A&s international Oct 2014(trial version)

Page 1


&217(176

2FW

3URGXFW«([SORUDWLRQ

,GHQWLW\ 0DQDJHPHQW P.50

6ROXWLRQV .HHS ,QWUXGHUV DW %D\ Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well.

P.56

9HUWLFDO«0DUNHW

P.66

14

2LO DQG *DV )XHO 8S RQ 6DIHW\

OCT 2014

9HUWLFDOV 6WDQG WR %HQHILW )URP ,GHQWLW\ 0DQDJHPHQW 6ROXWLRQV

6SHFLDO«)HDWXUH

P.86

+' RYHU &RD[LDO 8OWLPDWH %DWWOH IRU 6XUYLYDO E\ $QDORJ 0DQXIDFWXUHUV


&217(176

2FW

,QWHOOLJHQW«9LGHR«6ROXWLRQ

&DVLQR X 9&$

6D\ 1R WR :URQJ 'RHUV Everyone knows what surveillance cameras in casinos are for, but no one really worries about them unless they have something to hide, and for people who do, they hide it well. No longer do casinos bet solely on security cameras to spot crime ongoing in their premises, with video content analysis (VCA) to detect any unusual incidents, the house will always win.

P.74

&DVH«6WXG\« P.82

1HZV«)HDWXUH

6WDWH RI WKH $UW ,QFLGHQW 0DQDJHPHQW 6\VWHPV 6HFXUH 5HVRUWV :RUOG &DVLQR 1HZ <RUN

P.36

$QL[WHU DQG 7UL (G %UDQFKLQJ 2XW 6HFXULW\ %XVLQHVV

60$KRPH P.90

',< 6XUYHLOODQFH .LWV IRU +RPHV P.14 &RQWHQWV P.18 (GLWRU¶V«1RWH« P.20 &RUSRUDWH«1HZV

16

OCT 2014

P.30« 3URGXFWV«RI«WKH«0RQWK P.94« 6KRZ«&DOHQGDU« P.96« 1HZ«3URGXFWV

P.92 6KRZ«6SRWOLJKW P.101 &RPSDQLHV«LQ«7KLV«,VVXH


(',725 6 127( a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies developments in CCTV, Digital Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home

/DWHVW L3KRQH 7ULJJHUV 1)& $GRSWLRQ

Automation and other fields relevant to electronic security.

,661 Ë ŕľ˘ŕśľâ€ŤÍ”̝ݭ‏ύୡ ŕźš ੮ŕş—ŕ´š৪޾á•ťáƒ’Î ŕŞ€

Apple’s iPhone 6 was finally launched this September. Again, it caused great sensation around the globe. Besides the better looking design and other advanced functionalities, the iPhone 6 now has an NFC antenna in it, supporting payment via Apple Pay. And, in keeping with its previous feature, iPhone 6 also has a fingerprint scanner inside, which further helps with identity verification to secure the transaction. So far Apple still hasn’t opened up its APIs to other developers, and it is still hard to develop NFC-enabled devices for iPhones. However, through the launch of the latest iPhone and other smartphones, we can predict, in the near future, that NFC will surely become the next trend for many industries after Bluetooth technologies; again igniting the growth momentum of NFC used for physical access control, too. As the trend of online or mobile payment gains popularity and the industry starts to provide different methods to open and manage doors — instead of using traditional keys and cards only — the access control market has become more interesting and ready to grow and develop further. One issue the trend brings up is how to better manage and secure people’s identities in different occasions and for different purposes. This month, we discussed how and what companies are providing to manage and protect identities in the enterprise sector. Multifactor access control systems, with biometrics, combined with advanced encryption technologies, are what the industry mostly offers. However, the challenge right now is still low market awareness toward identity management and protection from end users. In the future, through the launch of more NFC-enabled smartphones and other devices, we hope identity management can be more greatly valued! Remember to check out this issue’s cover story for more information. Hope you enjoy it.

Parson Lee Joseph Lee John Shi

Publisher & Managing Director General Manager General Manager

Editorial

General Press Jill Lai Alf Chang Eifeh Strom Steve Chin William Pao Lisa Hsu Weiting Chen

Editor in Chief Senior Consultant Senior Editor Reporter Reporter Reporter Coordinator

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com steve.chin@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com weiting.chen@newera.messefrankfurt.com

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu

Circulation & Subscription

Michelle Shih

Coordinator

michelle.shih@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Assistant Manager

jerry.wu@newera.messefrankfurt.com

Trade Fair Manager Manager Project Manager

peggy.wu@newera.messefrankfurt.com echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com

asmag.com

Jerry Wu Secutech

Peggy Wu Echo Lin Eva Tsai

International Advertising [Headquarters]

Juihui Lin Kay Yang Audrey Fang Wayne Ho

Manager Operation Officer Coordinator Sales Officer

juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com wayne.ho@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Y. C. Suh Takashi Komori Nguyen Thu Ha

USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam

bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn

0HVVH )UDQNIXUW 1HZ (UD %XVLQHVV 0HGLD /WG Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com

<[^^ >S[

jill.lai@newera.messefrankfurt.com

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‹ 0HVVH )UDQNIXUW 1HZ (UD %XVLQHVV 0HGLD /WG $OO ULJKWV UHVHUYHG 1R SDUW RI WKLV PDJD]LQH PD\ EH UHSXEOLVKHG UHSULQWHG RU UHGLVWULEXWHG LQ DQ\ IRUPV LQFOXGLQJ HOHFWURQLF ZLWKRXW ZULWWHQ FRQVHQW IURP WKH SXEOLVKHU

$GYHUWLVHUV DUH UHVSRQVLEOH IRU WKHLU RZQ DGYHUWLVHPHQW FRQWHQW 7KH SXEOLVKHU LV QRW OLDEOH IRU DQ\ OHJDO LPDJH SDWHQW RU WUDGHPDUN GLVSXWHV IURP DGYHUWLVHPHQWV RU DPRQJ DGYHUWLVHUV /HJDO FRQVXOWDQW -XOLD 6 + <X $WWRUQH\ DW /DZ )LUVW /DZ ,3 2IILFHV

18

OCT 2014


&25325$7( 1(:6

VIVOTEK Cameras Create a Secure Environment in Hotel Bania in Poland Located in Bialka Tatrzanska Mountain Resort in the central Tatra Mountain region, Bania Hotel is among the most luxurious hotels in Poland. An array of indoor and outdoor surveillance solutions is required throughout the complex. To satisfy the end user’s needs, features such as megapixel image quality, round-the-clock surveillance, intelligent IR illumination, and wide dynamic range (WDR) functionality are essential. Bania Hotel management chose VIVOTEK products, which provide optimal cost-to-performance ratio among numerous surveillance solutions available on the market. With the assistance of specialists from Suma, VIVOTEK’s key partner and distributor in Poland, a surveillance system was delivered, thus fulfilling the end user’s high expectations.

PSIA Achieved Milestones in PLAI Specification The Physical Security Interoperability Alliance (PSIA) announced it has achieved important new milestones within its physical logical access interoperability (PLAI) specification less than a year after forming a working group to develop it. PLAI is being designed to enable employee identities and roles defined or revoked in an authoritative logical identity system to automatically propagate to one or more PLAI-compliant physical access control systems (PACS). PLAI synchronizes physical and logical identity management and access control and standardizes functions that typically have required custom programming to achieve. PLAI now can accomplish the following: • Compatibility with PACS from multiple vendors; • Enable initial registration of an employee from an authoritative source (IT or HR logical directory) to the PACS; • Establish role-based privileges at the authoritative source and propagates this logical privilege data throughout multiple PACS; • Propagate the credential information (both in the form of cards or upcoming mobile credentials) of an employee from one PACS to others, thus supporting enhanced access control at multiple facilities; • Easily invoke and revoke physical access privileges in multiple PACS. PLAI asserts roles defined by an authoritative source (HR or IT) so these roles do not need to be redefined in the PACS. The use of a single authoritative source by multiple PLAI-enabled PACS ensures the validity and synchronization of an employee’s physical and logical identity data.

