE

SECURITY AND IoT What does all this mean for security players? For starters, physical security is intricately tied to IoT — this is especially the case after security’s migration to IP, which allows devices to be all integrated on the Internet. “The security product is a part of IoT,” said Allen Liu, Product Manager at Dahua Technology. “Video surveillance, mobile devices, access control, and alarm systems are all tied to loT, and we are surrounded by them in our daily life.” “Security devices will be tied to the IoT as ‘sensors’ in the same way that other devices like phones, cars, and refrigerators are sensor sources — all bringing data to inform our lives,” said Lars Nordenlund Friis, VP of Incubation and Ventures at Milestone Systems. “The single common thread with all these technologies is connected components working together as an efficient, integrated whole.” Integrating various networkable devices on the Internet brings many benefits. These include enhanced security, better intelligence, and improved user experience.

percent of people who are aware that someone is watching them typically stop whatever wrongful activity they are engaged in. A horn speaker can make intruders or suspicious characters very aware that they are being observed.”

Martin Gren, Co-Founder, Axis Communications

Allen Liu, Product Manager, Dahua Technology

IoT brings much more to security than protecting lives and assets. The amount of good data generated by security devices can be extracted and analyzed to drive business intelligence. In retail, for example, cameras installed in stores and supermarkets have found their roles expanding from preventing theft to studying consumer behavior — what aisles shoppers visit more frequently or which way they look at a particular spot. This allows operators to make sales and marketing decisions accordingly. “To be successful, a deployment using the IoT needs to do more than just collect a data. It needs to have a concrete way to

ENHANCED SECURTY

When integrated, video surveillance, access control, intrusion alarms, and other systems add layers to security, making premises less vulnerable to intrusion and threats. “Traditional access control systems can be cracked by forged IC cards or fake fingerprints. Now security industry pays more attention to integrate video surveillance with burglar alarms, access controls, and other parts together,” Liu said. “With a camera that is only performing video surveillance it is limited because you really can’t talk to people. But if you add an integrated horn speaker, you can actually communicate to a person — for example, if someone is loitering, or in an area they shouldn’t be, or otherwise acting suspiciously. And you can do it through a single system that manages the video and not have to switch between different systems or interfaces,” said Martin Gren, Co-Founder of Axis Communications. “A recent study says that 74

Security devices will be tied to the IoT as sensors, all bringing data to inform our lives.

51


Get Smart BY William Pao

Today’s public parking has become quite different from what we had in the past. Lots that were formerly maintained by staff on duty on a 24/7 basis have given way to smart, automated facilities equipped with advanced video surveillance, access control, and license plate recognition (LPR) systems that are meant to keep the sites secure and easy to use.

NOV 2015 Ć” www.asmag.com

he parking management market has grown over the years due to a rise in vehicles across the globe, and the trend is set to continue. In a recent report by MarketsandMarkets, the global parking management market is estimated to grow from US$5 billion in 2014 to $9.2 billion by 2019, translating into a compound annual growth rate of 12.8 percent. Amid this increase in size, parking operators are constantly looking for ways to cut down operating cost and manpower to stay competitive in the market. As a result, they turn to technology, which helps them achieve two primary objectives: security and more efficient management.

56

SECURITY ENHANCEMENT Public parking lots are prone to theft and other criminal activities during nights or off-hours. “According to US government statistics, more than 7 percent of the nation’s violent victimizations and more than 11 percent of property crimes takes place in a parking facility,� said John Mosebar, VP of Marketing at Aiphone. “And surveys show one-third of drivers cite security as a top factor in choosing where to park their vehicles.� Advanced video surveillance, access control, and license plate recognition (LPR) technologies can help

*

Modern Public Parking Lots


C M Y K #

&,($0"/-' % + . ) !.

