&217(176
2FW
3URGXFW«([SORUDWLRQ
,GHQWLW\ 0DQDJHPHQW P.50
6ROXWLRQV .HHS ,QWUXGHUV DW %D\ Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well.
P.56
9HUWLFDO«0DUNHW
P.66
14
2LO DQG *DV )XHO 8S RQ 6DIHW\
OCT 2014
9HUWLFDOV 6WDQG WR %HQHILW )URP ,GHQWLW\ 0DQDJHPHQW 6ROXWLRQV
6SHFLDO«)HDWXUH
P.86
+' RYHU &RD[LDO 8OWLPDWH %DWWOH IRU 6XUYLYDO E\ $QDORJ 0DQXIDFWXUHUV
&217(176
2FW
,QWHOOLJHQW«9LGHR«6ROXWLRQ
&DVLQR X 9&$
6D\ 1R WR :URQJ 'RHUV Everyone knows what surveillance cameras in casinos are for, but no one really worries about them unless they have something to hide, and for people who do, they hide it well. No longer do casinos bet solely on security cameras to spot crime ongoing in their premises, with video content analysis (VCA) to detect any unusual incidents, the house will always win.
P.74
&DVH«6WXG\« P.82
1HZV«)HDWXUH
6WDWH RI WKH $UW ,QFLGHQW 0DQDJHPHQW 6\VWHPV 6HFXUH 5HVRUWV :RUOG &DVLQR 1HZ <RUN
P.36
$QL[WHU DQG 7UL (G %UDQFKLQJ 2XW 6HFXULW\ %XVLQHVV
60$KRPH P.90
',< 6XUYHLOODQFH .LWV IRU +RPHV P.14 &RQWHQWV P.18 (GLWRU¶V«1RWH« P.20 &RUSRUDWH«1HZV
16
OCT 2014
P.30« 3URGXFWV«RI«WKH«0RQWK P.94« 6KRZ«&DOHQGDU« P.96« 1HZ«3URGXFWV
P.92 6KRZ«6SRWOLJKW P.101 &RPSDQLHV«LQ«7KLV«,VVXH
(',725 6 127( a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies developments in CCTV, Digital Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home
/DWHVW L3KRQH 7ULJJHUV 1)& $GRSWLRQ
Automation and other fields relevant to electronic security.
,661 Ë ŕľ˘ŕśľâ&#x20AC;ŤÍ&#x201D;ĚťÝâ&#x20AC;ŹĎŤŕˇ ŕź&#x161; ੮ŕş&#x2014;ŕ´&#x161;৪޾á&#x2022;ťá&#x192;&#x2019;Î ŕŞ&#x20AC;
Appleâ&#x20AC;&#x2122;s iPhone 6 was finally launched this September. Again, it caused great sensation around the globe. Besides the better looking design and other advanced functionalities, the iPhone 6 now has an NFC antenna in it, supporting payment via Apple Pay. And, in keeping with its previous feature, iPhone 6 also has a fingerprint scanner inside, which further helps with identity verification to secure the transaction. So far Apple still hasnâ&#x20AC;&#x2122;t opened up its APIs to other developers, and it is still hard to develop NFC-enabled devices for iPhones. However, through the launch of the latest iPhone and other smartphones, we can predict, in the near future, that NFC will surely become the next trend for many industries after Bluetooth technologies; again igniting the growth momentum of NFC used for physical access control, too. As the trend of online or mobile payment gains popularity and the industry starts to provide different methods to open and manage doors â&#x20AC;&#x201D; instead of using traditional keys and cards only â&#x20AC;&#x201D; the access control market has become more interesting and ready to grow and develop further. One issue the trend brings up is how to better manage and secure peopleâ&#x20AC;&#x2122;s identities in different occasions and for different purposes. This month, we discussed how and what companies are providing to manage and protect identities in the enterprise sector. Multifactor access control systems, with biometrics, combined with advanced encryption technologies, are what the industry mostly offers. However, the challenge right now is still low market awareness toward identity management and protection from end users. In the future, through the launch of more NFC-enabled smartphones and other devices, we hope identity management can be more greatly valued! Remember to check out this issueâ&#x20AC;&#x2122;s cover story for more information. Hope you enjoy it.