Morpho Acquires Dictao Morpho (Safran) finalized the acquisition of Dictao, the publisher of software solutions for security and digital trust. Based in France, Dictao has 100 employees and offers solutions for strong authentication, secure online transactions, and secure archiving. The acquisition of Dictao reflects Morpho’s development strategy and confirms its leadership in the security market. The two companies’ digital identity businesses are highly complementary, from ID document management to use. Morpho will be able to offer an even more extensive range of highly secure solutions to both governments and private sector companies such as banks, insurance firms, manufacturers, etc.

20

OCT 2014

American Dynamics’ Integrated Security Solution Safeguards Atlanta School District American Dynamics, a Tyco Security Products brand, announced that Cherokee County School District (CCSD), located in the Atlanta metro area, has chosen its video security solutions to secure its schools and other facilities. One of the largest public school systems in the state of Georgia, CCSD encompasses 57 schools and other buildings, including 24 elementary schools, seven middle schools, seven high schools, three preschool centers, central offices, and warehouses, along with its 40,000 students and 4,500 staff. The school district needed a surveillance solution that would enable public safety staff to monitor both live and recorded video from its facilities. CCSD selected the hybrid recording platform from American Dynamics to allow the school district to upgrade and grow its surveillance security system gradually, without completely replacing its existing analog infrastructure. Tyco Integrated Security served as the systems integrator for this project. Once the installation is complete, CCSD will be able to employ more of the surveillance system’s features and capabilities for an integrated platform across all of the district’s facilities.


&25325$7( 1(:6

Extreme Networks and Axis Team Up to Secure the Little League World Series Extreme Networks teamed up with Axis Communications to provide the wired and wireless infrastructure needed to deliver complete video surveillance during the 2014 Little League Baseball World Series (LLWS). Together, the companies enhanced the overall security of players and fans alike. This year, Extreme Networks made its debut protecting the series joining Axis as it enters its fifth year. To secure 350,000 expected spectators during the 10 day event, Extreme Networks provided its gigabit Ethernet switches to form the backbone of the state-of-the-art security solution. Extreme Networks’ solutions complement the stadium’s access control network and connected more than 40 Axis IP digital video surveillance cameras throughout the complex. Extreme Networks’ switches promote deployment simplicity of the surveillance network due to software automation through the operating system, automating key configuration, and management policy settings across the infrastructure. The Extreme Networks’ switches boast enabled network convergence, high availability and resiliency, programmable extensibility, scalability for future network growth, comprehensive security features, and high performance, high bandwidth, and non-blocking architecture. New for the 2014 tournament, the LLWS deployed the advanced Axis’ pan/tilt/zoom cameras to manage crowd safety at the packed event. The cameras’ responsive performance and unique vantage point could help security staff to quickly scan crowds to locate lost children, track suspicious packages or vehicles, and zero into any area of concern with high detail. The Axis cameras’ open platform allows close integration with the Extreme Networks switches, and their Power-over-Ethernet capabilities assisted with the speedy installation of the wireless infrastructure required in temporary surveillance systems.

Fluidmesh Solutions Make a Splash at Magic Waters Waterpark Got Wi-Fi? That’s a question Magic Waters WaterPark, in Cherry Valley, Illinois, U.S., asked itself in response to growing consumer demand for public Wi-Fi accessibility. The award-winning attraction, which is managed by the Rockford Park District, is always a crowd pleasing destination so its desire to provide patrons with free Wi-Fi service was a perfect add-on to the park. James Shaw, Systems Administrator/Communications Specialist for Rockford Park District’s IT division, was tasked with leading the project. The objective, Shaw explained, was to create an additional network throughout the park as a back-up to their aging fiber network. The installation got underway after the waterpark closed for the 2013 season. The mesh network was completed in the fall of 2013, and was put into operation during the summer 2014 season. The network encompasses Fluidmesh1100 radios arranged in a ring formation throughout the water park with eight hop points. Each hop point also has an Aerohive AP connected only to the mesh network. Two Fluidmesh APs are configured as mesh-ends and both are located at the site’s main Cisco switch. Another virtual local area network (VLAN) was recently added to the mesh to provide wireless bridges to pump room chemical monitors, as well as to enable network access to maintenance buildings that were not previously hardwired with networking.

26

OCT 2014

CNL Provides PSIM to Hospital in South Africa CNL Software, one of the suppliers in physical security information management (PSIM) software, have been chosen to provide a comprehensive security management system for a hospital facility in South Africa. Healthcare security is facing increased violence, crime rate, and vandalism. The security challenge includes not only maintaining the safety of patients, staff, and visitors, but also protecting medicines and medical equipment and securing facilities and buildings. Mitigation of security incidents is essential as breaches can have life safety consequences, as well as capital and equipment loss, financial penalties, and damage to reputation. CNL’s PSIM is a software-based integration and management platform, which connects disparate security systems such as security and building control systems, patient and staff interfaces, RFID patient tagging, nurse call, HR, and other business management systems. The system provides control room operators with real-time situation awareness, through a common operating picture and following an alert, alarm, or trigger.


352'8&76 2) 7+( 0217+

+ &RPHV 5RXQG WR WKH 0DUNHW Editor’s Note: Being the successor of H.264, the current standard compression format in the industry, H.265 plays a crucial part in supporting the 4K and 8K ultra-high definition (UHD) trend in the industry since it takes only half the bandwidth and storage. A few months ago, H.265 remained a myth with no one able to predict when it would be ready to go. Now, some companies, from chipset providers to video surveillance solution providers, have overcome the challenges and officially hit the road with H.265. This issue, the a&s editorial team features the latest offerings in NVRs and IP cameras.

+LNYLVLRQ '6 [[1 + + . 195 The Hikvision 4K NVR supports 4K IP camera input, 4K decoding, and video output, as well as wide preview and playback in 4K resolution. The 4K NVR utilizes H.265 for video compression, compared to H.264, which extremely improves video coding efficiency, helping to save on overall storage space.

=19 6HULHV 03 + ,3 &DPHUD 7200 series cameras use H.265 video coding compression and unique transmission technologies to transmit HD surveillance videos over lower network bandwidth. High-definition images are delivered and no image pause occurs thanks to their ultra-low code rates. Low bandwidth is able to transmit HD videos as good as wide bandwidth. The latest coding technology enables the 7200 series H.265 HD IPC to provide users 300 percent free spaces for video footages; the 7200 series presents the same definition and recording duration as H.264 cameras, but occupies only one-third the recording consumption and footage space of normal cameras. 7200 series H.265 HD IP cameras have a low-light feature and are able to capture HD video under very weak light like moonlight.

$YHQWXUD + +(9& 03 &026 1HWZRUN %R[ &DPHUD H.265HEVC is a new generation of image compression technology that expands the capabilities for surveillance initiatives. In conjunction with the state-of-the-art advantages of HEVC, Aventura has added a litany of enhanced features which raise the bar to which the competition aspires. Aventura’s advanced imaging technology allows for minimizing compression in active areas within the scene and maximizing in peripheral areas where activity is low and/or insignificant. Decoded video can be produced with various frame rates, resolution, and quality. Aventura’s implementation of temporal and spatial scaling efficiencies is an extension of the native codec algorithm. Three unique transmissions provide for controlled access for a variety of network operating environments from LAN/WAN to mobile devices.

