a&s International Nov 2014(Trial version)

Page 1


CONTENTS

Nov 2014

Industry Report

Prophecy From Security 50:

P.34

Time for Solutions!

Intelligent Video Solution

P.42

Security 50 Sets Trends for 2015

P.48

2014 Top 50 Rankings

Special Feature

C

1422

P.78

Time to Check-in: Video Analytics Automate Airport Security

P.84

Marine Control: Video Content Analytics Protecting the Seas NOV 2014

P.90

Up, Up and Away! "Supercloud" Rewrites Security

www.asmag.com

22


CONTENTS

Nov 2014

Product Exploration

Creative Applications Illustrate Wonders of P.58

RFID

In many ways, RFID is like a paintbrush or building blocks, allowing users to be as creative as they can to solve a particular problem or dilemma.

P.64

Vertical Market

P.72

1622

SMAhome

Hospitals Combine Forces and Security Systems

P.14 Contents P.18 Editor’s Note P.20 Corporate News

NOV 2014

RFID: More Varied and Diverse Than Ever

P.88

Oivicon Opens Its Door to Every Possibility

P.30 Products of the Month P.104 Show Calendar P.106 New Products

www.asmag.com

P.98 Show Spotlight P.109 Companies in This Issue

22


EDITOR'S NOTE

a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies developments in CCTV, Digital Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home

Key Messages From Security 50

Automation and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄

We are proud to present Security 50 for 2014 in this issue. In order to clearly pinpoint the trends for 2015, this year, a&s also included the financial reports of the first half of 2014. After cross referencing these two lists, we found that the trend to develop solutions has become very obvious, no matter on the manufacturer’s side or sales channel’s side. IP technologies have not only contributed to revolutionary changes to security products but also inspire and motivate many security companies to evolve.

Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shi General Manager Editorial General Press Jill Lai Editor in Chief Alf Chang Senior Consultant Senior Editor Eifeh Strom Reporter Steve Chin William Pao Reporter Lisa Hsu Reporter Coordinator Weiting Chen

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com steve.chin@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com weiting.chen@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Circulation & Subscription

Integration was never a major problem when analog products dominated the market. After IP technologies were introduced to security, compatibility and interoperability among devices have become a challenge. Even ONVIF or PSIA compatible products cannot guarantee full integration among devices. Plus, in different verticals, users meet various threats and challenges too. All these explain why suppliers have to grow solutions now. Another significant message that we can gain from Security 50 2014 is the penetration of IP video surveillance devices in the SMB sector. IP video has already been widespread in large-scale projects. Now, major IP video suppliers are aiming at the SMB sector for more growth. Also, as seen in Security 50 reports, major Chinese companies continue to grow bigger and bigger. Unfortunately, this means other Asian manufacturers’ original market shares have been gradually taken. Some Taiwanese and Korean companies have continued to lose their market shares in this global market year on year. We predict that market consolidation will also soon happen among Asian security suppliers. Despite all this, we also see the transformation of some Asian companies, moving from devices to systems and even solutions due to the competition with other players. We foresee that these changes will turn out positively in the near future. Security 50 sets the trends for the global security industry. We hope you enjoy reading it to catch up with the most updated trends in the market!

Michelle Shih

Coordinator

michelle.shih@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

asmag.com

Jerry Wu

Assistant Manager

jerry.wu@newera.messefrankfurt.com

Secutech

Peggy Wu Echo Lin Eva Tsai

Trade Fair Manager Manager Project Manager

peggy.wu@newera.messefrankfurt.com echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com

International Advertising [Headquarters]

Juihui Lin Kay Yang Audrey Fang Wayne Ho

Manager Operation Officer Coordinator Sales Officer

juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com wayne.ho@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Y. C. Suh Takashi Komori Nguyen Thu Ha

USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam

bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions.

Jill Lai

jill.lai@newera.messefrankfurt.com

For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2014 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

1822

NOV 2014

www.asmag.com

22


Corporate News

Zenitel Announces Strategic Intercom Partnership With Genetec Zenitel, a global supplier of communication systems, announced a strategic technology partnership with Genetec, a provider of unified IP security solutions. In this relationship, Zenitel will become a preferred technology hardware supplier to Genetec end users with its globally deployed intercom system, leveraging session initiation protocol (SIP) for superior voice and video-over-internet protocol (VoIP) communications. By combining systems via integration with Genetec, end users will be able to set up a cohesive and powerful IP-based system that meets today’s demanding market requirements. The product line from Zenitel includes IP master stations and substations, with or without video, for a variety of indoor and outdoor applications.

Illinois State Police Deploys Raytec IR for Surveillance Lighting The Illinois State Police Department, U.S., have chosen Raytec’s infrared LED illuminators to provide surveillance lighting for an urban concert park. With large public events regularly taking place in the park, good lighting was required to improve video surveillance image quality for ensuring public safety and reducing crime. The previous street lighting along the park’s pathways did not provide optimal illumination for nighttime surveillance. It produced a highly uneven spread of light and was not aligned with the camera field of view, leading to poor quality, unusable images with insufficient detail and dark areas. This resulted in some areas of the park being unmonitored and open for vandalizing. Furthermore, the park surveillance system requires regular modification for different events, so a lighting solution was needed that could be quickly adapted. This led to the police department approaching Illinois-based security integration company Mobile Pro Systems, specialists in mobile and rapid deployment surveillance solutions ─ they recommended Raytec infrared LED lighting. The illuminator’s holographic lens technology with hotspot reduction technology provided the even light distribution needed for the camera system to provide clear, sharp, and detailed images of the scene at night. Choosing an infrared LED solution also meant that there would be zero light pollution and no disturbance to the park events.

March Networks Expands Intelligent Video Integrations With New Pacom Access Control System Certifications

HID’s Smartphone Door-opening Solution Passes University Test The successful completion of a pilot project at Vanderbilt University has paved the way for using smartphones as a convenient and compelling new way to open doors from a distance with new technology from HID Global, an ASSA ABLOY Group company. The pilot was implemented at the US university using the HID Mobile Access solution with “twist and go” gesture technology that supports Bluetooth Smart and includes mobile IDs, mobile apps, mobile-enabled readers, and the HID Secure Identity Services portal for provisioning and revoking mobile IDs to a variety of Apple and Android mobile devices. Fifteen participants used their existing smartphones to open doors at one or more of six possible campus entry points, including one parking garage. Entry points were equipped with HID’s mobile-enabled readers that were configured to work with existing smart cards as well as HID Global’s mobile IDs. The participants cited convenience as the top attribute of HID Mobile Access, because their smartphones are always with them and they are less likely to lose them compared to an access card.

March Networks, a global provider of intelligent IP video solutions, announced the integration of its VMS software and NVRs with the integrated security management software from Pacom Systems. The certifications provide organizations with unified IP video surveillance and access control solutions that support better risk mitigation, rapid incident response times, and more efficient system management.

2022

NOV 2014

www.asmag.com

22


Corporate News

Samsung Techwin Security Cameras Secure a Vital Part of British Film Heritage Situated in South West London, U.K., Twickenham Studios offers a bespoke service to all media, including film and television, and can claim to be the only London-based studio that caters for both stage and post-production requirements. The latest Samsung Techwin video surveillance technology plays a key role in helping create a safe and secure environment for all who work on the studio site. First opened to the world of film in 1913, the studio went into administration and in 2012 seemed destined for demolition. However, following a successful Save Twickenham Studios campaign, the site was purchased by British businessman and property magnate Sunny Vohra, who quickly implemented a multi-million pound plan to modernize and re-equip the Studios. With the assistance of Aray Architects, a tender process resulted in video surveillance specialists Securebase being awarded the contract to install a 28-camera IP-based system. The images from all 28 cameras are simultaneously recorded on a Samsung Techwin SRN-1000 network video recorder which has 12-terabyte on-board storage capacity, enabling authorized personnel to quickly retrieve recorded video evidence of any suspicious activity.