Parson Lee Joseph Lee John Shi
Publisher & Managing Director General Manager General Manager
Editorial
General Press Jill Lai Alf Chang Eifeh Strom Steve Chin William Pao Lisa Hsu Weiting Chen
Editor in Chief Senior Consultant Senior Editor Reporter Reporter Reporter Coordinator
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com steve.chin@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com weiting.chen@newera.messefrankfurt.com
Executive Designer Designer Designer
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Arthur Wu
Circulation & Subscription
Michelle Shih
Coordinator
michelle.shih@newera.messefrankfurt.com
Corporate Management
Collins Yuan Thomas Pin Chihung Lee
Group Manager Account Manager IT Manager
collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
Assistant Manager
jerry.wu@newera.messefrankfurt.com
Trade Fair Manager Manager Project Manager
peggy.wu@newera.messefrankfurt.com echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com
asmag.com
Jerry Wu Secutech
Peggy Wu Echo Lin Eva Tsai
International Advertising [Headquarters]
Juihui Lin Kay Yang Audrey Fang Wayne Ho
Manager Operation Officer Coordinator Sales Officer
juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com wayne.ho@newera.messefrankfurt.com
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Y. C. Suh Takashi Komori Nguyen Thu Ha
USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam
bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn
0HVVH )UDQNIXUW 1HZ (UD %XVLQHVV 0HGLD /WG Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com
<[^^ >S[
jill.lai@newera.messefrankfurt.com
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Â&#x2039; 0HVVH )UDQNIXUW 1HZ (UD %XVLQHVV 0HGLD /WG $OO ULJKWV UHVHUYHG 1R SDUW RI WKLV PDJD]LQH PD\ EH UHSXEOLVKHG UHSULQWHG RU UHGLVWULEXWHG LQ DQ\ IRUPV LQFOXGLQJ HOHFWURQLF ZLWKRXW ZULWWHQ FRQVHQW IURP WKH SXEOLVKHU
$GYHUWLVHUV DUH UHVSRQVLEOH IRU WKHLU RZQ DGYHUWLVHPHQW FRQWHQW 7KH SXEOLVKHU LV QRW OLDEOH IRU DQ\ OHJDO LPDJH SDWHQW RU WUDGHPDUN GLVSXWHV IURP DGYHUWLVHPHQWV RU DPRQJ DGYHUWLVHUV /HJDO FRQVXOWDQW -XOLD 6 + <X $WWRUQH\ DW /DZ )LUVW /DZ ,3 2IILFHV
18
OCT 2014
&25325$7( 1(:6
VIVOTEK Cameras Create a Secure Environment in Hotel Bania in Poland Located in Bialka Tatrzanska Mountain Resort in the central Tatra Mountain region, Bania Hotel is among the most luxurious hotels in Poland. An array of indoor and outdoor surveillance solutions is required throughout the complex. To satisfy the end user’s needs, features such as megapixel image quality, round-the-clock surveillance, intelligent IR illumination, and wide dynamic range (WDR) functionality are essential. Bania Hotel management chose VIVOTEK products, which provide optimal cost-to-performance ratio among numerous surveillance solutions available on the market. With the assistance of specialists from Suma, VIVOTEK’s key partner and distributor in Poland, a surveillance system was delivered, thus fulfilling the end user’s high expectations.
PSIA Achieved Milestones in PLAI Specification The Physical Security Interoperability Alliance (PSIA) announced it has achieved important new milestones within its physical logical access interoperability (PLAI) specification less than a year after forming a working group to develop it. PLAI is being designed to enable employee identities and roles defined or revoked in an authoritative logical identity system to automatically propagate to one or more PLAI-compliant physical access control systems (PACS). PLAI synchronizes physical and logical identity management and access control and standardizes functions that typically have required custom programming to achieve. PLAI now can accomplish the following: • Compatibility with PACS from multiple vendors; • Enable initial registration of an employee from an authoritative source (IT or HR logical directory) to the PACS; • Establish role-based privileges at the authoritative source and propagates this logical privilege data throughout multiple PACS; • Propagate the credential information (both in the form of cards or upcoming mobile credentials) of an employee from one PACS to others, thus supporting enhanced access control at multiple facilities; • Easily invoke and revoke physical access privileges in multiple PACS. PLAI asserts roles defined by an authoritative source (HR or IT) so these roles do not need to be redefined in the PACS. The use of a single authoritative source by multiple PLAI-enabled PACS ensures the validity and synchronization of an employee’s physical and logical identity data.
Morpho Acquires Dictao Morpho (Safran) finalized the acquisition of Dictao, the publisher of software solutions for security and digital trust. Based in France, Dictao has 100 employees and offers solutions for strong authentication, secure online transactions, and secure archiving. The acquisition of Dictao reflects Morpho’s development strategy and confirms its leadership in the security market. The two companies’ digital identity businesses are highly complementary, from ID document management to use. Morpho will be able to offer an even more extensive range of highly secure solutions to both governments and private sector companies such as banks, insurance firms, manufacturers, etc.
20
OCT 2014
American Dynamics’ Integrated Security Solution Safeguards Atlanta School District American Dynamics, a Tyco Security Products brand, announced that Cherokee County School District (CCSD), located in the Atlanta metro area, has chosen its video security solutions to secure its schools and other facilities. One of the largest public school systems in the state of Georgia, CCSD encompasses 57 schools and other buildings, including 24 elementary schools, seven middle schools, seven high schools, three preschool centers, central offices, and warehouses, along with its 40,000 students and 4,500 staff. The school district needed a surveillance solution that would enable public safety staff to monitor both live and recorded video from its facilities. CCSD selected the hybrid recording platform from American Dynamics to allow the school district to upgrade and grow its surveillance security system gradually, without completely replacing its existing analog infrastructure. Tyco Integrated Security served as the systems integrator for this project. Once the installation is complete, CCSD will be able to employ more of the surveillance system’s features and capabilities for an integrated platform across all of the district’s facilities.