30

OCT 2014

.H\ )HDWXUHV ‡ 6XSSRUWV XS WR . UHVROXWLRQ UHFRUGLQJ ‡ 6XSSRUWV XS WR 0ESV LQFRPLQJ EDQGZLGWK IRU QHWZRUN FDPHUD LQSXW ‡ +'0, RXWSXW DW UHVROXWLRQ RI [ ‡ +RW VZDSSDEOH 6$7$ LQWHUIDFHV IRU +''V ‡ 'XDO JLJDELW QHWZRUN LQWHUIDFHV ‡ 6XSSRUWV 5$,' DQG 6XSSOLHU +LNYLVLRQ 'LJLWDO 7HFKQRORJ\ 85/ ZZZ KLNYLVLRQ FRP

.H\ )HDWXUHV ‡ + YLGHR FRPSUHVVLRQ WHFKQRORJ\ XS WR S DW ISV UHVROXWLRQ ‡ 'HIDXOW S DW ISV DQG FRGH UDWH 0ESV PLQ VWDWLF FRGH UDWH .ESV ‡ /RZ OLJKW PRGHOV KDYH KLJK SHUIRUPDQFH ´ &026 PLQLPXP LOOXPLQDWLRQ OX[ FRORU DQG OX[ % :

‡ $XWR ,&5 VZLWFK IRU GD\ QLJKW VXUYHLOODQFH ‡ +/& DQG %/& IRU PRUH VXUYHLOODQFH VFHQDULRV ‡ ' '15 WR UHGXFH QRLVH DQG NHHS LPDJHV FOHDQ 6XSSOLHU =19 7HFKQRORJ\ 85/ ZZZ ]QY FRP

.H\ )HDWXUHV ‡ 03 UHVROXWLRQ [

‡ ´ SURJUHVVLYH VFDQ &026 ‡ + +(9& 0-3(* ‡ :LGH G\QDPLF UDQJH ' '15 ‡ 8S WR *% 6';& VWRUDJH ‡ $XWRPDWLF EDFN IRFXV ‡ $GDSWLYH LPDJLQJ WHFKQRORJ\ ‡ 7ULSOH VWUHDP VFDODEOH FRGLQJ 6XSSOLHU $YHQWXUD 7HFKQRORJLHV 85/ ZZZ DYHQWXUDFFWY FRP


1(:6 )($785(

$1,;7(5

75, ('

$1' %5$1&+,1* 287

%< 67(9( &+,1

On August 11, 2014 14, Anixter Internat In ational announce ced that the hey y had d en entere red into an n agreemen ent to a acquire TTri ri-Ed, a lea eadi ding dist stri ribu buto tor of sec ecurity so solution ons s for a purchasing price ce o of US$420 20 million. Causing ripples in the security ind ndustry, this acquisition marks a turning g point for Anixter, as they look to expand their security segments.

I THINK THE ACQUISITION GIVES US THE OPPORTUNITY TO PUT EVERYTHING TOGETHER AND PROVIDE OUR DEALERS, CUSTOMERS, AND INTEGRATORS WITH THE BEST-IN-CLASS SOLUTIONS. Bill Galvin, EVP, Enterprise Cabling & Security Solutions, Anixter International

36

OCT 2014

6(&85,7< %86,1(66

O

ne of the predominant global distributors with footprints across the world, Anixter International is a publicly traded American company, valued upwards of US$6 billion. Now in over 50 countries around the world, dealing in local languages, local currencies, and local people, the company has a firm hold on many international locations. With several locations in China, Japan, Singapore, and Australia, “the APAC region is a growth market for Anixter’s security business,” said Bill Galvin, EVP of Enterprise Cabling & Security Solutions at Anixter. Even though it is a relative newcomer to the world of security, only entering the industry in 2000, the fact is Anixter has always had an interest in security while already solidified in multiple other markets. As Galvin explained, “Our interest began because the security business was going through a transformation, especially on the video side, where it was shifting toward IP video systems.” He also further elaborated, “We understood that there was a fundamental change happening in the security business, where a portion of the traditional analog market was moving to IP. Anixter was in a very good position to help customers with that transformation. So in 2000, we began building our security segment all the way up to an over $1.1 billion business today.”

$&48,6,7,216 %2267 $1,;7(5·6 67$786 As Galvin pointed out, Anixter’s strength has been in IP video. Growing up in the IP infrastructure timeline, he explained that with the acquisition of a company of Tri-Ed’s caliber, it will substantially enhance Anixter’s security business by opening up opportunities to have a presence across all the different markets in security and not just in IP. With the September 17 announcement of the closing of the deal, Anixter has now positioned


1(:6 )($785(

itself to further penetrate the security industry. “I think this will address one of the hurdles, which is covering the security market more broadly. I think the acquisition will really give us full capabilities across both analog and IP,� said Galvin. “With the acquisition of Tri-Ed, we can say we’re truly a full-line security distributor.� Expanding on the acquisition of Tri-Ed, Galvin explained that the first step is to integrate the two companies to provide the best solutions for customers. Tri-Ed has a very strong, established position in the mid-market, with over 20,000 integrators and dealers, and it serves customers across a broad range of markets. From residential to the mid-market to large complex security systems, Tri-Ed has a firm grasp on the SMB sector in North America. “I think

that by combining what Tri-Ed is able to do now, with Anixter’s global IP security focused business, we create a platform to add greater value to our customers,� he said. A FULL LINE OF SOLUTIONS

Galvin also brought up the point of Anixter’s other acquisition in 2010: CLARK Security Products, whose strength is focused on access control and door locking hardware systems. Alongside Tri-Ed’s expanded security products such as analog video, intrusion detection, and fire/burglary, Anixter now possesses a full line of security solutions where, as he put it, “It’s very complementary. As we know, security is a massive market that’s also very fragmented, and as we put all these together, we strongly feel like there’s a really good opportunity to address all of

our customers’ needs in security, across an entire broad line.� On top of that, Anixter not only acquires Tri-Ed’s expertise and product line, but also its customer base, further invigorating the company’s existing markets and expanding into other vertical sectors. “Anixter has very little residential play today, but we think Tri-Ed’s position in it can help us understand the markets that we can bring all of our expertise and infrastructure into,� Galvin said. “I think this gives us the capability not only across video, but also across fire and burglary, intrusion, access control, and door entry. I think our opportunity is there to put all that together and provide our dealers, customers, and integrators with best-inclass solutions. It will help them further address the market and simplify service to their own customers.�

Distribution Partners Chime in on Acquisition 2YHUDOO GLVWULEXWLRQ SDUWQHUV RI ERWK $QL[WHU DQG 7UL (G DUH SUHGLFWLQJ D SRVLWLYH RXWFRPH IURP WKH DFTXLVLWLRQ 7KURXJK LW WKHLU SDUWQHUV IHHO WKDW WKH WZR FRPSDQLHV ZLOO FRQVROLGDWH DQG HYHQWXDOO\ IRUP D ODUJHU VWURQJHU SUHVHQFH LQ WKH VHFXULW\ PDUNHW :LWK WKH GHDO RQO\ UHFHQWO\ FORVLQJ LW KDV WKXV IDU EHHQ PHW ZLWK FDXWLRXV RSWLPLVP ZLWK 5DIDHO 0DGULJDO ,QWHUQDWLRQDO 6DOHV 0DQDJHU DW 197 H[SODLQLQJ ´7ZR PDMRU SOD\HUV MXVW PHUJHG WKXV LQ GHILQLWLRQ WKHUH ZLOO EH FRQVROLGDWLRQ :H WKLQN WKHUH DUH SOHQW\ RI QDWLRQDO SOD\HUV LQ WKLV VSDFH DV ZHOO DV PDQ\ UHJLRQDO GLVWULEXWRUV WKHUHIRUH ZH GRQŇ‹W WKLQN WKLV ZLOO KDYH DQ HQRUPRXV LPSDFW ZKHQ LW FRPHV WR DFTXLULQJ WKH VDPH EUDQGHG SURGXFWV E\ LQWHJUDWRUV Âľ +RZHYHU 0DGULJDO DOVR FRPPHQWHG ´IRU $QL[WHU WKLV DIIRUGV WKHP WKH DELOLW\ WR FRQGXFW EXVLQHVV ZLWK 7UL (GŇ‹V PRVW OR\DO FXVWRPHUV DQG DFTXLUH LQVWDQW DFFHVV WR QHZ PDUNHWV ERWK YHUWLFDOO\ DQG SK\VLFDOO\ )URP 197Ň‹V SHUVSHFWLYH WKLV LV D SRVLWLYH QRWH Âľ %ULDQ -DPHV 'LUHFWRU RI 6WUDWHJLF $FFRXQWV IRU 3HOFR E\ 6FKQHLGHU (OHFWULF DOVR EURXJKW XS WKH SRLQW RI FRQVROLGDWLRQ VD\LQJ ´7KH DFTXLVLWLRQ FHUWDLQO\ PHDQV FRQVROLGDWLRQ RI VHFXULW\ GLVWULEXWLRQ LQ WKH 8 6 VRPHWKLQJ WKDW KDV EHHQ KDSSHQLQJ IRU WKH ODVW \HDUV $V WKH