monitor who goes in, what happens in the lot, and who gets out. When combined with LPR, the parking barrier can deny suspicious vehicles at the outset. “The barrier can easily be connected to either an electric switch contained inside a license plate recognition camera or a separate controller which can activate the barrier no differently than the method by which doors are controlled for buildings,� said Larry Reed, CEO of ZKAccess. “License The use of advanced video surveillance, access control, and LPR technology can help monitor who goes in or out and what happens in public parking lots. plate recognition software can be programmed with ‘blast lists of suspicious plates,’ which will then send a notification to a designated authority.� LPR, meanwhile, can combine with facial recognition to see whether people Œ � Ž coming in and getting out on the same vehicles match. “By LPR technology and snapping pictures, the system can easily compare the vehicle plate number with the driver’s face,� � � ‘ said Pauline Yen, Director of Œ Todd Brodrick, Southwest US Director, Pelco by Schneider Sales and Marketing at Afidus. Electric � Maarten Mijwaart, GM, Nedap Identification Systems “This is to make sure the driver Ž John Mosebar, VP, Marketing, Aiphone � Larry Reed, CEO, ZKAccess is the vehicle’s owner, not a thief.� � Dave Tynan, VP, Global Marketing and Sales, MicroPower If something happens inside the lot, Technologies ‘ Pauline Yen, Director, Sales and Marketing, Afidus for example drivers being attacked or cars being stolen or damaged, the victim can turn to video surveillance, which and changing environments. To get is an effective tool for monitoring and the best optical performance you documenting incidents. need to have a chipset technology “In commercial applications and educational that addresses the key environmental facilities, identifying the pinch points of traffic challenges: WDR, low-light performance, movement is key in gathering specific forensic and anti-blooming,� said Todd Brodrick, evidence of auto descriptions, license plate detail, Southwest US Director at Pelco by and potentially, even individual profiles. Having Schneider Electric. “Depending on lens surveillance at these ingress/egress points captures size, the camera should be mounted inbound suspicious targets as well as outbound perpetrators. Auto overhead or to the side with line of site break-ins can be captured and time/date recorded with surveillance, at 30 degrees horizontal with a detection and the detail of outbound vehicles and identity can be validated in range from 15 feet to 100 feet depending the United States with state license bureaus,� said Dave Tynan, VP of on lens size.� Global Marketing and Sales at MicroPower Technologies. Added Tynan: “Options such as “The most recommended cameras for this type of installation integrated solar and wireless surveillance are high-resolution/HD cameras that can adapt to challenging cameras can be very quickly deployed.

57

*


Choosing the Right Type of

Wireless Systems for City Surveillance By Israel Gogol, Freelancer

The need to prevent crime, detect events, and investigate them has always been a concern for cities. The availability of cheaper and better cameras allows cities to deploy cameras, license plate recognition (LPR), and other systems to ensure the safety of citizens. Apart from deploying cameras, cities must also take into account the best way to connect cameras and other systems with command and control centers. This article discusses some of the available solutions for cities wishing to deploy wireless networks for surveillance.

WIRELESS OR FIBER

NOV 2015 Ɣ www.asmag.com m

One of the first questions rega regarding network design for safe city proj projects is the availability of fiber optics or wireless networks. “The choice between fiber and wireless varies widely by cit city. In some cases it is 100-percent fibe fiber, in others, it is 100-percent wireless wireless. If fiber is already at a location, the cost of using it is low, however, if it is not genera available, then wireless is generally chosen as it is the most econom economical and fastest to deploy,” explained Greg Friesen, VP of Product Managem Management technolo at Dragon Wave. “Both technologies carry standard-based Ethernet ttraffic, and can fully interop with one aanother. ploy oyed ed architecture ultim The depl deployed ultimately selecteed based base ba sed upon upon the the h budget is selected servi vice ce levels lev eveel of the and required service municipality.” rsee sev There are of cours course several othe ot herr factors he fact fa ctor o s that or that a affect afffectt this other deecisio on. For For example exaample if the ex decision. a pl ap plicattiio on is intended inten application fo or live lilvee monitoring monit ittoring for rec ecor ordi or ding di ng and and d or recording post po s -eevent investiinv post-event gaati tio on, the location on, on gation, of the the cameras cam of and an nd special spec sp pec ec and circ ci rcum um um circumstances of the the he area of ((e.g., (e.g (e e g., densely po p opu p populated area ar ea with