&25325$7( 1(:6
Extreme Networks and Axis Team Up to Secure the Little League World Series Extreme Networks teamed up with Axis Communications to provide the wired and wireless infrastructure needed to deliver complete video surveillance during the 2014 Little League Baseball World Series (LLWS). Together, the companies enhanced the overall security of players and fans alike. This year, Extreme Networks made its debut protecting the series joining Axis as it enters its fifth year. To secure 350,000 expected spectators during the 10 day event, Extreme Networks provided its gigabit Ethernet switches to form the backbone of the state-of-the-art security solution. Extreme Networks’ solutions complement the stadium’s access control network and connected more than 40 Axis IP digital video surveillance cameras throughout the complex. Extreme Networks’ switches promote deployment simplicity of the surveillance network due to software automation through the operating system, automating key configuration, and management policy settings across the infrastructure. The Extreme Networks’ switches boast enabled network convergence, high availability and resiliency, programmable extensibility, scalability for future network growth, comprehensive security features, and high performance, high bandwidth, and non-blocking architecture. New for the 2014 tournament, the LLWS deployed the advanced Axis’ pan/tilt/zoom cameras to manage crowd safety at the packed event. The cameras’ responsive performance and unique vantage point could help security staff to quickly scan crowds to locate lost children, track suspicious packages or vehicles, and zero into any area of concern with high detail. The Axis cameras’ open platform allows close integration with the Extreme Networks switches, and their Power-over-Ethernet capabilities assisted with the speedy installation of the wireless infrastructure required in temporary surveillance systems.
Fluidmesh Solutions Make a Splash at Magic Waters Waterpark Got Wi-Fi? That’s a question Magic Waters WaterPark, in Cherry Valley, Illinois, U.S., asked itself in response to growing consumer demand for public Wi-Fi accessibility. The award-winning attraction, which is managed by the Rockford Park District, is always a crowd pleasing destination so its desire to provide patrons with free Wi-Fi service was a perfect add-on to the park. James Shaw, Systems Administrator/Communications Specialist for Rockford Park District’s IT division, was tasked with leading the project. The objective, Shaw explained, was to create an additional network throughout the park as a back-up to their aging fiber network. The installation got underway after the waterpark closed for the 2013 season. The mesh network was completed in the fall of 2013, and was put into operation during the summer 2014 season. The network encompasses Fluidmesh1100 radios arranged in a ring formation throughout the water park with eight hop points. Each hop point also has an Aerohive AP connected only to the mesh network. Two Fluidmesh APs are configured as mesh-ends and both are located at the site’s main Cisco switch. Another virtual local area network (VLAN) was recently added to the mesh to provide wireless bridges to pump room chemical monitors, as well as to enable network access to maintenance buildings that were not previously hardwired with networking.
26
OCT 2014
CNL Provides PSIM to Hospital in South Africa CNL Software, one of the suppliers in physical security information management (PSIM) software, have been chosen to provide a comprehensive security management system for a hospital facility in South Africa. Healthcare security is facing increased violence, crime rate, and vandalism. The security challenge includes not only maintaining the safety of patients, staff, and visitors, but also protecting medicines and medical equipment and securing facilities and buildings. Mitigation of security incidents is essential as breaches can have life safety consequences, as well as capital and equipment loss, financial penalties, and damage to reputation. CNL’s PSIM is a software-based integration and management platform, which connects disparate security systems such as security and building control systems, patient and staff interfaces, RFID patient tagging, nurse call, HR, and other business management systems. The system provides control room operators with real-time situation awareness, through a common operating picture and following an alert, alarm, or trigger.
352'8&76 2) 7+( 0217+
+ &RPHV 5RXQG WR WKH 0DUNHW Editorâ&#x20AC;&#x2122;s Note: Being the successor of H.264, the current standard compression format in the industry, H.265 plays a crucial part in supporting the 4K and 8K ultra-high definition (UHD) trend in the industry since it takes only half the bandwidth and storage. A few months ago, H.265 remained a myth with no one able to predict when it would be ready to go. Now, some companies, from chipset providers to video surveillance solution providers, have overcome the challenges and officially hit the road with H.265. This issue, the a&s editorial team features the latest offerings in NVRs and IP cameras.
+LNYLVLRQ '6 [[1 + + . 195 The Hikvision 4K NVR supports 4K IP camera input, 4K decoding, and video output, as well as wide preview and playback in 4K resolution. The 4K NVR utilizes H.265 for video compression, compared to H.264, which extremely improves video coding efficiency, helping to save on overall storage space.
=19 6HULHV 03 + ,3 &DPHUD 7200 series cameras use H.265 video coding compression and unique transmission technologies to transmit HD surveillance videos over lower network bandwidth. High-definition images are delivered and no image pause occurs thanks to their ultra-low code rates. Low bandwidth is able to transmit HD videos as good as wide bandwidth. The latest coding technology enables the 7200 series H.265 HD IPC to provide users 300 percent free spaces for video footages; the 7200 series presents the same definition and recording duration as H.264 cameras, but occupies only one-third the recording consumption and footage space of normal cameras. 7200 series H.265 HD IP cameras have a low-light feature and are able to capture HD video under very weak light like moonlight.