38

OCT 2014

ĆżBrian James, Director, Strategic Accounts, Pelco by Schneider Electric

ĆżGordon Lang, Director, Strategic Partners & National Accounts, Hikvision USA

ĆżRafael Madrigal, International Sales Manager, NVT

OLQHV FRQWLQXH WR EOXU EHWZHHQ ZKR ZLOO EH SURYLGLQJ VHFXULW\ VXUYHLOODQFH DQG DFFHVV FRQWURO SURGXFWV DQG VHUYLFHV WR WKH HQG XVHUV GLVWULEXWLRQ ZLOO FRQWLQXH WR HYROYH WR SURYLGH VHUYLFHV WKDW WKHVH QHZ FXVWRPHUV GHPDQG 7KH QHZ $QL[WHU RUJDQL]DWLRQ LV SRVLWLRQHG YHU\ VWURQJO\ WR FRPSHWH LQ WKLV HYROYLQJ LQGXVWU\ Âľ ,Q WKH ORQJ UXQ H[SHFWDWLRQV DUH WKDW ERWK $QL[WHU DQG 7UL (G ZLOO EHQHILW IURP WKH DFTXLVLWLRQ WKURXJK H[SDQGLQJ RQ WKHLU SURGXFW DQG PDUNHW IRRWSULQWV $V *RUGRQ /DQJ 'LUHFWRU RI 6WUDWHJLF 3DUWQHUV 1DWLRQDO $FFRXQWV IRU +LNYLVLRQ 86$ FRPPHQWHG ´7KLV LV SDUW RI D FRQWLQXLQJ WUHQG RI ODUJHU GLVWULE XWRUV EX\LQJ VPDOOHU RQHV WR LQFUHDVH WKHLU IRRWSULQW DQG RU H[SDQGLQJ WKHLU PDUNHW IRFXV 7KH ŇŠZKROHŇ‹ EHFRPHV JUHDWHU WKDQ WKH VXP RI LWV SDUWV Âľ 0DGULJDO IXUWKHU H[SODLQHG ´$QL[WHU KDV QRZ DGGHG PRUH SRLQWV RI VDOH DQG ZKLOH WKHUH PD\ EH VRPH RYHUODS HFRQRPLHV RI VFDOH LQ SURGXFW VHOHFWLRQ ZLOO RFFXU WR JLYH $QL[WHU EHWWHU OHYHUDJH LQ WKH VXSSO\ FKDLQ DQG HYHQWXDOO\ ZH H[SHFW WKRVH VDYLQJV WR EH SDVVHG RQWR WKHLU FXVWRPHUV ZKHUHE\ HYHU\RQH LQ WKH HQG ZLQV Âľ +H DOVR DGGHG ´7KH NH\ KHUH LV WKDW 7UL (G FXVWRPHUV DQG $QL[WHU FXVWRPHUV QRZ KDYH RQH VRXUFH IRU DOO WKHLU EXLOGLQJ SURMHFW QHHGV Âľ


$'9(5725,$/

$+' WKH *DWHZD\ WR )+'

$ 1HZ (UD IRU WKH $QDORJ +' 0DUNHW „ 68%0,77(' %< 1(;7&+,3

W

e are in a new era of the video surveillance market, especially in regard to full HD (FHD)/ m HD transmission technology, an explosion in the H FHD/HD transmission technologies. In transmitting variety of FH resolution images, FHD/HD data, there are two options in high resolutio raw data transmission and IP transmission based the market: ra compression. on compress Generally, rraw data transmission is more familiar to the Asian market than the t European/American market, where focus is on IP-based ssystems. To survive within the same video surveilmarket, new technology must overcome its weaknesses lance market and outdo its competitors. At present, raw transmission technologies for analog transmissions are gaining popularity in the market. Raw transmission technologies have a strong signal characteristic based on analog transmission and are easier to access on tthe manufacturers’ side. Since manufacturers are aaccustomed to developing analog products over IIP-based ones, this technology has become the most popular technology on the market now. m Covering all resolutions from standard definition C (SD) to FFHD, as well as providing longer distance than the same high quality images and transmission HD-SDI but th latency, Analog HD (AHD), a unique transmission without laten powered by Nextchip, is taking the spotlight. The solution pow technology from Nextchip, a dedicated video processing core technolo expert, is the major reason for the technology’s success. Due to the dilemma the video surveillance market has been in due tto the cost and transmission distance of FHD/HD systems, the introduction of AHD technology provides a better solution not jjust to customers, but the overall market too.

$+' )520 $1$/2* 72 )8// +' $+' )52 Nextchip is a fabless company specialized in the design of semiconductors. Nextchip has been developing its own core semiconduct technologies like IPs and algorithms in image processing and

44

OCT O C T 2014 2001144


optimizing them into a single chip. These technologies have been adapted in both video surveillance cameras and DVRs for 17 years. Nextchip has been focusing on the surveillance market for almost two decade. With knowledge of customers’ needs and possessing all the core technologies, Nextchip is set to impact the surveillance market as one of the top players in ISP and video decoders. Based on these technologies and

+LJKO\ )OH[LEOH ,QWHJUDWHG 6\VWHP

know-how, in 2013, as the first phase of the transmission solution, Nextchip launched a new SD transmission technology, COMET (COMposite Video Enhanced Technology), an improvement

to the conventional CVBS in terms of cross color/cross luminance and H/ V resolution that is shown in high frequency parts. Therefore, COMET provides marked clearer and sharper

Uncompressed real-time and fully integrated video streams.

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Ò‹ IOH[LELOLW\ LQ KDUGZDUH VLGH DQG IDVW PDUNHW SHQHWUDWLRQ LQWR WKH )+' GRPDLQ

www.asmag.com

45


352'8&7 (;3/25$7,21

,GHQWLW\ 0DQDJHPHQW

6ROXWLRQV .HHS ,QWUXGHUV DW %D\ „ %< :,//,$0 3$2

Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well. Determining whether these people are who they say they are and allowing them access to critical areas or secure networks has become a major focus for end users, who can be aided by advanced technologies such as multifactor authentication.

50

OCT 2014


Each level of identity verification adds a further layer of protection. Strong authentication technology significantly strengthens the fabric of the layered security.

I

dentity management is a growing sector. A recent Research and Markets report indicated that the industry stood at a size of US$5.1 billion in 2013 and is expected to hit $10.4 billion in 2018, translating into a compound annual growth rate of 15.1 percent. Growth is driven by strong demand from organizations seeking to protect premises and sensitive data from intruders. Being able to identify people accurately is critical, especially for large enterprises that maintain thousands, if not tens of thousands, of workers around the globe. Further, the roles assumed by workers have become more diverse. For enterprises nowadays, staff does not just include full-time employees but also part-time workers, temp workers, and contractors. The need to effectively manage these workers and grant them access to company premises or data has therefore spawned advanced management solutions. “The process of managing identities and authorizations should be straightforward and user-friendly in order to manage many different identities quickly, while at the same time decreasing the chance that human mistakes occur,” said Arjan Bouter, Head of Sales at Nedap Security Management. “If you use temporary staff to make the most of seasonal peaks, you set (the system) so they’re only authorized to access your production facility for a specific period. When this period ends, their access rights are withdrawn automatically.”

www.asmag.com

51


352'8&7 (;3/25$7,21

9HUWLFDOV 6WDQG WR %HQHILW )URP

,GHQWLW\ 0DQDJHPHQW 6ROXWLRQV „ %< :,//,$0 3$2

From higher education to healthcare, users in different vertical markets need good identity management solutions to authenticate users and grant them access to buildings or network data. This article explores how identity management solutions are applied to different verticals.

56

OCT 2014

D

ifferent verticals face different identity management needs. Healthcare providers, for example, are concerned with intrusion into patients’ medical records, while corporate users demand effective management of employees who are hired or terminated. Good identity management solutions benefit different verticals in a variety of ways.

+($/7+&$5( Healthcare operators deal with security issues on a regular basis. These include conflicts between doctors and patients and unauthorized access to critical areas, such as X-ray rooms, intensive care units, and birthing and infant care centers.