Norfolk and Norwich University Hospital Makes Patient Safety a Priority With TDSi’s System Norfolk and Norwich University Hospital (NNUH) is a National Health Service academic teaching hospital located on the southern outskirts of Norwich and was the first new NHS teaching hospital built in England for more than 30 years. Faced with a healthcare facility that included independent buildings and car parks, the building owner identified that the current legacy access control solution was coming to the end of its life cycle and was in need of future proofing to provide monitoring of entrances, exits and other sensitive areas ensuring a safe environment for patients, visitors and staff. Since the beginning, it has concentrated on leveraging the latest technologies to create a digital hospital platform, which has allowed the providers to focus on patient care. In efforts to continually improve quality care, NNUH has deployed one of the advanced access control solutions available, to ensure the safety and overall protection of its patients, visitors, and staff. The TDSi integrated system enables NNUH to identify all areas on site, including specific live events where security can respond appropriately, whether this be a suspicious person or hazardous condition, they can react faster and more effectively.

2622

NOV 2014

Morpho Makes Forensic Science More Accessible In terms of police investigations and inspections, there is a trend toward making forensic tools accessible, particularly those that use biometrics. Professionals cannot deny the power of the Internet-connected mobile devices they use for private purposes, to the extent that the French Minister of the Interior has used the expression “police 3.0” several times over the past few months. Morpho has already deployed mobile terminals in the U.S. that can check an individual’s identity and know in just a few seconds whether the individual’s digital fingerprints match the prints of someone being sought by police. Eventually, it will be possible to conduct these checks using ordinary tablets or smartphones equipped with special apps. For authentication operations, particularly those carried out on borders, Morpho has developed mobile equipment that can read data stored on the smart card of a biometric passport and compare it against the data retrieved on site. In the future, police in the field will have mobile tools, like tablets, that will allow them to transmit digital fingerprints directly to an information system (IS) from a photo they took on the crime scene. These prints will be automatically analyzed by the IS, which will even be able to send the most likely correspondence directly back to the investigators. This is an advancement made possible thanks to considerable improvements in Morpho algorithms, which were just released on the FBI’s next generation system in the U.S.

www.asmag.com

22


Products of the month

Hybrid Transmission Device Simplifies Project Complexity

NVT NV-ER1808i (8-Port) and NV-ER1816i (16-Port) TBus Ethernet Receiver The NVT model NV-ER1808i and NV-ER1816i TBus Ethernet-over-coax/UTP receiver hubs are 19-inch rack mountable bus-architected media switches that have eight or 16 TBus ports, together capable of supporting more than 16 TBus transmitters and their subsequent 10/100 BaseT Ethernet and PoE+ powered devices. The TBus transmission medium can be coax, two-wire/UTP, or shielded twisted-pair. Data rates up to 150 Mbps are achievable, making these devices the ideal choice in new or legacy installations where existing cable is re-deployed as part of an upgrade to IP cameras. These hubs feature an internal 250 watt power supply. TBus hubs can also use an NVT external 250 watt NV-PS56-250W auxiliary/redundant power supply for high power applications. No IP or MAC addressing configuration is required, yet is available for browserbased monitoring and control. This provides exceptional yet simple configuration and diagnostics for the installer or remote monitoring facility. Status LEDs indicate power, auxiliary power, and link connectivity/activity.

OT Systems ET4200CPp-RS16 Series Receiver (Rack-mount Receiver of 16-port Coax to 4-port 10/100/1000 Mbps Ethernet Switch With PoC) The ET4200CPp-RS16 receiver works with the transmitter of one port Ethernet extender over coax with PoC (ET1100CPp-T) to provide Ethernet extension of 16 channel 10/100 base-TX over coaxial cable to four-port 10/100/1000 Mbps Ethernet. The maximum transmission distance is 800 meters. The product supports PoC, hence, no power point is required on the camera side for the transmitter (ET1100CPp-T) and its connected IP camera if the camera support Power over Ethernet (PoE). The Ethernet data received by any one of the coax data port (1-16) at the receiver is transferred to all four Ethernet ports (P1-P4). The product is good for retrofit of analog video surveillance systems by using the existing coaxial cable infrastructure.

VIVOTEK IB8367/67-R Network Camera (With Embedded Extender and Transmission Cable) IB8367-R is the first network camera designed with embedded extender to allow PoE input and PoE output. Users can implement a total PoE solution perfectly. Incorporating a number of advanced features standard for VIVOTEK cameras, the IB8367/IB8367-R are the ideal solutions for outdoor surveillance needs.

Key Features • Transmit 10/100 BaseT Ethernet up to 8,000 ft over RG-59/U, 2,000 ft over 2-wire/UTP or 1,300 ft over shielded twisted pair • The TBus architecture allows multipoint operation in any star or daisy-chained topology, with any combination of wire types • Transparently supports all networking protocols (UDP, TCP/IP, HTTP, Multicast with IGMP, etc.) using advanced 128-bit AES encryption • 10/100/1000 uplink Ethernet connectivity • Easy configuration, no PC required • 56 VDC is distributed over the TBus to all connected equipment. PoE, PoE+, or high power PoE cameras (or other PoE devices), up to 50 watts are supported Supplier: Network Video Technologies URL: www.nvt.com

Key Features • Connecting up to 16x ET1100CPp-T and IP cameras • With full switching capability • 1,000 Mbps full-duplex communication • Power over Coaxial (max. 400 W/800 W total output) • Data rate per port up to: 40 Mbps (downlink), 10 Mbps (uplink) • Max. distance: 800 m over coax (RG59/U) • Auto MDI/MDI-X • AC power input • 19” 1U rack-mount Supplier: OT Systems URL: www.ot-systems.com

Key Features For the Camera: • Embedded PoE Extender Design to Support both PoE Input & Output (IB8367-R) For the Extender: • Extension distance: max. 300 m (no local power required) • PoE output: 12-48 W • Bandwidth: max. 100 Mbps • Megapixel/D1/VGA supported • H.264/MJPEG/MPEG-4 supported • Fast Ethernet 10/100 Mps: 3 Supplier: VIVOTEK URL: www.vivotek.com

3022

NOV 2014

www.asmag.com

22


INDUSTRY REPORT

Prophecy from Security 50 :

Time Solutions! for

n By Jill lai

Eligibility • Electronic security equipment and systems providers, including video surveillance, access control, intrusion detection, and multiple product segments • Security companies or pure manufacturers with their own products, brands, or solutions • Publicly-listed and privately-owned security companies • Ability to provide FY 2013 and FY 2012 & first half of 2014 financial statements, audited/endorsed by a certified accountant or accounting firm • Distributors, systems integrators, resellers, dealers, installers, guard service providers, information security, and fire safety companies or related revenues were excluded

3422

NOV 2014

www.asmag.com

22


2014 security 50

INDUSTRY REPORT

2

013 was another rewarding year for the winners of Security 50. Even though the average growth rate was comparatively moderate compared to the past two years, the top 50 still contributed US$16.9 billion in total sales revenue in 2013. Top 10 companies, Honeywell, Bosch, Hikvision, Safran, ASSA ABLOY, Dahua, FLIR, Axis, Samsung, and Tyco Security Products, remain the same as last year’s rankings. However, due to the explosive growth of two Chinese giants, the top 10 rankings have slightly changed. Hikvision has been ranked third, with 2013 being the first time it produced over $1 billion in turnover. Dahua, who had the most obvious growth, beat Axis, Samsung, and FLIR, and has been ranked sixth. These two Chinese companies’ outstanding performance again impressed the whole security industry.

About the Ranking We rank global manufacturers solely by product sales. Participants range from exclusive manufacturers to end-to-end solution providers. Again, we urge readers not to focus on the ranking of the participants, but to further explore the underlying causes for their success.