$YHQWXUD + +(9& 03 &026 1HWZRUN %R[ &DPHUD H.265HEVC is a new generation of image compression technology that expands the capabilities for surveillance initiatives. In conjunction with the state-of-the-art advantages of HEVC, Aventura has added a litany of enhanced features which raise the bar to which the competition aspires. Aventuraâ&#x20AC;&#x2122;s advanced imaging technology allows for minimizing compression in active areas within the scene and maximizing in peripheral areas where activity is low and/or insignificant. Decoded video can be produced with various frame rates, resolution, and quality. Aventuraâ&#x20AC;&#x2122;s implementation of temporal and spatial scaling efficiencies is an extension of the native codec algorithm. Three unique transmissions provide for controlled access for a variety of network operating environments from LAN/WAN to mobile devices.
30
OCT 2014
.H\ )HDWXUHV Â&#x2021; 6XSSRUWV XS WR . UHVROXWLRQ UHFRUGLQJ Â&#x2021; 6XSSRUWV XS WR 0ESV LQFRPLQJ EDQGZLGWK IRU QHWZRUN FDPHUD LQSXW Â&#x2021; +'0, RXWSXW DW UHVROXWLRQ RI [ Â&#x2021; +RW VZDSSDEOH 6$7$ LQWHUIDFHV IRU +''V Â&#x2021; 'XDO JLJDELW QHWZRUN LQWHUIDFHV Â&#x2021; 6XSSRUWV 5$,' DQG 6XSSOLHU +LNYLVLRQ 'LJLWDO 7HFKQRORJ\ 85/ ZZZ KLNYLVLRQ FRP
.H\ )HDWXUHV Â&#x2021; + YLGHR FRPSUHVVLRQ WHFKQRORJ\ XS WR S DW ISV UHVROXWLRQ Â&#x2021; 'HIDXOW S DW ISV DQG FRGH UDWH 0ESV PLQ VWDWLF FRGH UDWH .ESV Â&#x2021; /RZ OLJKW PRGHOV KDYH KLJK SHUIRUPDQFH ´ &026 PLQLPXP LOOXPLQDWLRQ OX[ FRORU DQG OX[ % :
Â&#x2021; $XWR ,&5 VZLWFK IRU GD\ QLJKW VXUYHLOODQFH Â&#x2021; +/& DQG %/& IRU PRUH VXUYHLOODQFH VFHQDULRV Â&#x2021; ' '15 WR UHGXFH QRLVH DQG NHHS LPDJHV FOHDQ 6XSSOLHU =19 7HFKQRORJ\ 85/ ZZZ ]QY FRP
.H\ )HDWXUHV Â&#x2021; 03 UHVROXWLRQ [
Â&#x2021; ´ SURJUHVVLYH VFDQ &026 Â&#x2021; + +(9& 0-3(* Â&#x2021; :LGH G\QDPLF UDQJH ' '15 Â&#x2021; 8S WR *% 6';& VWRUDJH Â&#x2021; $XWRPDWLF EDFN IRFXV Â&#x2021; $GDSWLYH LPDJLQJ WHFKQRORJ\ Â&#x2021; 7ULSOH VWUHDP VFDODEOH FRGLQJ 6XSSOLHU $YHQWXUD 7HFKQRORJLHV 85/ ZZZ DYHQWXUDFFWY FRP
1(:6 )($785(
$1,;7(5
75, ('
$1' %5$1&+,1* 287
%< 67(9( &+,1
On August 11, 2014 14, Anixter Internat In ational announce ced that the hey y had d en entere red into an n agreemen ent to a acquire TTri ri-Ed, a lea eadi ding dist stri ribu buto tor of sec ecurity so solution ons s for a purchasing price ce o of US$420 20 million. Causing ripples in the security ind ndustry, this acquisition marks a turning g point for Anixter, as they look to expand their security segments.
I THINK THE ACQUISITION GIVES US THE OPPORTUNITY TO PUT EVERYTHING TOGETHER AND PROVIDE OUR DEALERS, CUSTOMERS, AND INTEGRATORS WITH THE BEST-IN-CLASS SOLUTIONS. Bill Galvin, EVP, Enterprise Cabling & Security Solutions, Anixter International
36
OCT 2014
6(&85,7< %86,1(66
O
ne of the predominant global distributors with footprints across the world, Anixter International is a publicly traded American company, valued upwards of US$6 billion. Now in over 50 countries around the world, dealing in local languages, local currencies, and local people, the company has a firm hold on many international locations. With several locations in China, Japan, Singapore, and Australia, “the APAC region is a growth market for Anixter’s security business,” said Bill Galvin, EVP of Enterprise Cabling & Security Solutions at Anixter. Even though it is a relative newcomer to the world of security, only entering the industry in 2000, the fact is Anixter has always had an interest in security while already solidified in multiple other markets. As Galvin explained, “Our interest began because the security business was going through a transformation, especially on the video side, where it was shifting toward IP video systems.” He also further elaborated, “We understood that there was a fundamental change happening in the security business, where a portion of the traditional analog market was moving to IP. Anixter was in a very good position to help customers with that transformation. So in 2000, we began building our security segment all the way up to an over $1.1 billion business today.”