62 6 2


high interference or old building which cannot be changed to install infrastructure). In practice, in most cases a combination of the two is being deployed with a slight advantage for wireless networks. “For the more common ‘open space’ application, we are seeing both fiber and wireless being used to cover different parts of the city. It is not often an ‘either-or’ decision although we can point to a handful of cases where the city has either a fiber-only network or wireless-only network,” said Pervez Siddiqui, Director of Strategic Markets at Genetec. “There are some cities which have built their own fiber rings or lease this infrastructure from third-party providers like telecom companies. Some more progressive cities are breaking down silos within their city government to leverage the fiber backbone for their traffic systems in central business district (CBD) areas. As far as wireless is concerned, many cities have built out wireless networks. More often than not, we see mesh networks at the street level and wireless point-to-point or fiber for backhaul. In the more mature markets, we see a lot more wireless outside of the CBD areas.” Olivier Nitre, VP of Sales and Products for Video Security and Information at Teleste voiced a similar opinion. “In the large cities of the western countries, the wireless is rather used for the last mile (or last hundred meters) most frequently because there is already some sort of pre-existing network (or at least some easy way to install/use fibers). As for the small-sized cities, a fully wireless network can frequently be deployed,” he explained. “The best way to balance both aspects, the cost effectiveness of wireless and the bandwidth advantage of fiber, is probably to use a fiber trunk everywhere possible, and use pointto-point links — short distance — to aggregate cameras to the system,” Nitre added.

WHAT TYPES OF WIRELESS TO CHOOSE?

The most significant disadvantage with Wi-Fi results from the fact that it uses an unlicensed spectrum.

Aluisio Figueiredo, CEO, Intelligent Security Systems

Wireless networks are cheaper to deploy than a wired network, however they come with several constraints. Bandwidth can fluctuate; some network topologies like mesh networks require a high degree of technical expertise and the growing demand for bandwidth (due to ever-increasing camera resolutions) can make a wireless network under-sized during the system’s life cycle. The choice of the right infrastructure is therefore very important. “We see three tiers in wireless communications for video surveillance. Tier 1 refers to low-end, low-cost solutions based on Wi-Fi standards. Their major benefit is their relative low cost which makes them a favorite among integrators who can earn good margins selling them. This type of solution is mainly suitable for short-range point-to-point communications where the number of cameras connected is relatively low,” said Yossi Nissan, Director of Product Marketing at Radwin. “In some regions, we see that mesh-networks are more popular. This is a mid-tier solution suitable for linear installations (such as avenue); mesh architecture allows data to flow through the network even if one of the links fails. However, it has major downsides: it has unpredictable latency resulting in variable video quality and it is very difficult to configure properly and requires a high level of expertise,” Nissan added. “In the high-end part of the market are the point-to-multipoint products that offer guaranteed bandwidth per camera site. These are the solutions that guarantee that city surveillance is put to good use. The cameras and the video management software (VMS) system are the ones that determine the video quality; however, if you invest millions in cameras but choose Fiber optics has the advantage of greater bandwidth, but is more difficult and costly to install compared to Wi-Fi, often resulting in combination fiber-wireless solutions.

Greg Friesen, VP, Product Management, Dragon Wave

Yigal Leiba, CTO, Siklu Communication

63


How Alliances Benefit Security

Systems Integrators

Strategic alliances are relationships between businesses meant to create value in a mutually beneficial way. In the security industry, alliances involving manufacturers are common, but for integrators there are only a handful of alliances. Integrator alliances are a good way for mid-size integrators to grow and differentiate themselves from “big name” brands. We reached out to them to learn what they see as the major benefits of this form of cooperation. BY Israel Gogol, Freelancer

NOV 2015 Ɣ www.asmag.com

strategic alliance is a relationship linking two or more organizations meant to create and capture value through mutually beneficial sharing of technologies, skills, products, markets, etc. Alliances can turn potential competitors into allies and help small and medium-size players leverage the size of the whole network. Airline alliances such as Star Alliance or One World are quite well-known. In the security industry, partner programs are the most common example of alliances. Either in the form of a technology partnership where different companies work together to develop a new product (e.g., an analytics company working together with a VMS vendor) or a channel partnership — of a manufacturer working together with distributors. a&s reached out to two integrator alliances to hear about their thoughts about this form of cooperation and its usefulness for systems integrators (SI). We spoke with Bill Bozeman, President of PSA Security Network, and Alan Kruglak, President of National Security Integrators and Principal of Genesis Security Systems. PSA Security Network is the world’s largest electronic security cooperative. As a cooperative, it is owned by the SIs themselves. The company is owned by 130 integrators

68

In the U.S., most members of integrator alliances are mid-sized companies with revenue of US$8 to $12 million a year.


in the U.S., Canada, Mexico, and Puerto Rico. National Security Integrators is a network of 15 integrators in the U.S. and Canada. Even though these alliances are different in size and governance structure, the benefits they see are similar.

Bill Bozeman, President, PSA Security Network

THE BENEFIT OF ALLIANCES There are three approaches to acquiring new capabilities: build, buy, or borrow. Businesses can acquire new

capabilities through internal development using their own internal resources or using consultants (build); they can acquire another company that has the desired capability (buy); or they cooperate with other firms to build the new desired capabilities (borrow). Building your own capabilities requires resources which might be out of reach for small and mid-size integrators, and even if the company has money, buying another business often leads to acquiring more than is wanted or needed. Alliances are therefore a sensible alternative for an integrator wanting to access the capabilities they need, whether to extend their reach or benefit from group buying size.

WHEN DO INTEGRATORS SEEK ALLIANCES? Alan Kruglak, President, National Security Integrators

In the U.S., most members of integrator alliances are mid-sized companies with revenue of US$8 to $12 million a year. In this stage, many companies reach a point where further growth/development is constrained by specific capabilities difficult to develop on their own. For security integrators developing markets in new locations is the main driver for seeking alliances with other integrators. Dealing with national accounts is lucrative for integrators but can be a stretch of their financial abilities and personnel.

69


The security market in Australia is mature; however, compared to other mature markets like in the U.S. or parts of Europe, the adoption of IP, electronic access control, and recurring-monthly-revenue models have been much slower. Despite this, Australia remains a tech-savvy security market with many opportunities for new entrants. BY Eifeh Strom

U NOV 2015 Ɣ www.asmag.com

nlike most countries in the world, crime rates in Australia are actually on the decline. In fact, despite the hostage situation at a Lindt Cafe in Sydney at the end of last year, Australia rose to number 9 on the Institute for Economics and Peace’s Global Peace Index, up four spots from the previous year. “Essentially, Australia has been seen as a more secure market,” said Naz Circosta, MD of Australiabased Ness. “The risks haven’t been as bad. There haven’t been as many muggings or other types of violence like in the U.S. or other places.” Low levels of crime make security less of a crucial investment than in countries where security and surveillance measures are more critical. Yet, this is not the reason that adoption rates of technologies like IP-based surveillance and electronic access control have been slower than in the U.S. and Europe. Factors such as high labor cost and Internet infrastructure are what Adam Storoschenko, GM of O-Lin Security, says has caused IP adoption to be slow.

76


“Australia is an expensive country to live in. High labor charges is one result of the cost of living here,” Storoschenko said. “As labor charges are high, by replacing a complete analog system, including your coax cables, etc., it can turn out to be a very expensive option to rewire complete buildings with networking cable.” Aside from cost and infrastructure, Circosta offered another reason. “In Australia, we actually trail the U.S., in terms of trends, by probably five years. For example, automation is just beginning to happen here. People are only just beginning to think about it. It’s certainly not the technology because in many respects when we [Australia] do things we do them better than the rest of the world.” Regardless, many security players in Australia say that the security market right now is very strong. According to Peter Grimshaw, National Sales Manager at Central Security Distribution (CSD), “The security industry in Australia is probably the strongest it’s been in a long time.” Scott Fraser, GM for Australia and New Zealand at Salto Systems shared a similar belief, saying, “There’s a bit of a shift from the reliance on mining into other areas of the market now, but the market is still quite good.”

AUSTRALIANS KNOW THEIR TECH Despite slower adoption of new technologies, it does not mean that Australians are not tech savvy. “I think Australians are fairly progressive in terms of technology,” Fraser said. Specifically speaking on access control, Fraser pointed out that while Australians may not be quite as quick to accept technologies such as biometric fingerprint locks as they are in say Korea, overall, they are still very accepting of new technology. Marc Chan, Business Development Manager for Security in APAC at FLIR Systems pointed out, “Australia is an important market for us because it’s a technologically advanced country. It’s receptive to new technologies, for instance thermal technology — they were one of the early adopters for it.” When it comes to buying, Chan added, “Australians make very informed decisions. Customers know a lot about what they’re buying; they’re not just blindly buying. A lot of them actually know the technology pretty well. Newer technology takes some time for them to absorb, but in general they are pretty informed.”