Steady Growth From 2012 to 2013 The average turnover growth rate for the Security 50 was 8.2 percent in 2013. The 8.2 percent growth rate also corresponds to current researchers’ predictions on the global security market growth — 8 to 10.8 percent in 2013, according to IHS and MarketsandMarkets. The result proves that the top 50 companies grew quite steadily in 2013. However, the figure shows a slight slowdown, compared to the average 12 percent growth in Security 50 reports, per year, after 2010. Multinationals among the top 50, which mostly develop multiple security systems, ranging from video surveillance, access control, and alarm, grew exponen-

Note: a&s bears no responsibility for the financial information provided by any individual company. For fair comparisons, non-US currencies were converted using midmarket exchange rate from XE.com on July 14, 2014. This is an unbiased list based on the willingness of participants to share their sales performance.

Acknowledgements

22

NOV 2014

www.asmag.com

2235


INDUSTRY REPORT

Security 50 Sets Trends for 2015 Migration from Device to Systems Axis Communications also see this trend towards solutions. We have broadened our offering for small and medium-sized installations. Axis network cameras and software can now be offered as an overall solution adapted to end user needs. For an overall solution for mid-sized Johan Paulsson, CTO, Axis installations, for example in school environments Communications and in the retail segment, Axis recently launched video recorders. The recorder includes three different server solutions, which are pre-installed with management software and configured to seamlessly match Axis’ wide range of network cameras. Also, the physical access control market is well-suited to Axis’ long-term growth strategy. The investment is part of our ambition to broaden the global offering in security solutions and advance cooperation with partners around the world. The solution is offered in the U.S. and Europe through Axis’ well-established network of distributors and partners. For the box moving business, the trend is going toward solutions type of business. In the past, there were many different vendors in the market, such as camera manufacturers, VMS providers, and systems integrators. However, since the margin has been squeezed, there Steve Ma, EVP, VIVOTEK is no room for multiple vendors. So, the trend is that we need to build total solutions for customers. It should be easy to use, have lower total cost of ownership, be very easy to install and very easy to maintain. That is what we are planning right now — we have cameras, we have software, NVRs, and PoE switches, so that installers can buy a total system from us.

4222

NOV 2014

Systems/solutions are an important element to our roadmap. FLIR has been investing significantly into a cloud-based service that brings all of our products together into a powerful Matt Bretoi, VP, North management and search tool. This America Field Sales, FLIR is not the only example though. Systems We constantly evaluate how we can bring more value to our largest verticals, whether through internal resources or our partners. A simple example that we have used for years: a fixed thermal imager is a great 24/7 surveillance tool, but coupled with intelligent analytics it is a powerful pro-active security tool that greatly increases the customer’s return on investment. We continue to look for ways on how we can build upon that solution.

SimonsVoss has launched a new digital access management system in building solutions. With this, we consequently pursue solution integration and cooperation with partners in access control. We will open up entirely new customer groups that have long wished to Bernhard Sommer, CEO, have SimonsVoss as a lock system with all of its SimonsVoss Technologies strengths. The configuration of the system has been kept extremely simple, e.g., with self-configuring online routers to establish the optimum network. For installation, this is extremely simple and reduces costs. By providing this new system, SimonsVoss will enter SOHO users market. These solutions are expendable to high-end systems and will grow with the users need.

www.asmag.com

22


2014 security 50

Integrated Systems, Well-designed for Applications Within the last year, we’ve increased compatibility between two systems, enabling higher-end commercial end-users to have access to a technology that’s used to support critical infrastructure sites — places like military bases, government installations, etc. — around David Gottlieb, Director, the world. So the same type of high-tech system Global Marketing Communications, Honeywell you see protecting a military base can now Security be used to protect large commercial sites like shopping malls, airports, and such. One of our security management systems can integrate intrusion, video and access systems, and this year we added more support for wireless locks to allow for users to protect more doors. For another Honeywell’s integrated solution, we also added new compact surveillance radar capabilities that will allow sites to detect intruders along perimeters when traditional ground surveillance radar systems are not practical. Milestone open platform integrations with third-party solution partners constantly bring new innovations for more vertical or expanded market needs. For example, Milestone’s video management software integrates GuardTrax mobile video alerts Karl Erik Traberg, Head of for roving officers, SICK and Optex laser Corporate Communications scanners for critical perimeter protection and Business Development, Milestone Systems and challenging physical barrier requirements, and Inovonics panic button interoperability for emergency communication.

There’s no single vendor out there offering best of breed across all disciplines including intruder, fire, access, surveillance, etc. Most corporate enterprises have a complex jumble of disparate Brian Song, MD, IDIS Europe and proprietary systems and that causes gaps in security. A control room with alarms and alerts from multiple disparate systems can result in alarms simply being ignored, through to chaos as operators jump from screen to screen as they try, and often fail, to verify each alarm. To address these challenges, IDIS recently announced the integration with Maxxess (event management), SureView (alarm monitoring) and Lenel (access control management) particularly addressing the corporate enterprise market. This integration delivers IDIS IP video surveillance systems functionality through single security management platforms to enhance resilience through event and video correlation to increase operator effectiveness, and turn streamlines operations to reduce cost. It also helps those customers integrate their legacy video surveillance and develop an easy migration path rather than needing to rip and replace everything immediately.

New Applications, New Markets The connected home is a great example where traditional security systems are now being used for non-security applications, like simple awareness and comfort control. One recently introduced Honeywell control panel can control everything from security to lighting, garage doors and more was one our most-important product launches this year in the Americas because it embodies that type of design; it features the ability to stream four IP camera feeds directly on a touchscreen and it can be controlled remotely from a Honeywell app.

David Gottlieb, Director, Global Marketing Communications, Honeywell Security

22

NOV 2014

Milestone sees the healthcare industry using video surveillance for patient monitoring, schools are using it for parents to be able to see how their children are doing in class and on the playground, universities are using it for student training and teacher evaluations, utilities are using it to monitor equipment and operations including solar and wind farms overseeing remote operations, retail is using it to track customer flow and product areas of interest for improving floor layouts accordingly.

Karl Erik Traberg, Head of Corporate Communications and Business Development, Milestone Systems

www.asmag.com

2243


1

2

4

3

5

9

7

6

8

10

NEW

11

12

13

14

23

22

17

19

24

18

20

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

US

Sweden

Korea

FLIR Systems (Thermal Vision & Measurement)

Axis Communications

Samsung Techwin Tyco Security Products Allegion (Electronic Products & Access Control) Aiphone TKH Group (Vision & Security Systems) Nedap NICE Systems (Security Solutions) Avigilon Optex (Sensing Products Business)

Japan

Tamron (Commercial & Industrial)

Germany

US

Taiwan

VIVOTEK

Verint Systems (Video Intelligence) Mobotix

US

Infinova

Japan

Canada

Israel

Netherlands

Netherlands

Japan

US

US

China

Dahua Technology

Sweden

France

China

Hikvision Digital Technology

Safran (Security Products Only) ASSA ABLOY (Global Technologies)

Germany

US

Multiple

Video Surveillance

117.5

120.4

121.7

130.0

154.8

161.5

Video Surveillance Video Surveillance Video Surveillance (Lens)

167.6

Intrusion Detection

193.9

207.7

325.8

Multiple

Multiple

Access Control

Multiple

419.7

439.6

Access Control

650.0

Access Control & Locks

659.2

Multiple

Multiple

694.4

Video Surveillance

871.6

Video Surveillance 727.9

954.6

Access Control & Locks

Video Surveillance

1614.2

1656.2

Video Surveillance Access Control

2039.9

2700.0

Multiple

Multiple

111.0

119.5

90.4

107.5

122.0

138.1

94.2

185.9

209.2

239.9

364.2

500.0

658.4

613.3

628.0

568.9

923.6

1648.2

1097.9

2018.1

2500.0

5.8%

0.8%

34.7%

21.0%

26.8%

16.9%

77.9%

4.3%

-0.7%

35.8%

15.2%

30.0%

0.1%

13.2%

15.9%

53.2%

3.4%

-2.1%

50.9%

1.1%

8.0%

89

8.6

90.9

181.3

545.5

84.4

1.2

46.4

121.6

372.8

5.5%

638.3%

95.7%

49.1%

46.3%

75.8%

5.6%

54.2%

20.8%

32.9%

55.5

60.8

58.6

59.5

87.1

113.7

59.6

365.1

490.2

478.0

943.3

60.9

51.7

65.0

69.0

76.8

67.0

65.7

308.6

327.3

462.7

618.7

Product Sales Revenue Product Sales Revenue Revenue Gross Profit Profit 2013 (in 2012 (in Gross Profit Gross 2014 1st 2013 1st Headquarters Product Group US$Million) US$Million) Growth Growth 2013-2012 (in US$ M) 2013 (in US$ M) 2012 2013-2012 Margin 2013 half (US$M) half (US$M)