$&48,6,7,216 %2267 $1,;7(5·6 67$786 As Galvin pointed out, Anixter’s strength has been in IP video. Growing up in the IP infrastructure timeline, he explained that with the acquisition of a company of Tri-Ed’s caliber, it will substantially enhance Anixter’s security business by opening up opportunities to have a presence across all the different markets in security and not just in IP. With the September 17 announcement of the closing of the deal, Anixter has now positioned
1(:6 )($785(
itself to further penetrate the security industry. â&#x20AC;&#x153;I think this will address one of the hurdles, which is covering the security market more broadly. I think the acquisition will really give us full capabilities across both analog and IP,â&#x20AC;? said Galvin. â&#x20AC;&#x153;With the acquisition of Tri-Ed, we can say weâ&#x20AC;&#x2122;re truly a full-line security distributor.â&#x20AC;? Expanding on the acquisition of Tri-Ed, Galvin explained that the first step is to integrate the two companies to provide the best solutions for customers. Tri-Ed has a very strong, established position in the mid-market, with over 20,000 integrators and dealers, and it serves customers across a broad range of markets. From residential to the mid-market to large complex security systems, Tri-Ed has a firm grasp on the SMB sector in North America. â&#x20AC;&#x153;I think
that by combining what Tri-Ed is able to do now, with Anixterâ&#x20AC;&#x2122;s global IP security focused business, we create a platform to add greater value to our customers,â&#x20AC;? he said. A FULL LINE OF SOLUTIONS
Galvin also brought up the point of Anixterâ&#x20AC;&#x2122;s other acquisition in 2010: CLARK Security Products, whose strength is focused on access control and door locking hardware systems. Alongside Tri-Edâ&#x20AC;&#x2122;s expanded security products such as analog video, intrusion detection, and fire/burglary, Anixter now possesses a full line of security solutions where, as he put it, â&#x20AC;&#x153;Itâ&#x20AC;&#x2122;s very complementary. As we know, security is a massive market thatâ&#x20AC;&#x2122;s also very fragmented, and as we put all these together, we strongly feel like thereâ&#x20AC;&#x2122;s a really good opportunity to address all of
our customersâ&#x20AC;&#x2122; needs in security, across an entire broad line.â&#x20AC;? On top of that, Anixter not only acquires Tri-Edâ&#x20AC;&#x2122;s expertise and product line, but also its customer base, further invigorating the companyâ&#x20AC;&#x2122;s existing markets and expanding into other vertical sectors. â&#x20AC;&#x153;Anixter has very little residential play today, but we think Tri-Edâ&#x20AC;&#x2122;s position in it can help us understand the markets that we can bring all of our expertise and infrastructure into,â&#x20AC;? Galvin said. â&#x20AC;&#x153;I think this gives us the capability not only across video, but also across fire and burglary, intrusion, access control, and door entry. I think our opportunity is there to put all that together and provide our dealers, customers, and integrators with best-inclass solutions. It will help them further address the market and simplify service to their own customers.â&#x20AC;?
Distribution Partners Chime in on Acquisition 2YHUDOO GLVWULEXWLRQ SDUWQHUV RI ERWK $QL[WHU DQG 7UL (G DUH SUHGLFWLQJ D SRVLWLYH RXWFRPH IURP WKH DFTXLVLWLRQ 7KURXJK LW WKHLU SDUWQHUV IHHO WKDW WKH WZR FRPSDQLHV ZLOO FRQVROLGDWH DQG HYHQWXDOO\ IRUP D ODUJHU VWURQJHU SUHVHQFH LQ WKH VHFXULW\ PDUNHW :LWK WKH GHDO RQO\ UHFHQWO\ FORVLQJ LW KDV WKXV IDU EHHQ PHW ZLWK FDXWLRXV RSWLPLVP ZLWK 5DIDHO 0DGULJDO ,QWHUQDWLRQDO 6DOHV 0DQDJHU DW 197 H[SODLQLQJ ´7ZR PDMRU SOD\HUV MXVW PHUJHG WKXV LQ GHILQLWLRQ WKHUH ZLOO EH FRQVROLGDWLRQ :H WKLQN WKHUH DUH SOHQW\ RI QDWLRQDO SOD\HUV LQ WKLV VSDFH DV ZHOO DV PDQ\ UHJLRQDO GLVWULEXWRUV WKHUHIRUH ZH GRQŇ&#x2039;W WKLQN WKLV ZLOO KDYH DQ HQRUPRXV LPSDFW ZKHQ LW FRPHV WR DFTXLULQJ WKH VDPH EUDQGHG SURGXFWV E\ LQWHJUDWRUV Âľ +RZHYHU 0DGULJDO DOVR FRPPHQWHG ´IRU $QL[WHU WKLV DIIRUGV WKHP WKH DELOLW\ WR FRQGXFW EXVLQHVV ZLWK 7UL (GŇ&#x2039;V PRVW OR\DO FXVWRPHUV DQG DFTXLUH LQVWDQW DFFHVV WR QHZ PDUNHWV ERWK YHUWLFDOO\ DQG SK\VLFDOO\ )URP 197Ň&#x2039;V SHUVSHFWLYH WKLV LV D SRVLWLYH QRWH Âľ %ULDQ -DPHV 'LUHFWRU RI 6WUDWHJLF $FFRXQWV IRU 3HOFR E\ 6FKQHLGHU (OHFWULF DOVR EURXJKW XS WKH SRLQW RI FRQVROLGDWLRQ VD\LQJ ´7KH DFTXLVLWLRQ FHUWDLQO\ PHDQV FRQVROLGDWLRQ RI VHFXULW\ GLVWULEXWLRQ LQ WKH 8 6 VRPHWKLQJ WKDW KDV EHHQ KDSSHQLQJ IRU WKH ODVW \HDUV $V WKH
38
OCT 2014
ĆżBrian James, Director, Strategic Accounts, Pelco by Schneider Electric
ĆżGordon Lang, Director, Strategic Partners & National Accounts, Hikvision USA
ĆżRafael Madrigal, International Sales Manager, NVT
OLQHV FRQWLQXH WR EOXU EHWZHHQ ZKR ZLOO EH SURYLGLQJ VHFXULW\ VXUYHLOODQFH DQG DFFHVV FRQWURO SURGXFWV DQG VHUYLFHV WR WKH HQG XVHUV GLVWULEXWLRQ ZLOO FRQWLQXH WR HYROYH WR SURYLGH VHUYLFHV WKDW WKHVH QHZ FXVWRPHUV GHPDQG 7KH QHZ $QL[WHU RUJDQL]DWLRQ LV SRVLWLRQHG YHU\ VWURQJO\ WR FRPSHWH LQ WKLV HYROYLQJ LQGXVWU\ Âľ ,Q WKH ORQJ UXQ H[SHFWDWLRQV DUH WKDW ERWK $QL[WHU DQG 7UL (G ZLOO EHQHILW IURP WKH DFTXLVLWLRQ WKURXJK H[SDQGLQJ RQ WKHLU SURGXFW DQG PDUNHW IRRWSULQWV $V *RUGRQ /DQJ 'LUHFWRU RI 6WUDWHJLF 3DUWQHUV 1DWLRQDO $FFRXQWV IRU +LNYLVLRQ 86$ FRPPHQWHG ´7KLV LV SDUW RI D FRQWLQXLQJ WUHQG RI ODUJHU GLVWULE XWRUV EX\LQJ VPDOOHU RQHV WR LQFUHDVH WKHLU IRRWSULQW DQG RU H[SDQGLQJ WKHLU PDUNHW IRFXV 7KH Ň&#x160;ZKROHŇ&#x2039; EHFRPHV JUHDWHU WKDQ WKH VXP RI LWV SDUWV Âľ 0DGULJDO IXUWKHU H[SODLQHG ´$QL[WHU KDV QRZ DGGHG PRUH SRLQWV RI VDOH DQG ZKLOH WKHUH PD\ EH VRPH RYHUODS HFRQRPLHV RI VFDOH LQ SURGXFW VHOHFWLRQ ZLOO RFFXU WR JLYH $QL[WHU EHWWHU OHYHUDJH LQ WKH VXSSO\ FKDLQ DQG HYHQWXDOO\ ZH H[SHFW WKRVH VDYLQJV WR EH SDVVHG RQWR WKHLU FXVWRPHUV ZKHUHE\ HYHU\RQH LQ WKH HQG ZLQV Âľ +H DOVR DGGHG ´7KH NH\ KHUH LV WKDW 7UL (G FXVWRPHUV DQG $QL[WHU FXVWRPHUV QRZ KDYH RQH VRXUFH IRU DOO WKHLU EXLOGLQJ SURMHFW QHHGV Âľ
$'9(5725,$/
$+' WKH *DWHZD\ WR )+'
$ 1HZ (UD IRU WKH $QDORJ +' 0DUNHW Â&#x201E; 68%0,77(' %< 1(;7&+,3
W
e are in a new era of the video surveillance market, especially in regard to full HD (FHD)/ m HD transmission technology, an explosion in the H FHD/HD transmission technologies. In transmitting variety of FH resolution images, FHD/HD data, there are two options in high resolutio raw data transmission and IP transmission based the market: ra compression. on compress Generally, rraw data transmission is more familiar to the Asian market than the t European/American market, where focus is on IP-based ssystems. To survive within the same video surveilmarket, new technology must overcome its weaknesses lance market and outdo its competitors. At present, raw transmission technologies for analog transmissions are gaining popularity in the market. Raw transmission technologies have a strong signal characteristic based on analog transmission and are easier to access on tthe manufacturersâ&#x20AC;&#x2122; side. Since manufacturers are aaccustomed to developing analog products over IIP-based ones, this technology has become the most popular technology on the market now. m Covering all resolutions from standard definition C (SD) to FFHD, as well as providing longer distance than the same high quality images and transmission HD-SDI but th latency, Analog HD (AHD), a unique transmission without laten powered by Nextchip, is taking the spotlight. The solution pow technology from Nextchip, a dedicated video processing core technolo expert, is the major reason for the technologyâ&#x20AC;&#x2122;s success. Due to the dilemma the video surveillance market has been in due tto the cost and transmission distance of FHD/HD systems, the introduction of AHD technology provides a better solution not jjust to customers, but the overall market too.