Did Somebody Say NBN? Australians and non-Australians are all eagerly awaiting the roll out of the National Broadband Network (NBN), which promises to deliver Internet speeds of up to 25 megabits per second regardless of location in the country. When it finally is implemented, Internet speeds and bandwidth availability will exponentially improve nationwide. However, like most government projects, the NBN rollout has been met with delays and more delays. The reality of the NBN could be on the near horizon though. Recently, the Australian government announced that the first of two new NBN satellites was launched on October 1 of this year. These satellites will “provide high-speed broadband to even the most remote areas of Australia,” according to a news release from Australia’s Minister of Communications.

THE GREAT IP PUSH Most security players in Australia will attest that the current network infrastructure, while not nearly as strong as it should be, is plenty good enough for an IP system, despite slow adoption. However, the trend in Australia now is definitely going to IP and the eventual roll out of the National Broadband Network (NBN) will hopefully only further drive IP growth. In fact, some of the largest security distributors in Australia say that in terms of sales between 80 and 90 percent go to IP now. While new projects are using IP-based solutions, retrofits and upgrades are still likely to hang on to legacy systems. This is where hybrid systems and HD-over-coaxial solutions come into play. While some believe that HD-over-coaxial solutions could be a good fit for the Australian retrofit market, most believe that with easy plug-and-play IP solutions available, taking the plunge and going IP is still the better option.

INFRASTRCUTRE LIMITATIONS While the current infrastructure is “good enough” for an IP system, where it really limits security is with the cloud and remote monitoring.

The eventual roll out of the National Broadband Network is expected to greatly enhance bandwidth limitations across Australia, thereby increasing the adoption of IP, cloud, and service-based models. 77


FEATURE

Year 2015 H1 News Review

5

Ongoing Smart Home Industry Trends TREND 1

Non-stop M&As in Key Components It is said no one single company can have a complete smart home solution. The same is said about the key component industry. As smart home is one of the main applications of the Internet of Things (IoT), key component leaders have been aggressively arming themselves in the connected home. Acquisitions may be the fastest method to get critical technologies. • Intel to acquire Lantiq; advancing the connected home (February 2015) • Silicon Labs acquires Bluegiga (February 2015) • NXP and Freescale announce US$40 billion merger (March 2015) • Avago Technologies to Acquire Broadcom for $37 billion (May 2015) • ams acquires CMOS sensor business from NXP (July 2015) • ARM expands IoT security cpability with acquisition of Sansa Security (August 2015)

NOV 2015 Ɣ www.asmag.com 80 mySMAhome.com September/October 2015

80


TREND 2

Improving Communication Plight

Interoperability is a headache in smart home. Despite the fact that there are still no solutions for this issue, protocols and standards bodies have been aggressively offering solutions to combat these problems. • Bluetooth SIG announces formation of Bluetooth Smart Mesh Working Group (February 2015) • LoRa alliance officially debuted for IoT and M2M (March 2015)

TREND 3

• Apple becomesa promoter member of Bluetooth SIG (June 2015) • Bluetooth reveals standardization of mesh and latest BLE applications (June 2015) • Thread wireless networking protocol now available (July 2015) • Eddystone, an open, scalable BLE beacon format by Google (July 2015)

TREND 4

MESH

TREND 5

The Battle of IoT Ecosystems Continues

Cross-industry Cooperation for Better Chances

More Asian IT Bigshots March Into Smart Home

The IoT ecosystem market is complex with multiple layers and hundreds of players, including device vendors, communications service providers, IoT platform players, software vendors, and IT services providers. Choosing sides may be an issue for most smart home players.

The industry is in consensus that we are in the early stage of smart home. While waiting for mass market awareness, smart home pros are exploring every possibility to promote and sell their solutions. DIY products can be a good add-on for the professional installation market. Connected home devices can also be smart for other markets.

With the growing saturation of IT or 3C markets, Asian bigshots are looking for the next market — smart home is one of the choices. To expand beyond the image of just being a device/hardware manufacturer, some Asian players are recognizing software as a key of the connected home.