Honeywell Security Bosch Security Systems

14 13 Ranking Ranking Company

2014 Top Security 50

INDUSTRY REPORT

-8.9%

17.6%

-9.9%

-13.8%

13.4%

69.7%

-9.2%

18.3%

49.8%

3.3%

52.5%

2014 1st half Revenue Growth (US$ M)

-0.4

63.8

89.5

275.2

2014 1st half Gross Profit (US$M)

1.1

34.9

69.6

181.0

2013 1st half Gross Profit (US$M)

-132.17%

82.89%

28.54%

52.1%

2014 1st half Profit Growth

-0.62%

56.10%

18.26%

29.2%

2014 1st half Gross Margin

2014 security 50


15

27

21

29

25

44

34

30

33

35

37

36

28

31

32

26

16

41

38

40

42

46

39

43

48

49

47

50

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

Korea

Korea

Korea

Taiwan

Korea

Germany

UK

Taiwan

Taiwan

Denmark

Germany

US

Korea

Korea

China (HK)

UK

Spain

Korea

China

Korea

US

Korea

Israel

Taiwan

Taiwan

Taiwan

Commax

Hitron

KOCOM

AVTECH

ITX Security

Geutebruck

Synectics

DynaColor

GeoVision

Milestone Systems

SimonsVoss Technologies EverFocus Electronics Napco Security Systems

HDPRO

CNB Technology

RCG

IndigoVision

Fermax Suprema

Dali Technology

Win4Net

Vicon

C-Pro Electronics

Magal Security Systems (Perimeter Products)

Hunt Electronic

Hi Sharp Electronics

Everspring Industry

Taiwan

Korea

IDIS

Video Surveillance Video Surveillance Intrusion Detection & HA

Intrusion Detection

Video Surveillance Video Surveillance Video Surveillance Video Surveillance

Access Control

30.5 Average

16932.4

33.7

28.6

33.9

44.9

49.7

39.4

43.9

50.9

53.1

51.9

132.0

95.1

76.7

70.9

76.4

66.4

58.0

66.6

69.4

66.7

71.5

44.3

108.4

81.8

114.7

86.9

149.5

29.0

29.7

29.9

30.6

38.9

39.8

41.1

42.1

51.1

54.1

54.8

Video Surveillance Access Control

60.2

64.6

69.9

71.4

72.1

73.2

74.3

74.7

75.6

76.7

78.7

81.0

87.2

Access Control

Video Surveillance Video Surveillance

Multiple

Multiple

Access Control

Video Surveillance Video Surveillance Video Surveillance Video Surveillance Video Surveillance Video Surveillance Video Surveillance

93.5

95.0

Multiple

99.3

Video Surveillance

115.4

Multiple

Video Surveillance

8.2%

-4.7%

-11.9%

4.5%

-10.0%

-13.2%

-19.7%

4.1%

-3.9%

0.4%

1.8%

5.7%

-54.4%

-32.1%

-8.9%

0.6%

-5.6%

10.3%

28.0%

12.1%

8.9%

15.0%

10.1%

82.8%

-19.5%

14.3%

-17.2%

14.3%

-22.8%

48.7

7.8

4.6

10.8

7.1

15.1

13.4

5.8

25.8

30.5

31.1

29.4

9.7

12.8

21.7

20.4

41

30.7

29.5

17.2

32.8

22.5

4.8

24.3

40.9

8.3

3.8

8.5

7.8

19.6

10.8

5.8

24.3

31.2

30.6

82.8

23.8

14.4

21.1

25.2

38.1

27.8

28.4

12.8

40.9

21.2

8.6

23.4

5.9%

-5.2%

21.0%

26.8%

-8.8%

-22.9%

25.0%

0.5%

6.3%

-2.1%

1.5%

-64.6%

-59.1%

-11.2%

2.7%

-19.2%

7.8%

10.7%

3.9%

34.7%

-19.6%

5.8%

-44.7%

3.6%

32.9%

27.0%

15.5%

36.2%

18.3%

38.0%

32.7%

13.8%

50.4%

56.5%

56.7%

48.8%

15.1%

18.2%

30.4%

28.2%

55.0%

40.7%

38.5%

21.2%

37.7%

24.0%

5.0%

24.4%

22.6

13.3

11.7

15.1

15.5

21.5

34.6

31.5

24.2

26.7

18.0

39.3

40.4

30.7

48.0

38.3

49.9

56.1

14.7

16.0

14.7

19.8

19.3

18.6

21.5

27.6

35.1

36.8

16.5

34.4

34.0

46.0

34.4

50.2

43.4

60.6

53.8%

-16.6%

-20.4%

-23.4%

-19.6%

15.5%

60.8%

14.2%

-31.0%

-27.3%

9.3%

14.0%

18.8%

-33.4%

39.6%

-23.7%

15.0%

-7.4%

7.2

2.5

4.3

5.6

4.3

2.9

17.0

17.8

3.8

8.7

10.0

15.8

7.8

9.7

12.2

2.4

9.6

4.2

2.5

5.0

7.5

6.6

1.5

11.0

15.0

5.4

10.8

9.1

14.3

8.0

17.5

8.5

3.2

11.9

72.85%

-0.58%

-14.05%

-24.62%

-34.54%

97.82%

54.51%

18.87%

-30.79%

-19.84%

10.26%

11.16%

-1.73%

-44.71%

43.12%

-26.23%

-19.42%

31.85%

18.59%

36.98%

37.09%

27.75%

13.73%

49.06%

56.43%

15.50%

32.50%

55.49%

40.37%

19.43%

31.47%

25.33%

6.20%

19.25%


Product Exploration

Creative Applications Illustrate Wonders of n By William Pao

RFID

In many ways, RFID is like a paintbrush or building blocks, allowing users to be as creative as they can to solve a particular problem or dilemma. Its technology is quite simple, consisting of only a reader and a tag. But applications can be diverse, wide-ranging, and even wild. Regardless how the solutions are implemented, the goal is the same: to help users save cost, reduce administrative waste, and manage and track items effectively. This article examines some of the unique and special applications of RFID in different verticals.

Logitag Solutions Make Sure

Hospitals

Shlomo Matityaho, CEO, Logitag

Are Always Stocked

of the solutions employs a two-bin Kanban system where both bins are tagged with RFID tags and filled with medical supplies. When one of the bins runs out, the nurse can push a button on the RFID tag, and an order is automatically generated and “We see a reduction of labor sent to the supplier. Status of the order can be and elimination of written into the tag and displayed on a monitor people who count on the tag. The supplies can be delivered and order.” directly to the bin, which is kept at a department of the hospital, thus eliminating the need for central storage. “What happens typically by using this technology is a reduction of 40 percent of inventory room,” said Shlomo Matityaho, CEO of Logitag. “We ow do hospitals keep track of medical supplies used by patients? see a reduction of labor and elimination of people How do they know when it’s time to reorder supplies? Logitag who count and order.” solutions address those needs with RFID solutions, which have Another solution employs cabinets filled with helped operators save on labor and management cost. medical supplies, each of which is tagged with an Logitag’s solutions have been deployed in various medical facilities, RFID tag. Each time a supply is taken out, a record including Wyoming Medical Center and New York Hospital Queens. One

H

5822

NOV 2014

www.asmag.com

22


is generated on who took the supply and which patient received the supply, so that the patient can be billed accordingly. A third application is for protection of infants at hospitals. A baby and its mother are given a pair of RFID tags, and both tags must be present in order for them to exit the infants ward. ■

Grapesof Satisfaction at Argentine Vineyard

GIGA-TMS’

Citizen Tracking Solution First of Its Kind

With HID Solution

“We can help improve quality, optimize data accuracy, and streamline critical systems.”