$+' )520 $1$/2* 72 )8// +' $+' )52 Nextchip is a fabless company specialized in the design of semiconductors. Nextchip has been developing its own core semiconduct technologies like IPs and algorithms in image processing and
44
OCT O C T 2014 2001144
optimizing them into a single chip. These technologies have been adapted in both video surveillance cameras and DVRs for 17 years. Nextchip has been focusing on the surveillance market for almost two decade. With knowledge of customersâ&#x20AC;&#x2122; needs and possessing all the core technologies, Nextchip is set to impact the surveillance market as one of the top players in ISP and video decoders. Based on these technologies and
+LJKO\ )OH[LEOH ,QWHJUDWHG 6\VWHP
know-how, in 2013, as the first phase of the transmission solution, Nextchip launched a new SD transmission technology, COMET (COMposite Video Enhanced Technology), an improvement
to the conventional CVBS in terms of cross color/cross luminance and H/ V resolution that is shown in high frequency parts. Therefore, COMET provides marked clearer and sharper
Uncompressed real-time and fully integrated video streams.
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Ò&#x2039; IOH[LELOLW\ LQ KDUGZDUH VLGH DQG IDVW PDUNHW SHQHWUDWLRQ LQWR WKH )+' GRPDLQ
www.asmag.com
45
352'8&7 (;3/25$7,21
,GHQWLW\ 0DQDJHPHQW
6ROXWLRQV .HHS ,QWUXGHUV DW %D\ Â&#x201E; %< :,//,$0 3$2
Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well. Determining whether these people are who they say they are and allowing them access to critical areas or secure networks has become a major focus for end users, who can be aided by advanced technologies such as multifactor authentication.
50
OCT 2014
Each level of identity verification adds a further layer of protection. Strong authentication technology significantly strengthens the fabric of the layered security.
I
dentity management is a growing sector. A recent Research and Markets report indicated that the industry stood at a size of US$5.1 billion in 2013 and is expected to hit $10.4 billion in 2018, translating into a compound annual growth rate of 15.1 percent. Growth is driven by strong demand from organizations seeking to protect premises and sensitive data from intruders. Being able to identify people accurately is critical, especially for large enterprises that maintain thousands, if not tens of thousands, of workers around the globe. Further, the roles assumed by workers have become more diverse. For enterprises nowadays, staff does not just include full-time employees but also part-time workers, temp workers, and contractors. The need to effectively manage these workers and grant them access to company premises or data has therefore spawned advanced management solutions. “The process of managing identities and authorizations should be straightforward and user-friendly in order to manage many different identities quickly, while at the same time decreasing the chance that human mistakes occur,” said Arjan Bouter, Head of Sales at Nedap Security Management. “If you use temporary staff to make the most of seasonal peaks, you set (the system) so they’re only authorized to access your production facility for a specific period. When this period ends, their access rights are withdrawn automatically.”
www.asmag.com
51
352'8&7 (;3/25$7,21
9HUWLFDOV 6WDQG WR %HQHILW )URP
,GHQWLW\ 0DQDJHPHQW 6ROXWLRQV Â&#x201E; %< :,//,$0 3$2
From higher education to healthcare, users in different vertical markets need good identity management solutions to authenticate users and grant them access to buildings or network data. This article explores how identity management solutions are applied to different verticals.
56
OCT 2014
D
ifferent verticals face different identity management needs. Healthcare providers, for example, are concerned with intrusion into patientsâ&#x20AC;&#x2122; medical records, while corporate users demand effective management of employees who are hired or terminated. Good identity management solutions benefit different verticals in a variety of ways.
+($/7+&$5( Healthcare operators deal with security issues on a regular basis. These include conflicts between doctors and patients and unauthorized access to critical areas, such as X-ray rooms, intensive care units, and birthing and infant care centers.