• Nest refreshes entire product line; more than 9,000 developer partners using ‘Works with Nest’ program (June 2015) • Icontrol Networks enters Israeli market with Bezeq Partnership, using Piper for smart home platform (July 2015) • IcontrolOne, new cost-effective home automation solution for independent dealers (July 2015) • ADT enriches smart security ecosystem with Nest partnership (July 2015) • Tyco Security Products, Alarm.com partnership extends interactive services to commercial market (July 2015)

• Asus debuts smart home series, using Zigbee (June 2015) • Msi upgrades Panocam with night vision and launches Cubecam (June 2015) • Sunix Iolife, a gateway solution for IoTlife (June 2015) • Apacer introduces ApacerCloud as an integrated service platform (June 2015) • Acer Byoc works with Marvell, MTK, Realtek, Ubuntu for IoT development (June 2015)

• Smarthings and Samsung announce a new open software for IoT ecosystem (May 2015) • Samsung announces ARTIK platform of IoT devices and applications (May 2015) • Broadcom WICED platform supports Homekit Ecosystem (May 2015) • Google announces new OS – Brillo (May 2015) • Open Interconnect Consortium announces new members and standards (July 2015) • Microsoft joins the Allseen Alliance (July 2015)

You can see all listed news details at www.mysmahome.com

September/October 2015 mySMAhome.com 81

81


C M Y K #

&,($0"/-' % + . ) !.

Companies in This Issue Products of the Month • SALTO SYSTEMS • SECURITECH • ZKACCESS Product Exploration • AFIDUS • AIPHONE • GOOSAFE SECURITY CONTROL • MICROPOWER TECHNOLOGIES • NEDAP IDENTIFICATION SYSTEMS • PELCO BY SCHNEIDER ELECTRIC • ZKACCESS

Next Issue

Business Talk • NATIONAL SECURITY INTEGRATORS • PSA SECURITY NETWORK Vertical Market • DRAGON WAVE • GENETEC • INTELLIGENT SECURITY SYSTEMS • RADWIN • SIKLU COMMUNICATION • TELESTE Special Report (Security 50) • ALLEGION • AVIGILON • AXIS COMMUNICATIONS

• • • • • • • • • • • • • •

COMMAX DAHUA TECHNOLOGY EVERFOCUS ELECTRONICS EVERSPRING INDUSTRY IDIS EUROPE MAGAL SECURITY SYSTEMS MILESTONE SYSTEMS MOBOTIX NEDAP SECURITY MANAGEMENT SYNECTICS TYCO SECURITY PRODUCTS VERINT SYSTEMS VICON INDUSTRIES VIVOTEK

Product Exploration

Vertical Market

PERIMETER SECURITY

OIL AND GAS

Special Report

Business Talk

REVIEW AND PREVIEW OF WORLD SECURITY MARKETS

MERGERS AND ACQUISITIONS

91

*


Global Brand. Local Footprint. With professional recognition and 20+ years experience, Messe Frankfurt New Era Business Media (MFNE, formerly A&S Group) is regarded as a well-known and trusted partner for the security and smart home industry. MFNE provides optimal marketing options in both global and regional markets to meet the needs of security players.

Europe Market Asia Market

Global Market

mySMAhome.com

International Security Expo

14 a&s Magazines 6 digital media platforms Secutech in 3 cities around the world 5 GDSF (Global Digital Security & Solutions Forum) in 9 cities

Brand yourself with our global reach of the integrated marketing network.


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 15

ADVERTISER BEIJING BLUESKY TECHNOLOGIES, INC.

MAJOR ITEM

COUNTRY

E-MAIL

SURVEILLANCE

CHINA

overseas@bstar.com.cn

BARN DOOR, INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

27

DAIWON OPTICAL CO., LTD.

LENS

KOREA

sales@dwopt.com

8

DYNACOLOR INC.

IP CAMERA / NVR

TAIWAN

info@dynacolor.com.tw

37

EVERFOCUS ELECTRONICS CORP.

CAMERA / DVR / IP CAMERA

TAIWAN

marketing@everfocus.com.tw

85

FOCTEK PHOTONICS, INC.