“The reader was strategically placed on the side of the vehicle door. Read accureacy rose to 87%.”

C

urrently, there is a trend of moving RFID towards NFC, where tags can be read by one’s mobile device. If implemented right, such a combination can work wonders for users. That’s exactly what happened at Argentina-based Bodega Norton Winery, which uses a solution from HID Global to manage workers, pay them properly, and create an overall more pleasant working environment. Before the implementation, the vineyard paid its grape harvesters by way of plastic chips of different shapes and colors to indicate the number of bins each worker filled. The workers would pocket the chips and then collect their pay at the end of the workweek. Several issues arose as a result of this. First, chips are easily lost or stolen during the week. Second, some workers would use the chips to settle their personal debts. A more efficient way to manage workers and pay them according to their workload was therefore needed. With HID’s solution, the cumbersome chips were eliminated. Each harvester is assigned an armband tag. At the end of the day, the workers would put the grapes they picked into bins, each equipped with a tag. Now, the supervisor would take his NFC-enabled mobile phone, point it at a worker, and then point it at the bin that he is associated with. The system would automatically create a record for the amount of work that the harvester did and credit the payments to him. Benefits of the solution are manifold. “Beginning with the grape harvest, HID can help Norton improve quality, optimize data accuracy, and streamline critical systems at every stage of the wine production and distribution process,” said Richard Aufreiter, Director Product Management at HID Global. ■

22

NOV 2014

I

magine a shuttle bus picking up senior or disabled citizens from their homes and taking them to a daycare center. Each time people get on, they need to sign a paper log to help the driver keep track. This was burdensome and ineffective, as many of the passengers have a hard time writing legibly. The solution to this real-life problem in a major western city led to the world’s first RFID application for tracking passengers on a public shuttle system, according to Brian Ma, Sales Representative at GIGA-TMS, which created the UHF RFID application. Since most citizens of this city already have RFID-enabled citizens cards, GIGA-TMS’ solution took advantage of that. Once people get on the vehicle, their cards would be

www.asmag.com

2259


Product Exploration

RFID: More Varied and Diverse Than Ever RFID first hit the market in the 1970s and has seen continued improvements over the years, making it an effective technology for tracking and managing goods with applications in a variety of vertical markets. RFID exists in different types and forms. Chief among them are LF, HF, UHF, active, and passive RFID, each with unique applications in different verticals. This article chiefly examines the technology behind long-range RFID. n By William Pao

R

FID, or radio-frequency identification, can trace its history to after the Second World War, when devices transmitting and retransmitting radio waves carrying audio information were invented for covert operations. The first true RFID device, a passive transponder with memory, was unveiled in 1971 and patented in 1973. While RFID is not a new concept, it has never gone out of style since its introduction in the last century. From parking lots to highways, factories to offices, RFID can now be found in various parts of our everyday life. According to IDTechEx, the RFID market is worth US$8.9 billion in 2014, a rise from $7.8 billion in 2013 and $7 billion in 2012. The figure is expected to rise to $27.3 billion by

6422

NOV 2014

2024. The market research firm also predicts 6.9 billion tags will be sold by the end of 2014 — versus 5.8 billion in 2013 — to retailers, event organizers, and animal farmers, among others. RFID’s popularity has to do with its ability to effectively identify, manage, and track goods, in the process saving businesses a huge amount of money in labor and management costs. The technology works by way of communication between a reader and a tag and generally

While RFID is nothing new, it has never gone out of style. From parking lots to factories to offices, RFID can be found in various parts of our everday life.

www.asmag.com

22


includes the following features: 1. Read-Write: Data stored in the tag can be read, without any contact, by the reader, which can read multiple tags at the same time. Meanwhile, data can also be written into the tag for operators to know the status of the order or delivery process. 2. Diversity in shapes and sizes: Unlike paper labels which come in specific sizes, RFID isn’t limited by the size of the tag, which can be in different shapes and be as small as possible. 3. Resistance to dirt/stains: Unlike paper labels, which become unreadable when dirtied or soiled, RFID tags don’t have this problem. 4. Reusability: Since data stored in the tag can be overwritten, the tag can be reused over and over again on different products. 5. Bigger memory: A barcode contains 50 bytes of data, while an RFID tag can contain several megabytes of data.

Comparison of RFID of Different Frequencies Frequency

Advantages

Low frequency (9-135kHz)

Immunity to metal or Limited by reading wet environments, distance of approxifewer regulatory mately 1.5 meters issues

This technology employs the 9kHz to 135kHz band of the radio spectrum. It is limited by the reading distance, which is approximately 1.5 meters. Limited memory capacity is another disadvantage with this type of RFID. However, there are several advantages as well, one of which is its immunity to metal or wet environments. Meanwhile, since this frequency band is open in most countries, there are fewer regulatory issues. Applications are

22

Animal management, access control, theft prevention

Limited by reading distance of 1.5 meters, different standards

Access control payments, automation, asset tracking, library management, and electronic airline tickets

Ultrahigh frequency (300MHz1.2GHz)

Susceptibility to the environment, interference when overlapping with devices of same frequency

Retail, logistics, toll collection, car park

Long reading distance from 1centimeter to 10 to15 meters, well-standardized

UHF RFID

mostly in animal management on farms, access control, and theft prevention.

HF RFID LF RFID

Applications

High frequency High market (13.56MHz) acceptance, flexibility, and reliability

Diversity Rules RFID comes in many forms, each with its special features and applications. The technology can be categorized in two ways: by the frequency of the signal transmitted (low-frequency, high-frequency, and ultrahigh-frequency RFID), and by whether there is power in the tag itself (active RFID vs. passive RFID).

Disadvantages

HF RFID uses the 13.56MHz frequency band. It is also limited by the reading range of 1.5 meters, and there are different standards applied to this particular RFID. However, HF RFID is a highly accepted technology with different applications, for example access control payments, automation, asset tracking, library management, and electronic airline tickets. “HF RFID allows high flexibility as well as good stability and security,” said Klaus Klosa, MD at LEGIC Identsystems.

NOV 2014

UHF RFID signals range from 300MHz to 1.2GHz. The reading distance is not limited by 1.5 meters and can go anywhere from 1 centimeter to 15 meters. The technology is also well-standardized. Disadvantages include susceptibility to the environment. Interference when overlapping with devices using the same frequency range may also happen. In fact, this frequency band is banned for commercial use in Japan. Despite all this, UHF RFID has enjoyed strong growth, especially in areas, such as retail, where strong inventory visibility is needed. “UHF technology is strongly growing compared to other frequencies due to its high performance and good standardization,” said Richard Aufreiter, Director of Product Management at HID Global.