352'8&7 (;3/25$7,21 Another huge problem facing healthcare operators is the theft of patients’ medical data. “There have been a number of breaches in recent years that have compromised millions of private patient medical records. Username and password are not enough to protect these highly sensitive documents, and a stronger form of authentication is necessary,� said Jennifer Dean, Identity and Access Marketing Communication Manager at Gemalto. “As regulatory requirements become more stringent by the day, hospital and medical office administrators are under increasing pressure to maintain data integrity and protect patient records. There is a real need for a standardized identification system that integrates physical and logical access — a solution that is secure and auditable, but that’s still easy to deploy and convenient for users.� An emerging approach to integrate physical and logical access uses the NFC technology, which enables users to carry a smart card or smartphone with an authentication credential stored on the device’s secure element (SE) or SIM chip. “With these mobile soft tokens, users can simply ‘tap in’ to hospital facilities, VPNs, wireless networks, and cloud- and web-based applications,� said Jordan Cullis,

There have been a number of breaches in recent years that have compromised millions of private patient medical records. Username and password are not enough to protect these highly sensitive documents, and a stronger form of authentication is necessary. Jennifer Dean, Identity and Access Marketing Communication Manager, Gemalto

One main security pitfall in the corporate environment is not collecting credentials after an employee leaves the company. This allows them access at any time in the future. By managing their identities electronically, access rights can be immediately removed. Jeremy Earles, Credentials Business Leader, Allegion

Head of Identity Assurance for APAC at HID Global. “Affiliated doctors who might previously have carried as many as 20 one-time password tokens will now be able to carry a single mobile soft token.� A good visitor management solution is also needed to keep track of visitors coming in and out of hospitals. “Today’s visitor management systems enable the screening, badging, and tracking of all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods,� Cullis said. “Systems should support real-time patient feeds using Health Level 7 (HL7) integration, which ensures that no

visitor is sent to the wrong location or to see a patient that is no longer checked in.�

&25325$7( Enterprise users maintain thousands of employees who are spread across the globe. Keeping tabs on workers as they enter or exit companies is critical. “One main security pitfall in the corporate environment is not collecting credentials after an employee leaves the company. This allows them access at any time in the future. By managing their identities electronically, access rights can be immediately removed without the

A Word on Mobile Banking and Payments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

58

OCT 2014

PXOWLIDFWRU DXWKHQWLFDWLRQ VROXWLRQ WKDW FRPELQHV D SDVVZRUG D PRELOH RU ZHE WRNHQ DQG D ELRPHWULF RU EHKDYLRU PHWULF VROXWLRQ 'HYLFH DXWKHQWLFDWLRQ 2QFH LW LV GHWHUPLQHG WKDW WKH XVHU LV ZKR KH RU VKH VD\V VKH LV LW LV LPSRUWDQW WR YHULI\ WKDW WKH SHUVRQ LV XVLQJ D ´NQRZQ¾ GHYLFH %URZVHU SURWHFWLRQ 7KLV HQVXUHV WKDW WKH EURZVHU EHLQJ XVHG LV SDUW RI D VHFXUH FRPPXQL FDWLRQ FKDQQHO (QKDQFHG VHFXULW\ IRU SDUWLFXODUO\ VHQVLWLYH WUDQVDFWLRQV LQFOXGLQJ VLJQLQJ FRQWUDFWV DQG WUDQVIHUULQJ ODUJH IXQGV 'HIHQGLQJ DJDLQVW WKUHDWV LQ WKLV DUHD UHTXLUHV WKH XVH RI WUDQVDFWLRQ DXWKHQ WLFDWLRQ SDWWHUQ EDVHG LQWHOOLJHQFH $SSOLFDWLRQ VHFXULW\ 7KLV OD\HU SURWHFWV DSSOLFD WLRQV RQ PRELOH GHYLFHV WKDW DUH XVHG WR GHOLYHU VHQVLWLYH LQIRUPDWLRQ

7KLV ZRXOG EH WKH LGHDO ZD\ WR FRQGXFW PRELOH EDQNLQJ RU SD\PHQWV %XW IRU PRVW FRQVXPHU RQOLQH WUDQVDFWLRQV DW WKLV WLPH XVHUQDPH DQG SDVVZRUG DUH VWLOO WKH QRUP ´)URP VKRSSLQJ RQOLQH WR FRQGXFWLQJ D EDQNLQJ WUDQVDFWLRQ ZLWK \RXU PRELOH WKH PDMRULW\ RI FRPSDQLHV GRQŇ‹W RIIHU D WZR IDFWRU RSWLRQ Âľ VDLG -HQQLIHU 'HDQ ,GHQWLW\ DQG $FFHVV 0DUNHWLQJ &RPPXQLFDWLRQ 0DQDJHU DW *HPDOWR ´+RZHYHU DV GDWD EUHDFKHV FRQWLQXH WR EHFRPH PRUH ZLGHVSUHDG DQG DIIHFW DQ HQRUPRXV DPRXQW RI XVHUV FRPSDQLHV DUH ILQDOO\ WDNLQJ QRWH DQG LPSOHPHQWLQJ VRPH IRUP RI VWURQJ DXWKHQ WLFDWLRQ VXFK DV 606 273 :LWK $SSOHŇ‹V UHFHQW DQQRXQFHPHQW WKDW WKH L3KRQH ZLOO EH HTXLSSHG ZLWK 1)& DQG PRELOH SD\PHQWV WKURXJK $SSOH3D\ ZKHUH XVHUV ZLOO XVH ELRPHWULFV ZLWK HYHU\ PRELOH SXUFKDVH ZH ZLOO VXUHO\ VHH DQ LQFUHDVH LQ ELRPHWULF VHFXUHG WUDQVDFWLRQV Âľ


9(57,&$/ 0$5.(7

2LO *DV )XHO 8S RQ 6DIHW\ DQG

From Fr om a s saf afet af ety et y an and se and secu curi cu rity ri ty p per ersp er spec sp ecti ec tive ti ve,, oi ve oill an and d ga gas s in inst stal st alla al lati la tion ti o s ar on are e am amon ong on g th the e mo most crit cr itic it ical ic al a and nd c nd cha hall ha llen ll engi en ging gi ng e env nvir nv iron ir onme on m nt me nts. s. TThe he s spe peed pe ed iin ed n wh w ic ich h an iinc ncid nc iden id ent en t ca can n esca esca es cala late la te t to oa disa di sast sa ster st er m er mea eans ea ns ttha hatt op ha oper erat er ator at ors or s ne need ed tto o ge get t in info form fo rmat rm atio at ion io n qu quic ickl ic kly kl y to b be e ab able le t to o re reac a t an ac and d mini mi nimi ni mize mi ze d dam amag am ages. Ad ag Adva v nc nces iin vi vide deo o te tech chno ch nolo no logy lo gy a and nd v vid ideo id eo c con onte on tent te nt a ana naly na lyti ly tics ti cs h hav ave av e grea gr eatt po pote tent te ntia nt iall to a assist oi o l an and d ga gas s in inst stal st allations s in d det etecti ting ng f fir ires ir es, le es es, leak aks, ak s, a and nd s sec ecur ec urit ur ity it y thre th reat re ats, at s, a as s we well ll a as s he help lp m mak ake ak e op oper erat er atio at ions io ns m mor o e ef or effi fici fi cien ci ent. en t.

„ %< ,65$(/ *2*2/ )5((/$1&(5

A

s oil exploration moves to new regions across the world, so does the need for better monitoring of remote facilities, increased protection against terror threats, and pipeline and leak detection monitoring solutions. Exploration and drilling security systems will be the largest segment in terms of spending and adoption followed by refineries and storage facilities. According to research by Frost and Sullivan, the global oil and gas infrastructure security market was estimated at US$19.6 billion in 2013 and will grow to $24.7 billion by 2021. Including network and cyber security, the combined oil and gas security market will reach $30 billion by 2018.

66 66

OC T 2014 OCT 2200014 14 14

Any damage to an oil and gas facility has grave consequences. Incidents have implications on employee safety, environmental damage, cleaning costs, damage penalties, equipment replacement, and the list goes on and on. This becomes even more challenging when considering the nature of these installations. There are hundreds of potential breach points for leaks and damages: numerous valves and pumps, meters upon meters of pipes. Even within the facility, environments are not the same. A refinery for example will include various types of oil, transported at different temperatures and pressures, from ambient temperatures and pressure up to 130 bars at 100°C.


w w. ww www.asmag.com wassmaag. g.com

6677


,17(//,*(17 9,'(2 62/87,21

XVCA CASINO SAY NO TO WRONG DOERS Everyone knows what surveillance cameras in casinos are for, but no one really worries about them unless they have something to hide, and for people who do, they hide it well. No longer do casinos bet solely on security cameras to spot crime ongoing in their premises, with video content analysis (VCA) to detect any unusual incidents, the house will always win.