LENS

CHINA

sales@foctek-lens.com

73

FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER

9

GKB SECURITY CORPORATION

CHINA

4

GUANGZHOU VIDEO-TECH ELECTRONICS CO., LTD.

SURVEILLANCE

7

HANGZHOU JUFENG TECHNOLOGY CO., LTD.

AHD DVR, AHD CAMERA, NVR, IP CAMERA, HOME SECURITY CHINA

oversea_sales@jufenginfo.com

5

HDPRO CO., LTD.

CCTV

sales@hdprocctv.com

67

HI SHARP ELECTRONICS CO., LTD.

CCTV / DVR / MONITOR / IP CAMERA / HD-SDI / TVI / AHD TAIWAN

sales@hisharp.com.tw

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

overseasbusiness@hikvision.com

IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR TAIWAN CHINA KOREA CHINA

sales@fjsmt.com sales@gkbsecurity.com calo@v-tec.com.cn

10

ICATCH INC.

DVR

TAIWAN

marketing@icatchinc.com

11

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

65

JEC ELECTRONICS TECHNOLOGY (TIANJIN) CO., LTD.

CAMERA

CHINA

admin@jec-cctv.cn

6

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

35

MILESTONE SYSTEMS

SURVEILLANCE

DENMARK

sk@milestonesys.com

59

MITSUBOSHI DIAMOND INDUSTRIAL CO., LTD.

CAMERA

JAPAN

contactit@mitsuboshi-dia.co.jp

61

OB TELECOM ELECTRONICS CO., LTD.

FIBER OPTIC TRANSCEIVER

CHINA

overseas@obtelecom.com

28, 29

PIXELPLUS CO., LTD.

SEMICONDUCTOR

KOREA

kahn@pixelplus.com

42, 43

QIHAN TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

marketing@qihan.cn

23

QNAP SYSTEMS, INC.

NVR / VMS

TAIWAN

nvr@qnap.com

91

QUANZHOU SOUTHEAST PHOTOELECTRIC CO., LTD.

SURVEILLANCE

CHINA

sales@soest.cn

2

RIFATRON CO., LTD.

DVR

KOREA

contact@rifatron.com

79

SHENZHEN ACORID COMMUNICATION TECHNOLOGY CO., LTD. FIBER

CHINA

sales@acorid.com

85

SHENZHEN COMMANDER TECHNOLOGY CO., LTD.

CHINA

sjw@yjdcase.com

21

SHENZHEN NANFANG HANBANG TECHNOLOGY CO., LTD. NVR, IP CAMERA

CHINA

sales@hanbangoverseas.com

CASING

19

SHENZHEN ZNV TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

znvservice@zte.com.cn

71

SIA RIOT ENGINEERING

VIDEO MANAGEMENT SOFTWARE

LATVIA

eu@luxriot.com

12, 13

SONY CORPORATION DSBG. SYSTEM LSI DIVISION

SEMICONDUCTOR

JAPAN

-

25

TAMRON CO., LTD.

CAMERA

JAPAN

newbiz@tamron.co.jp

39, 66

TECHPOINT INC.

CHIPSET

USA

dma@techpointinc.com

33

VICON

SURVEILLANCE

USA

sales@vicon-security.com

47

VISIONITE INC.

CCTV

KOREA

vision@visionite.com

3

WEBGATE INC.

DVR

KOREA

support@webgateinc.com

55

ZHEJIANG DALI TECHNOLOGY CO., LTD

CCTV

CHINA

sales@dali-tech.com

ACCESS CONTROL PAGE NO.

ADVERTISER

MAJOR ITEM

87

GIGA-TMS INC.

RFID MODULE / LOCK / READER

17

SUPREMA INC.

INSIDE BACK COVER

VANDERBILT

49

VOIM TECHNOLOGIES INC.

COUNTRY

E-MAIL

TAIWAN

promag@gigatms.com.tw

FINGERPRINT

KOREA

sales@supremainc.com

ACCESS CONTROL

SWITZERLAND -

FINGERPRINT

KOREA

sales@ten-bio.com

INTRUSION ALARM PAGE NO. 53

ADVERTISER SUPERIOR ELECTRONICS CORP.

MAJOR ITEM ALARM

COUNTRY TAIWAN

E-MAIL info@superior-elec.com

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

93


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.