Active vs. Passive The method of powering the RFID tag differentiates between active and passive RFID. Active RFID uses an internal power source, such as a battery, within the tag, which can transmit signals to the reader.

www.asmag.com

2265


Vertical Market

Hospitals Combine

Forces Security and

H

ospitals are in the business of serving people and their families. Their primary goal is to provide patients with medical care, comfort, and peace of mind. Traditionally security systems in healthcare have been used for access control, providing forensic video and personal alerts for staff in cases of violence, and monitoring at-risk populations such as infants or patients suffering from dementia to protect against kidnapping or wandering. “The purpose of healthcare security management is to contribute to the protection and safety of all those delivering medical service and safeguarding public and private assets against loss, theft, fraud, damage, and disruption, which could be detrimental and a risk to the continuation of patient care. Patients, employees, and visitors assume that since hospitals take care of the community they are immune from local crime and the ills of society,” said Nick van der Bijl, an honorary president of the National Association for Healthcare Security in the U.K. and former healthcare security manager. However, by their nature, hospitals are violent places, some of which are of a clinical nature — post-operative trauma, serious mental health, and pain. But there are also instances when violence is of a criminal nature, such as violence against others. Behind the scenes, hospital security teams face numerous challenges that involve the safety and security of employees, patients, visitors, and confidential personal information, as well as safeguarding dangerous materials, pharmaceutical supplies, and more. A breach in any of these areas can cause financial, legal, and reputational damages. In addition, hospitals have to work under a strict regulatory environment age complying with numerous standards. ion center. Im clinic operat Health System. a of ok lo ut O ayco Clinic First and foremost is of course courtesy of M

When integrating hospitals and other healthcare facilities, sometimes the technology isn’t the problem as much as the psychology of the people involved and their different approaches to security. 7222

NOV 2014

www.asmag.com

22


Systems n By Israel Gogol, Freelancer

A recent change in the healthcare vertical is an increase in the number mergers and acquisitions. More and more healthcare facilities combine forces to reduce their costs. The need to integrate separate security systems is added to the existing challenges of securing healthcare facilities. PSIM solutions can be a good choice for multi-site security management.

safeguarding patients’ medical information. Many other regulations influence a hospital’s daily operations: from financial regulations (for example in case the hospital accepts credit card payments) to regulations regarding the storage of hazardous and radioactive materials. The need for compliance is a significant factor for the performance of healthcare providers. “Healthcare by nature is a very open environment so any security systems put in place must work within this construct, providing a secure environment to patients, employees, hospital property, and regulated health information while having a negligible impact on the flow of patients, visitors, and staff,” explained Drew Neckar, Director of

22

NOV 2014

Security Services at the Mayo Clinic Health System. With many different departments, entrances, elevators, parking areas, etc., and a constant flow of staff, “hospitals are ultimate high-traffic sites,” explained Courtney Dillon Pedersen, Corporate Communications Manager at Milestone Systems. “Monitoring all of these scenarios can be aided by comprehensive video monitoring and access control, which today is in hot demand as a unified solution for greater efficiency.”

Frequent M&As Creates New Demand Recent changes in the healthcare business environment in the U.S. have led to a series of mergers and acquisitions (M&As) between healthcare providers. These are

www.asmag.com

2273


Intelligent Video Solution

Airports are at the forefront of using intelligent video analytics to automate their surveillance and operational needs. Recent advances in video footage search as well as better computing options at the edge promise to show an even greater future use of video analytics. However, market education is still needed to fulfill its potential.

Time to Check-in:

Video Analytics Automate

Airport Securi n By Israel Gogol, Freelancer

7822

NOV 2014

www.asmag.com

22


V

ideo surveillance cameras have long been used in airports. The introduction of video content analytics (VCA) is a power-multiplier for cameras. “The primary goal of analytics is to transform the cameras into intelligent detectors in order to provide more reliable incidents detection and minimize human error factor,” said Denis Castanet, Director of Business development for EMEA at Bosch Security Systems.

ty

22

“Video analytics is identified as a lead technology in the growing trend towards reliable, automated systems within airports,” said Bill Flind, CEO of Ipsotek. Flind named some of VCA‘s main benefits: a wise use of VCA reduces human error, reduces man-guarding costs, provides secondary support to other systems, and greatly improves reaction time from alert to action with the use of automated triggers and alerts. Josh Phillips, Director of Marketing of Enterprise & Critical Infrastructure at Video

NOV 2014

Intelligence Solutions, Verint Systems, also echoed that “VCA is used in areas where alternative sensors are not practical or reliable, or where maintaining security staff for live personnel monitoring is impractical or unreliable.”

New Developments in Video Search Apart from triggering alerts, VCA plays an important role in searching through the video feeds. The vast amounts of video footage collected daily in a busy

www.asmag.com

2279


Intelligent Video Solution

further and actually forecasting with high confidence when a long line will develop, not after it has already happened,” added Phillips. This allows retailers the ability to maximize staff members who sit idle when lines are empty. Information can be shared also between parties in the airport. Store owners in the airport will usually have their own video surveillance systems inside the store. Even though they are not connected to the airport’s system, information can still be shared through mobile applications (e.g., send a picture of a suspect from the store to the airport police), described Todd Brodrick, Director of Sales for South West USA at Pelco by Schneider Electric.

Video analytics can be used for queue management at check-in areas and security lines, measuring the amount of time a person has to wait in line. Image courtesy of Bosch Security Systems.

Future: VCA to Initiate Camera Tracking Today, a major constraint is in making analytics work in a crowded environment. As VCA algorithms improve, so will the ability to overcome the crowded environments at airports. The next challenges in line are successful tracking and hand over from camera to camera. Crowded scenes or obscured views can make reliable tracking across multiple cameras intricate to achieve. However combining other technologies and systems to assist tagging and tracking of individuals through busy scenes such as airport terminals can deliver better results. “Beyond the analytics themselves the next step is automating the entire process — somebody leaves a bag and

the system will automatically jump back and look for the person who left it, recognize him from the database, follow him around as he passes through other parts of the airport, and alert the nearest police officer or guard on duty,” stated Dr. Rustom Kanga, CEO of iOmniscient. “Already we have started using multisensor technology — sound and smell in addition to the video. Humans use all their senses and analytics should too. For example, if the camera detects someone falling down and detects the sound of a gunshot it is a different situation than a simple slip and fall. In years to come

• You need to have a deep understanding of the customer’s business to decide in which way to use analytics. • Pay attention to the network design when you deploy an analytics solution. • Choose a provider with real support; each deployment is different and unique. • When possible, use analytics running é Jorge Heller, Technology at the edge and video cameras with Director, Redisul automatic alert generation. • At all times, a proof of concept will be necessary to fine-tune and adjust the solution.

8222

NOV 2014

such multi-sensor analytics will become ubiquitous.”

VCA is Not a Cure-all Solution Market knowledge levels are still a concern for vendors and systems integrators implementing VCA solutions. One of the major challenges facing vendors and systems integrators is explaining that VCA is not a panacea and explain its realistic expectations. “The commercial challenge is for customers to understand what the technology can and cannot do,” explained

• Chose a video analytics application that fits your current and future situation. • Carefully look at the licensing model for the vendor and see how it is priced in camera deployments. • Analyze the ability of the application to extract the data and to create reports. • If you have an existing camera instalé Mike Davis, President, Infax lation, make sure that the application integrates with the technology. • Check and see if the application is used in similar installations.

www.asmag.com

22


Kanga. “We focus on educating the market. Most customers use a tender process for their purchasing. If the specifications in the tender are vague the customer may get something that meets the specification but does not work in practice. For instance, if the specification asks for ‘abandoned object detection’ they will get a different response than if they ask for ‘abandoned object detection in a very crowded place.’ Those few words can make a difference between whether the customer gets something that will work or not.” “I think the challenge is always the culture. Video analytics is a real new thing in our market, so we spend a lot of time showing to our customers the power of the solution. After that, the solution’s technical needs must be redesigned. Usually the customers look at video analytics as a showcase, not as a real solution. We always take potential customers to visit actual customers in order to demonstrate the incredible power of the analytics solution,” explained Jorge Heller, Technology Director of Redisul, a Brazilian systems integrator that took part in securing some of Brazil’s airports prior to the last FIFA World Cup. “We continue to witness a large variation in client knowledge for analytics from those procuring solutions from a zero base through to consultant experts. Even within procuring teams knowledge can vary significantly and it is not always those with the most knowledge that are permitted the most procurement authority,” added Neil Norman, CEO of Human Recognition Systems. Norman too stressed that education is a critical element of the business development and delivery teams’ role for analytics is still to avoid disappointment or underuse of the systems.