„ %< /,6$ +68

C

asino get thousands of visitors on a daily basis, and with people bustling in and out of the premises, it gets hard to keep track of what is going on. Cameras are employed to cover every inch of the property to ensure there is no unlawful activity or accidents. However, with all the video coverage, it is impossible to expect humans to not miss a single frame that could lead to suspicious activity when monitoring the casino.

0267 &20021 7+5($76 ,1 &$6,126 Although casinos have gaming regulations that are implemented for safety measures, law enforcement employed to fight crime, and surveillance cameras on every gaming table, there are still people out there who believe rules are there to be broken. According to the Nevada State Gaming Control Board, approximately 500 people are arrested each year for attempting to cheat at casinos in the state of Nevada, U.S., and out of the total number of arrested, nearly a third of those arrests are casino employees. This staggering fact has urged casinos to be more aware of their security, as even insiders cannot resist the lure of “easy money.�

74

OCT 2014

9&$ ,6 127 -867 7+( (<( ,1 7+( 6.< Perhaps it is because of the large amounts of cash situated on the premises, but casinos have always been a natural target for criminal activity. Some of the most common threats in casinos are re cheating, theft, and fraud. In a gaming ffacility ili constantly humming with activity, it is impractical to only rely on the security team to be able to identify all potentially suspicious activity. In the past, most casinos encountered various crimes even under conditions where video surveillance cameras were installed. Insufficient resolution to

(YHU VLQFH 9&$ KDV EHHQ LQWURGXFHG WR WKH JDPLQJ LQGXVWU\ PRUH JDPH IUDXGV DUH GHWHFWHG


www. ww www.asmag.com ww. w as asmag.com

7755


&$6( 678'<

6WDWH RI WKH $UW ,QFLGHQW 0DQDJHPHQW 6\VWHPV 6HFXUH 5HVRUWV :RUOG &DVLQR 1HZ <RUN Resorts World Casino New York City is New York’s first world-class gaming casino connected to the famous Aqueduct racetrack in South Ozone Park, Queens, and has played host to some of Thoroughbred racing’s biggest heroes over the years. With over 400,000 square feet of gaming facilities and a 70,000 square feet event space for big-ticket events, Resorts World Casino employs over 1,300 people and sees an average of 20,000 guests daily, utilizing 6,500 parking spots. Resorts World New York has implemented state-of-the-art security and surveillance technologies to ensure the safety and security of their facility, guests, and personnel. „ $'$37(' )520 ,9,(: 6<67(06¡ 5(62576 :25/' &$6,12 &$6( 678'<

7+( %86,1(66 &+$//(1*( Since opening its doors in October 2011, Resorts World Casino continues to have solid growth and record revenues. Unfortunately, with success also comes a number of persistent security issues from both insiders and outsiders. The casino handles numerous security incidents every single day, including common incidents such as theft, unwanted banned patrons, personal injuries, vandalism, etc. Even a routine incident can often take an inordinate amount of manpower and, if not handled in a timely manner, can compromise business operations and services and potentially cause exposure to liability. The process of recording, tracking, and reporting was a manual process that inhibited the investigation and reporting process. Information was inconsistent and not readily retrievable, and media files were often not associated with an incident. Compiling meaningful reports was a lengthy and onerous task, making it difficult to correlate events to identify areas of risk and optimize staff allocation. Jason Arnett, Director of

THE BENEFITS %\ GHSOR\LQJ D IXOO\ LQWHJUDWHG LQFLGHQW UHSRUWLQJ DQG ULVN PDQDJHPHQW VROXWLRQ 5HVRUWV :RUOG LV QRZ ZHOO HTXLSSHG WR GRFXPHQW VKDUH DQG PDQDJH DOO RI WKHLU VHFXULW\ DQG VXUYHLOODQFH LQIRUPDWLRQ EHWZHHQ QHFHVVDU\ GHSDUWPHQWV 5HVRUWV :RUOG WUDQVIRUPHG WKHLU FXPEHUVRPH PDQXDO SURFHVVLQJ LQWR D KLJK SHUIRUPDQFH VHFXULW\ ULVN PDQDJHPHQW VROXWLRQ UHDSLQJ UHDO GLYLGHQGV ZKLFK LQFOXGH ‡ $XWRPDWHG GDWD VHDUFKLQJ TXHU\LQJ VDYHG KRXUV D PRQWK VHDUFKLQJ DQG FRPSLOLQJ VLQJOH RU PXOWLSOH VHDUFK FULWHULD ZLWK WKH DELOLW\ WR VDYH VWDQGDUG GDLO\ ZHHNO\ PRQWKO\ FXVWRPL]HG UHSRUW ILOWHUV DV UHTXLUHG ‡ ,QFLGHQW UHSRUWLQJ SURGXFHG D WLPH VDYLQJV RI KRXUV D PRQWK ZLWK L9LHZ 6\VWHPҋV LQFLGHQW UHSRUWLQJ DQG ULVN PDQDJHPHQW V\VWHP FHQWUDO GDWD UHSRVLWRU\ SURYLGLQJ GHWDLOHG LQFLGHQW DQG DGYDQFHG UHSRUWLQJ VWDWLVWLFV ‡ $XWRPDWHG LGHQWLILFDWLRQ QRWLILFDWLRQV RI WUHVSDVVHUV RU EDQQHG VXEMHFWV RQ SURSHUW\ VDYLQJ SURFHVVLQJ WLPH DQG DLGLQJ SROLFH ZLWK HYLGHQFH UHVXOWLQJ LQ

82

OCT 2014


Surveillance of Resorts World New York initiated the project to automate their security reporting, mitigate risk, and improve efficiencies. Arnett looked to iView Systems’ gaming experts for an integrated security and risk management solution to automate their incident reporting, daily log, officer dispatch, and lost and found functions, as well as to identify and track employees and visitors.

Resorts World Casino New York is New York’s first world-class gaming casino. With over 400,000 square feet of gaming facilities and a 70,000 square feet event space for big-ticket events, Resorts World Casino has implemented state-of-the-art security and surveillance technologies to ensure the safety of their facility, guests, and personnel.

7+( 62/87,21 With iView Systems’ experience in the gaming industry and Resort World sister casino in Singapore already using iView Systems technology for security and surveillance reporting, Arnett looked to Tony Day, Senior Account Executive for iView Systems, to map out their security and surveillance reporting needs. “They required an incident reporting and risk management system that would allow them to document all daily activity and incidents, along with the ability to include supporting evidence such

as media files or individual reports. Additionally, Resorts World required the capability to track all personnel and vehicles, as well as manage and control details such as lost and found items, visitor management, employee audits, and document disputes, and provide player analysis by surveillance,� Day said. $ /$<(5(' $3352$&+

In addition to tracking and reporting incident and events, Resorts World has implemented a layered approach to

VDYLQJV RI 86 D \HDU ‡ $XWRPDWHG GLVSDWFK UHSRUWLQJ VDYHG KRXUV D PRQWK ‡ 6WUXFWXUHG GDWD FROOHFWLRQ UHSRUWLQJ LV VLPSOH IDVW DFFXUDWH GDWH WLPH VWDPSHG FRQVLVWHQW WR UHGXFH WHGLRXV HUURU SURQH GDWD HQWU\ ZLWK GRFXPHQWHG DXGLW WUDLOV WKDW DUH VHFXUH VHDUFKDEOH ZLWK LQVWDQW VWDWLVWLFDO UHSRUWLQJ DQG GLVWULEXWLRQ ‡ ,QFLGHQWV ,QYHVWLJDWLRQV ß $ELOLW\ WR FDSWXUH FRPSOHWH VWRU\ YLGHR VFDQQHG GRFXPHQWV H[WHUQDO ILOHV OLQNV WR ORQJ WHUP '95 VWRUDJH UHDO WLPH YLGHR FDSWXUH OHJDO DQG SURFHGXUDO IRUP DXWRPDWLRQ XVH RI IRUFH :6,% WUHVSDVV ‡ 6HJPHQWHG YLHZV RI DOO RI LQFLGHQWV FRUUHODWHV VXEMHFWV SHUVRQQHO DQG FRQWDFW LQIRUPDWLRQ ‡ &URVV IXQFWLRQDO FRPPXQLFDWLRQ RI LQFLGHQWV %2/2V DV ZHOO DV VKLIW DQG SHUVRQQHO EULHILQJV ZHUH DOO YDVWO\ LPSURYHG ZLWK VSHHG DQG HIILFLHQF\ ‡ 0LQLPXP WUDLQLQJ UHTXLUHPHQWV SURYLGHG IRU IDVW XVHU UHDGLQHVV

detect, deter, and resolve issues in a proactive manner. iView’s visitor management system checks in and monitors contractors and vendors or suppliers’ access to the property. With so many suppliers coming and going at all hours, the system provides detailed logs of visits and screens against watch lists, which aides with access, accountability, and compliance. “We’re able to pre-register visitors and ensure contractors and suppliers are in compliance with licensing and insurance regulations