22

Where to Run the Analytics?

V

ideo analytics are generally built on two different types of architecture: server-based and edge-based, performed on the camera.

“Camera-side offers scalability and redundancy but lacks in features, performance, and management, whereas server-side offers enhanced performance, features, and management capabilities, but lacks in scalability and has high bandwidth requirements,” explained Zvika Ashani, CTO of Agent Video Intelligence (Agent Vi).

é Zvika Ashani, CTO, Agent Video Intelligence

Server-based analytics enjoy several advantages since the servers are all at one central location: easier configuration, management, and maintenance. Since power supply and cooling are less of a concern, it also allows for increased processing power and support for complex video analytics algorithms that provide high performance and easier integration with VMS and PSIM systems. Running the analytics at the edge saves on bandwidth, as constant video transmission over network is not required. It allows for direct control of PTZ camera with minimum latency and since the uncompressed video is analyzed directly at the camera the video analytics performance improves (the video feed doesn’t change due to compression). Video can be transmitted on demand or automatically when an event of interest is detected (black screen technology). The major obstacle is the camera’s size, power consumption limitations, limited computing power, limited storage space, and limited temperature tolerance operating in direct sunlight or freezing conditions. Industry professionals predict a trend towards more VCA-at-the-edge units to overcome the limitations of the camera is via two approaches: sharing the workload between edge-unit and server or adding computing power to the camera with an external device. “A distributed processing approach which utilizes both camera and server processing provides the best of both worlds in terms of scalability, performance, feature set, manageability and bandwidth consumption,” noted Ashani.

NOV 2014

www.asmag.com

2283


SMAhome

Qivicon opens its door to every possibility

a&s SMAhome magazine sat down with Thomas Knops, Head of Marketing & Sales, Connected Home to talk about Qivicon’s development, its benefits for users, and market trends. According to Knops, the market is still at an early stage of growth, but the commoditization of the smart home has already taken off. By SMAhome

1. How long has Qivicon been in existence? Qivicon was launched in IFA 2013 as a B2B2C platform. When we started in 2013, we had just 6 business partners, but we've now increased this number to over 30. For example, Sonos and Osram are our latest partners. World-famous brands such as Miele, Samsung, Telekom, D-link, etc. are all part of the Qivicon family. More and more partners are expected to be included in the Qivicon platform.

2. Can you explain the relationship between Qivicon and its business partners? Qivicon is a B2B2C platform. We do not sell to end-users directly. Every partner has their own smart home solutions, services, or mobile

8822

NOV 2014

applications with different focuses. The only thing they share is the Qivicon gateway as their central station and the technical platform itself. Qivicon is an open platform designed to connect the whole ecosystem. For example, if you have a Deutsche Telekom solution, and you want to add a D-link camera, it is feasible; simply plug and play. All you have to do is check if the D-link camera is compatible with Qivicon and the Telekom App.

3. The 30 partners that you've thus far named are predominantly western brands. Is there any chance that Qivicon might add Asian companies to the family in the near future? Yes, it is possible. As a matter of fact, we are now talking to an important Asian brand. The news will be soon released. Despite the fact that Qivicon is primarily focused in Europe at the moment, we are interested in other markets around the world. We would like to obtain powerful partners who can introduce Qivicon to local markets. Qivicon works with the Eclipse community to seek potential partners or software developers. Eclipse is a community for individuals and

www.asmag.com

22


organizations who wish to collaborate on commercially-friendly open source software.

Qivicon Partners Brand

Territory

URL

EnBw

Energy Management

www.enbw.com

D-Link

Home Networks & Security www.dlink.com

eQ-3

Home Automation

www.eq-3.de

Miele

Household Appliances

www.miele.com

Samsung

Consumer Electronics

www.samsung.com

T-Mobile

Telecommunications

www.t-mobile.com

aetka

Telecommunications Retail www.aetka.de

Belkin

Connected Electronics

www.belkin.com

Bernal

Garage Door Automation

www.bernal.de

BitronHome

Home Automation & Security

www.bitronvideo.eu

Cyberport

Electronics Retail

www.cyberport.de

6. Is openness the major benefit that Qivicon brings to users?

Digitalstrom

Energy Management

www.digitalstrom. com

Yes, I would say openness is one of the major attractions. Users are not bound to one particular provider. Two more benefits should not be missed. First, users understand that Qivicon is backed by Deutsche Telekom, which has long history and a solid support base among its clients. Users do not need to worry about the credibility of Qivicon and its security. We can supply reliability to end users. Secondly, Qiviconbased solutions are very easy to use. They are designed for general users with no technical background. No complex settings are required. And if you relocate from one apartment to another, you simply move the device like a TV set.

Digitus

Computer Accessories

www.digitus.info

E.G.O.

Household Appliances

www.egoproducts. com

Eno

Telecommunications Distributor

www.eno.de

Entega

Energy Management

www.entega.de

Euronics

Electronics Retail

www.euronics.co.uk

Herweck

Electronics Retail

www.herweck.de

Integrierte

IT Solutions

www.in-gmbh.de

Kärcher

Vacuum Cleaners

www.karcher.com

Osram

Lighting Solutions

www.osram.com

PaX

Doors & Windows

www.pax.de

Philips

Consumer Electronics

www.philips.com

Rheinenergie

Energy Provider

www.rheinenergie. com

Sonos

Wireless Audio

www.sonos.com

Tunstall

Telecare Solutions

www.tunstall.co.uk

Vattenfall

Energy Provider

corporate.vattenfall. com

4. Does Qivicon plan to launch own-brand hardware? A Qivicon camera, for example, or a Qivicon smart plug? No. Qivicon’s role in the smart home industry is to provide an open platform to its partners and end users. Just as it is with Intel and PC, Intel won’t launch its own PC or laptop, as they may come into conflict with PC manufacturers who are also their clients. Qivicon is in a similar circumstance. We do not develop our own devices, as it may create tensions with our existing partners. And if we do so, no companies will partner with Qivicon.

5.Who are Qivicon’s primary competitors? I haven’t seen any supplier quite like us in Europe, but from a global perspective, Google Nest, Apple, SmartThings (by Samsung Electronics) are also in very favorable positions. I won’t say that they are our competitors. Instead, Qivicon can hook up with them, just as we have done with SONOS and Philips. Again, we are an open platform. Partnership is the driving force behind Qivicon's market strategy.

7. If you were to compare the current smart home market with its conditions as of three years ago, what has been the most significant shift? I will respond to this in four parts. Overall, more and more products have been launched in the market. Not merely solutions. Many standalone products are available, and end-users are able to select from far more choices than they could before. Pricing variety helps the industry. Starter-kits that cost a mere 199 Euros encourage new users to try smart home products. With the expansion of the pricing range from 199 to 300 or more, users can pick whatever suits their need. Communication-wise, increasing demand has been pushing more products to solve basic problems for consumers. In Germany, the energy issue has been highlighted. Users demand better ways to manage their energy expenses, and smart home solutions can help with that. Though, distribution-wise, there are no sales channels dedicated to the smart home, more channels in different industries have begun to be involved in smart home products. The market is still in its infancy, and it will take a few years to truly commoditize it. However, the smart home market is on a similar developmental track to that of the smart phone. And it has already taken off.

22

NOV 2014

Remark: The information above was obtained from the Qivicon website at https://www.qivicon.com/en/partners/ in November 2014. For the most up-to-date listing, please refer to the website.

www.asmag.com

2289


Special Feature

Up, Up and Away!

“Supercloud”

Rewrites Security

n By Steve Chin

W

hen some people think of the cloud, they might also think that it’s unnecessary, cumbersome, unreliable, and/or slow. The reality is though, the cloud has already been with us for a number of years, and is now being utilized in many different forms. In fact, one of the most oft-cited examples is online banking, where we have already learned to trust the cloud with our money, proving that the cloud is definitely feasible and reliable. Cloud solutions in the security industry are growing at a relatively fast pace, and adoption has become more and more widespread. No longer just a form of storage, the cloud can now be utilized in all forms of solutions, be it video analytics, or as part of a total solutions package. It is safe to say that the cloud will take an ever bigger role in security, and especially as cloud continues to technologically advance.

Cloud Brings Distinct Advantages As mentioned previously, different forms of cloud are being utilized in everyday life around the world now. In fact, the cloud can no longer be considered a new technology, having been around and improved upon for

9022

NOV 2014

a number of years already. Users are picking up on this trend as they realize the cloud will improve their existing systems on many aspects, including cost efficiency, near limitless storage space, easier backup and recovery, and easier integration across existing and new software. The security industry is no exception. Ivan Medved, Director of Global Business Development, Axis Video Hosting System at Axis Communications put it simply, “There has been significant increases in requests for cloud-based surveillance solutions. It is obvious that security installers have realized cloud can differentiate their offerings and increase value as well as lower maintenance costs.”

Mitigating Concerns and Questions While it is true that the cloud is not the perfect end-all solution, with issues with bandwidth, reliability, security, and safety being concerns that critics and users alike bring up, the cloud has come a long way. Indeed, David Ly, Chairman and CEO of Iveda brought up a good point in regard to

www.asmag.com

22


C 22

NOV 2014

www.asmag.com

2291


Companies in This Issue Products of the Month

• Network Video Technologies • OT SYSTEMS • VIVOTEK

Industry Report • AXIS COMMUNICATIONS • BOSCH SECURITY SYSTEMS • DAHUA TECHNOLOGY • DYNACOLOR • EVERFOCUS ELECTRONICS • FLIR SYSTEMS • HDPRO • HIKVISION DIGITAL TECHNOLOGY • HONEYWELL SECURITY • IDIS • ITX SECURITY • MAGAL SECURITY SYSTEMS • MILESTONE SYSTEMS • NEDAP security management • SIMONSVOSS TECHNOLOGIES • SUPREMA • TAMRON • VERINT SYSTEMS • VIVOTEK

Product Exploration • GIGA-TMS • HID GLOBAL • LEGIC IDENTSYSTEMS • LOGITAG • tYCO RETAIL SOLUTION • nEDAP IDENTIFICATION SYSTEMS

Intelligent Video Solution

• AGENT VIDEO INTELLIGENCE • BOSCH SECURITY SYSTEMS • G4S Technology usa • HUMAN RECOGNITION SYSTEMS (HRS) • INFAX • IOMNISCIENT • IPSOTEK • MAGAL SECURITY SYSTEMS • NICE SYSTEMS • PELCO BY SCHNeIDER ELECTRIC • REDISUL

Vertical Market • AON GLOBAL RISK CONSULTING SECURITY PRACTICE • HONEYWELL SECURITY • MAYO CLINIC HEALTH SYSTEM • MILESTONE SYSTEMS • VIDSYS

Special Feature • GENETEC • AXIS COMMUNICATIONS • BRIVO SYSTEMS • IVEDA • PANASONIC cameramanager

Next Issue Product Exploration

EQUIPMENT FOR CRITICAL ENVIRONMENT

Vertical Market BANKING

Intelligent Video Solution PERIMETER SECURITY

Special Feature

YEARLY GLOBAL MARKET REVIEW/PREVIEW

22

NOV 2014

www.asmag.com

22 109


*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

21

3S VISION

IP CAMERA / NVR / VIDEO SERVER

TAIWAN

Sales@3svision.com.tw

53

AIMETIS CORP.

SOFTWARE

CANADA

info@aimetis.com

15

AXIS COMMUNICATIONS AB

NETWORK VIDEO SOLUTIONS

SWEDEN

contact-sap@axis.com

39

BOSCH SECURITY SYSTEMS

CCTV

GERMANY

apr.securitysystems@bosch.com

28, 29

CNB TECHNOLOGY INC.

CCTV

KOREA

korea@cnbtec.com

41

COMMAX CO., LTD.

SURVEILLANCE

KOREA

hkki@commax.com

BARN DOOR, INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

8

DYNACOLOR INC.

IP CAMERA / NVR

TAIWAN

info@dynacolor.com.tw

51

EVERFOCUS ELECTRONICS CORP.

CAMERA / DVR / IP CAMERA

TAIWAN

marketing@everfocus.com.tw

77

FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

9

GKB SECURITY CORPORATION

IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR

TAIWAN

sales@gkbsecurity.com

5

HDPRO CO., LTD.

CCTV

KOREA

sales@hdprocctv.com

46, 47, BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

DVR

CHINA

overseasbusiness@hikvision.com

10

ICATCH INC.

DVR

TAIWAN

marketing@icatchinc.com

97

ITE TECH. INC.

ccHDtv TX / RX CHIPSETS

TAIWAN

itesupport@ite.com.tw

FRONT COVER

MERIT LILIN ENT CO., LTD.

IP CAMERA / NVR

TAIWAN

sales@meritlilin.com

75

MINRRAY INDUSTRY CO., LTD.

SPEED DOME / CAMERA

CHINA

minrray@mingricctv.com

112

MINTRON ENTERPRISE CO., LTD.

CAMERA

TAIWAN

service@mintron.com.tw

6, 7

NEXTCHIP CO., LTD.

CHIP

KOREA

sales@nextchip.com

77

OB TELECOM ELECTRONICS CO., LTD.

FIBER OPTIC TRANSCEIVER

CHINA

overseas@obtelecom.com

INSIDE BACK COVER

PANASONIC SYSTEM NETWORKS CO., LTD.

DIGITAL SURVEILLANCE

JAPAN

---

105

QIHAN TECHNOLOGY CO.,LTD.

SURVEILLANCE

CHINA

marketing@qihan.cn

23

QNAP SYSTEMS, INC.

NVR / VMS

TAIWAN

nvr@qnap.com

2

RIFATRON CO., LTD.

DVR

KOREA

contact@rifatron.com

63

SHENZHEN COMMANDER TECHNOLOGY CO., LTD.

CASING

CHINA

sjw@yjdcase.com

70, 71

SHENZHEN SUNELL TECHNOLOGY CORPORATION

CAMERA

CHINA

sales@sunellsecurity.com

25

SHENZHEN TVT DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@tvt.net.cn

56, 57

SHENZHEN ZNV TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

znvservice@zte.com.cn

4

TAMRON CO., LTD.

CAMERA

JAPAN

newbiz@tamron.co.jp

11

TVLOGIC CO., LTD.

DVR

KOREA

yshong@tvlogic.co.kr

19

VIVOTEK INC.

IP CAMERA / SOFTWARE / VIDEO SERVER

TAIWAN

sales@vivotek.com

3

WEBGATE INC.

DVR

KOREA

support@webgateinc.com

ACCESS CONTROL PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

31

FINGERTEC WORLDWIDE SDN. BHD.

FINGERPRINT

MALAYSIA

info@fingertec.com

63

FUJICA SYSTEM CO., LTD.

ACCESS CONTROL

CHINA

export@fujica.com.cn

67

GIGA-TMS INC.

RFID MODULE / LOCK / READER

TAIWAN

promag@gigatms.com.tw

27

LI SHYANG TECH CO.,LTD

ELECTRIC LOCKS

TAIWAN

Is@home-safe.com.tw

17

SUPREMA INC.

FINGERPRINT

KOREA

sales@supremainc.com

61

VOIM TECHNOLOGIES INC.

FINGERPRINT

KOREA

sales@ten-bio.com

PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

32, 33

PIXELPLUS CO., LTD.

SEMICONDUCTOR

KOREA

kahn@pixelplus.com

75

SCENE ELECTRONICS (HK) CO., LTD.

ILLUMINATOR

CHINA

sales@led-scene.com

12, 13, 54, 55

SONY CORPORATION DSBG. SYSTEM LSI DIVISION

SEMICONDUCTOR

JAPAN

-

OTHER

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.