DQG TXHU\LQJ QRW WR PHQWLRQ WKH LQFUHDVHG LQWHJULW\ RI RXU GDWD FROOHFWHG :H ZHUH DEOH WR UHDOL]H IXOO UHWXUQ RQ LQYHVWPHQW LQ MXVW DQG D KDOI PRQWKV Âľ ´7KH VHFXULW\ DQG VXUYHLOODQFH VWDII LPPHGLDWHO\ IHOW DW HDVH XVLQJ WKH VRIWZDUH JLYHQ WKH VLPSOLFLW\ DQG DFFXUDF\ RI WKH XVHU LQWHUIDFH 7KH VRIWZDUHŇ‹V ORJLFDO ZRUNIORZ DOORZV XV WR FROOHFW DQG PDQDJH GDWD DQG UDSLGO\ DQDO\]H DQG DFW DV ZHOO DV LGHQWLI\ WUHQGV DQG VKDUH UHSRUWV ZLWK H[HFXWLYH PDQDJHPHQW Âľ

´:H GLG QRW H[SHFW WR VHH VXFK VLJQLILFDQW EHQHILWV VR TXLFNO\ ¾ VWDWHG -DVRQ $UQHWW 'LUHFWRU RI 6XUYHLOODQFH RI 5HVRUWV :RUOG 1HZ <RUN ´%\ DXWRPDWLQJ RXU VHFXULW\ DQG VXUYHLOODQFH IXQFWLRQV ZH KDYH VDYHG FRQVLGHUDEOH PDQ KRXUV UHSRUWLQJ VHDUFKLQJ

www.asmag.com

83


The overarching view in the security industry right now is that IP, which employs a network infrastructure and offers HD video, will one day replace analog solutions, which have defined video surveillance for half a century. For analog players, who are seeing declines in sales and revenue, they must find ways to regain their former dominance in the industry. HD-overcoaxial solutions, which deliver HD video over users’ existing coaxial cabling, represent their ultimate battle for survival amidst the IP invasion.

63(&,$/ )($785(

+' RYHU &RD[LDO

8OWLPDWH %DWWOH IRU 6XUYLYDO E\ $QDORJ 0DQXIDFWXUHUV %< $/) &+$1*

E

ver since 960H and HD-SDI emerged in 2011, video surveillance players have been trying to find solutions that enhance the quality of CCTV, which remains the mainstream surveillance technology. Analog cameras are inexpensive and easy to install, and

86

OCT 2014

they still dominate the market with 70 to 80 percent of market share. However, IP cameras are threatening the very existence of analog players, who are seeing a steady revenue decline. Against this backdrop, analog players seeking to survive have put intensive efforts into the R&D of

high-resolution HD-over-coaxial solutions. HDCVI, HDTVI, ccHDtv, and AHD are the products of those efforts. Any HD-over-coaxial solution, be it 960H, HD-SDI, HDCVI, HDTVI, AHD, and ccHDtv, must be easy to use over the end user’s legacy coaxial cable. HD transmission


63(&,$/ )($785(

Fiber Links Boost HD-Over-Analog Solutions 6LQFH +' RYHU FRD[LDO VROXWLRQV GHOLYHU YLGHR IRU XS WR PHWHUV DQ\ GLVWDQFH ORQJHU WKDQ WKDW UHTXLUHV WKH XVH RI ILEHU WUDQVPLVVLRQ 7KHUH ZDV D WLPH ZKHQ +' 6', ZDV WKH RQO\ QRQ ,3 VLJQDO IRUPDW WKDW FRXOG EH FRQYHUWHG WR RSWLF VLJQDO ´$V D UHVXOW GLVWDQFH ZDV D PDLQ IDFWRU IRU GHFLGLQJ ZKDW +' WHFKQRORJ\ WR HPSOR\ ¾ VDLG 'DULXV /XNRFLXV 'LUHFWRU RI 6DOHV IRU (0($ DW 27 6\VWHPV <HW WRGD\ WHFKQRORJLFDO DGYDQFHV KDYH DOORZHG ILEHU WUDQVPLVVLRQ WR DSSO\ WR RWKHU +' RYHU FRD[LDO VROXWLRQV LQFOXGLQJ +'79, +'&9, SOD\HUV DOVR FODLP WKH\ KDYH FRPH XS ZLWK VROXWLRQV HQDEOLQJ FRQYHUVLRQ IURP +'&9, WR RSWLF WKXV DOORZLQJ YLGHR WUDQVPLVVLRQ RI RYHU PHWHUV $FFRUGLQJ WR /XNRFLXV EHLQJ D SURYLGHU RI FRPSUHKHQVLYH WUDQVPLVVLRQ VROXWLRQV 27 GRHV VHH WKH QHHG WR GHYHORS ILEHU RSWLF SURGXFWV WKDW VXSSRUW DOO NLQGV RI ĺ Darius Lukocius, Director of Sales,

+' IRUPDWV ´+RZHYHU ZKHQ WR KDYH VXFK SURGXFWV GHSHQGV RQ VHYHUDO WKLQJV LQFOXGLQJ WKH SRSXODULW\ RI VXFK WHFKQRORJ\ WKH SURSUL HWDU\ QDWXUH RU SDWHQW RI VXFK WHFKQRORJ\ DQG WKH HIIHFWLYHQHVV RI WKH FRVWLQJ RI VXFK SURGXFWV Âľ KH VDLG :KHQ LPSOHPHQWLQJ +' 6', VXUYHLOODQFH LQVWDOOHUV QHHG WR EHZDUH RI VHYHUDO WKLQJV ´6LQFH +' 6', FDPHUDV PDLQO\ FRPH ZLWK WZR GLIIHUHQW GDWD UDWHV ÉŽ *ESV DQG *ESV ÉŽ ZKHQ FKRRVLQJ +' 6', ILEHU RSWLF FRQYHUWHUV WKH VSHFV KDYH WR FRPSO\ Âľ /XNRFLXV VDLG ´6LQFH WKH PD[LPXP WUDQVPLVVLRQ GLVWDQFH RI +' 6', RQ PXOWLPRGH ILEHU LV QR PRUH WKDQ WZR NLORPHWHUV LW LV DGYLVHG WR FKRRVH VLQJOH PRGH ILEHU IRU ILEHU OLQN LQVWDOODWLRQ Âľ

EMEA, OT Systems

should be achieved using 5C-2V (RG-59U) or 3C-2V (RG-6) coaxial cable without quality loss, and the traditional distance barrier of 100 to 200 meters must be overcome. The solution must incur no extra cost for installation or upgrade, resist quality loss over a long distance, and enable easy upgrade to megapixel-level HD surveillance. Further, it must be high in quality and competitive in price to gain a stronger foothold in vertical markets. In summary, for a solution to be called HD-over-coaxial, six basic requirements must be met: It must have high video clarity and color separation, as well as high signal filtering, noise reduction, and image restoration capabilities; As HD-over-coax is claimed as a breakthrough technology, it must be able to transmit signals for a longer distance over existing coaxial cable; The solution must not be subject to latency, compression-related quality loss, or any compromise to video quality;

1 2 3

4

The backend equipment must be compatible with the 960H format, and future compatibility with analog splitters and matrix systems must be considered; HD-over-coax must be easy to use and operate and allow settings on both frontend and backend equipment; Any solution must have low cost and high quality. There are HD-over-coaxial DVRs that can support both 960H and 720/1080p. These are called hybrid HD DVRs. There are even HD DVRs that are bolstered by Intersil’s decoder chip and the TCP/IP interface to support 960H, 720p/1080p, and IP signals. These are called Tri-brid HD DVRs.

5 6

&203$5( $1' &2175$67 %(7:((1 62/87,216 HDCVI, HDTVI, and AHD share one thing in common: as opposed to 960H that uses the CCD sensor, HDCVI, HDTVI, and AHD use the megapixel-level CMOS or

Exmor CMOS sensor. The purpose is to capture HD images at the source level. Among manufacturers of CMOS sensors are Sony, Omnivision, Pixelplus, and BYD. The formation of images differs slightly according to brand. Another similarity as far as components are concerned is the use of an image signal processor (ISP) in conjunction with the sensor. This device ultimately determines the final image displayed by HDCVI, HDTVI, and AHD solutions. The chipset could be integrated into the sensor module or into the transceiver at the backend of the HDCVI, HDTVI, or AHD camera. Image signal processors, whose manufacturers include Sony, Fullhan, Nextchip, and Eyenix, process and enhance images formed by the sensor. As ISPs of different companies are designed differently, they have different ways of handling backlight compensation, WDR noise reduction, and the 3As, namely auto white balance, auto exposure, and auto focus. One final thing that the solutions have

www.asmag.com

87


Companies in This Issue Products of the Month • AVENTURA TECHNOLOGIES • HIKVISION DIGITAL TECHNOLOGY • ZNV TECHNOLOGY

News Feature • ANIXTER INTERNATIONAL • HIKVISION DIGITAL TECHNOLOGY • NVT • PELCO BY SCHNEIDER ELECTRIC

Product Exploration • • • • • •

ALLEGION AMAG TECHNOLOGY BRIVO LABS GALLAGHER GEMALTO HID GLOBAL

• HUNDURE TECHNOLOGY • NEDAP SECURITY MANAGEMENT • SECURENVOY

Intelligent Video Solution • • • •

DVTEL HIQVIEW VIDICORE HONEYWELL SECURITY

Vertical Market • BOSCH SECURITY SYSTEMS • EVITECH • EX-SIGHT • IOMNISCIENT • MSL GROUP • OSPREY INFORMATICS • PELCO BY SCHNEIDER ELECTRIC

Next Issue Product Exploration RFID

Vertical Market HEALTHCARE

Industry Report SECURITY 50 & INDUSTRY TRENDS

Intelligent Video Solution AIRPORT/SEAPORT

Special Feature VSaaS/ACaaS/SaaS www.asmag.com

101


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 21 27 7 15 31 32, 33 37 BARN DOOR, INSIDE FRONT COVER, 1 8 63 79 9 5 BACK COVER 48,49 FRONT COVER 6 104 42-47 81 INSIDE BACK COVER 23 69 2 93 64, 65 25 34, 35 4 11 39 19 3 61

ADVERTISER MAJOR ITEM 3S VISION IP CAMERA / NVR / VIDEO SERVER AAEON TECHNOLOGY INC. NVR / FIRE WALL AIMETIS CORP. SOFTWARE AXIS COMMUNICATIONS AB NETWORK VIDEO SOLUTIONS BOSCH SECURITY SYSTEMS CCTV CNB TECHNOLOGY INC. CCTV COMMAX CO., LTD. SURVEILLANCE DAHUA TECHNOLOGY CO., LTD. SURVEILLANCE DYNACOLOR INC. IP CAMERA / NVR FOCTEK PHOTONICS, INC. LENS FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR GKB SECURITY CORPORATION HDPRO CO., LTD. CCTV HIKVISION DIGITAL TECHNOLOGY CO., LTD. DVR ICATCH INC. DVR MERIT LILIN ENT CO., LTD. IP CAMERA / NVR CAMERA / IP CAMERA / HD-SDI CAMERA / DVR MICRO DIGITAL INC. MINTRON ENTERPRISE CO., LTD. CAMERA NEXTCHIP CO., LTD. CHIP OB TELECOM ELECTRONICS CO., LTD. FIBER OPTIC TRANSCEIVER DIGITAL SURVEILLANCE PANASONIC SYSTEM NETWORKS CO., LTD. QNAP SYSTEMS, INC. NVR / VMS RICOM LENS RIFATRON CO., LTD. DVR SHENZHEN COMMANDER TECHNOLOGY CO., LTD. CASING SHENZHEN SUNELL TECHNOLOGY CORPORATION CAMERA SURVEILLANCE SHENZHEN TVT DIGITAL TECHNOLOGY CO., LTD. SHENZHEN ZNV TECHNOLOGY CO., LTD. SURVEILLANCE TAMRON CO., LTD. CAMERA TVLOGIC CO., LTD. DVR IP CAMERA / SOFTWARE /VIDEOSERVER VIDEOTEC S.P.A. IP CAMERA / SOFTWARE / VIDEO SERVER VIVOTEK INC. WEBGATE INC. DVR ZHEJIANG DALI TECHNOLOGY CO., LTD CCTV

COUNTRY TAIWAN TAIWAN CANADA SWEDEN GERMANY KOREA KOREA CHINA TAIWAN CHINA CHINA TAIWAN KOREA CHINA TAIWAN TAIWAN KOREA TAIWAN KOREA CHINA JAPAN TAIWAN CHINA KOREA CHINA CHINA CHINA CHINA JAPAN KOREA ITALY TAIWAN KOREA CHINA

E-MAIL Sales@3svision.com.tw sales@aaeon.com.tw info@aimetis.com contact-sap@axis.com apr.securitysystems@bosch.com korea@cnbtec.com hkki@commax.com overseas@dahuatech.com info@dynacolor.com.tw sales@foctek-lens.com sales@fjsmt.com sales@gkbsecurity.com sales@hdprocctv.com overseasbusiness@hikvision.com marketing@icatchinc.com sales@meritlilin.com sales@microdigital.co.kr service@mintron.com.tw sales@nextchip.com overseas@obtelecom.com --nvr@qnap.com sales@forecam.com contact@rifatron.com sjw@yjdcase.com sales@sunellsecurity.com overseas@tvt.net.cn znvservice@zte.com.cn newbiz@tamron.co.jp yshong@tvlogic.co.kr info@videotec.com sales@vivotek.com support@webgateinc.com sales@dali-tech.com

MAJOR ITEM FINGERPRINT RFID MODULE / LOCK / READER ELECTRIC LOCKS ELECTRIC LOCKS ACCESS CONTROL FINGERPRINT ACCESS CONTROL FINGERPRINT

COUNTRY MALAYSIA TAIWAN TAIWAN FRANCE SWITZERLAND KOREA MALAYSIA KOREA

E-MAIL info@fingertec.com promag@gigatms.com.tw Is@home-safe.com.tw info@sewosy.com sales@supremainc.com sales@uwcelectric.com sales@ten-bio.com

ADVERTISER SICURIT ALARMITALIA S.P.A. ZENITEL NORWAY AS

MAJOR ITEM ALARM ALARM

COUNTRY ITALY NORWAY

E-MAIL export@sicurit.it ole.falck@zenitel.com

ADVERTISER ICPDAS CO., LTD. PIXELPLUS CO., LTD SCENE ELECTRONICS (HK) CO., LTD. SONY CORPORATION DSBG. SYSTEM LSI DIVISION

MAJOR ITEM SWITCH SEMICONDUCTOR ILLUMINATOR SEMICONDUCTOR

COUNTRY TAIWAN KOREA CHINA JAPAN

E-MAIL info@icpdas.com kahn@pixelplus.com sales@led-scene.com -

ACCESS CONTROL PAGE NO. 57 55 10 59 41 17 79 59

ADVERTISER FINGERTEC WORLDWIDE SDN. BHD. GIGA-TMS INC. LI SHYANG TECH CO.,LTD SEWOSY SIEMENS SUPREMA INC. UWC ELECTRIC (M) SDN. BHD. VOIM TECHNOLOGIES INC.

INTRUSION ALARM PAGE NO. 101 72, 73

OTHER PAGE NO. 91 28, 29 81 12, 13

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.