352'8&7 (;3/25$7,21 Another huge problem facing healthcare operators is the theft of patientsâ&#x20AC;&#x2122; medical data. â&#x20AC;&#x153;There have been a number of breaches in recent years that have compromised millions of private patient medical records. Username and password are not enough to protect these highly sensitive documents, and a stronger form of authentication is necessary,â&#x20AC;? said Jennifer Dean, Identity and Access Marketing Communication Manager at Gemalto. â&#x20AC;&#x153;As regulatory requirements become more stringent by the day, hospital and medical office administrators are under increasing pressure to maintain data integrity and protect patient records. There is a real need for a standardized identification system that integrates physical and logical access â&#x20AC;&#x201D; a solution that is secure and auditable, but thatâ&#x20AC;&#x2122;s still easy to deploy and convenient for users.â&#x20AC;? An emerging approach to integrate physical and logical access uses the NFC technology, which enables users to carry a smart card or smartphone with an authentication credential stored on the deviceâ&#x20AC;&#x2122;s secure element (SE) or SIM chip. â&#x20AC;&#x153;With these mobile soft tokens, users can simply â&#x20AC;&#x2DC;tap inâ&#x20AC;&#x2122; to hospital facilities, VPNs, wireless networks, and cloud- and web-based applications,â&#x20AC;? said Jordan Cullis,
There have been a number of breaches in recent years that have compromised millions of private patient medical records. Username and password are not enough to protect these highly sensitive documents, and a stronger form of authentication is necessary. Jennifer Dean, Identity and Access Marketing Communication Manager, Gemalto
One main security pitfall in the corporate environment is not collecting credentials after an employee leaves the company. This allows them access at any time in the future. By managing their identities electronically, access rights can be immediately removed. Jeremy Earles, Credentials Business Leader, Allegion
Head of Identity Assurance for APAC at HID Global. â&#x20AC;&#x153;Affiliated doctors who might previously have carried as many as 20 one-time password tokens will now be able to carry a single mobile soft token.â&#x20AC;? A good visitor management solution is also needed to keep track of visitors coming in and out of hospitals. â&#x20AC;&#x153;Todayâ&#x20AC;&#x2122;s visitor management systems enable the screening, badging, and tracking of all visitors or, at a minimum, those visiting critical areas or during â&#x20AC;&#x2DC;after hoursâ&#x20AC;&#x2122; periods,â&#x20AC;? Cullis said. â&#x20AC;&#x153;Systems should support real-time patient feeds using Health Level 7 (HL7) integration, which ensures that no
visitor is sent to the wrong location or to see a patient that is no longer checked in.â&#x20AC;?
&25325$7( Enterprise users maintain thousands of employees who are spread across the globe. Keeping tabs on workers as they enter or exit companies is critical. â&#x20AC;&#x153;One main security pitfall in the corporate environment is not collecting credentials after an employee leaves the company. This allows them access at any time in the future. By managing their identities electronically, access rights can be immediately removed without the
A Word on Mobile Banking and Payments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
58
OCT 2014
PXOWLIDFWRU DXWKHQWLFDWLRQ VROXWLRQ WKDW FRPELQHV D SDVVZRUG D PRELOH RU ZHE WRNHQ DQG D ELRPHWULF RU EHKDYLRU PHWULF VROXWLRQ 'HYLFH DXWKHQWLFDWLRQ 2QFH LW LV GHWHUPLQHG WKDW WKH XVHU LV ZKR KH RU VKH VD\V VKH LV LW LV LPSRUWDQW WR YHULI\ WKDW WKH SHUVRQ LV XVLQJ D ´NQRZQ¾ GHYLFH %URZVHU SURWHFWLRQ 7KLV HQVXUHV WKDW WKH EURZVHU EHLQJ XVHG LV SDUW RI D VHFXUH FRPPXQL FDWLRQ FKDQQHO (QKDQFHG VHFXULW\ IRU SDUWLFXODUO\ VHQVLWLYH WUDQVDFWLRQV LQFOXGLQJ VLJQLQJ FRQWUDFWV DQG WUDQVIHUULQJ ODUJH IXQGV 'HIHQGLQJ DJDLQVW WKUHDWV LQ WKLV DUHD UHTXLUHV WKH XVH RI WUDQVDFWLRQ DXWKHQ WLFDWLRQ SDWWHUQ EDVHG LQWHOOLJHQFH $SSOLFDWLRQ VHFXULW\ 7KLV OD\HU SURWHFWV DSSOLFD WLRQV RQ PRELOH GHYLFHV WKDW DUH XVHG WR GHOLYHU VHQVLWLYH LQIRUPDWLRQ
7KLV ZRXOG EH WKH LGHDO ZD\ WR FRQGXFW PRELOH EDQNLQJ RU SD\PHQWV %XW IRU PRVW FRQVXPHU RQOLQH WUDQVDFWLRQV DW WKLV WLPH XVHUQDPH DQG SDVVZRUG DUH VWLOO WKH QRUP ´)URP VKRSSLQJ RQOLQH WR FRQGXFWLQJ D EDQNLQJ WUDQVDFWLRQ ZLWK \RXU PRELOH WKH PDMRULW\ RI FRPSDQLHV GRQŇ&#x2039;W RIIHU D WZR IDFWRU RSWLRQ Âľ VDLG -HQQLIHU 'HDQ ,GHQWLW\ DQG $FFHVV 0DUNHWLQJ &RPPXQLFDWLRQ 0DQDJHU DW *HPDOWR ´+RZHYHU DV GDWD EUHDFKHV FRQWLQXH WR EHFRPH PRUH ZLGHVSUHDG DQG DIIHFW DQ HQRUPRXV DPRXQW RI XVHUV FRPSDQLHV DUH ILQDOO\ WDNLQJ QRWH DQG LPSOHPHQWLQJ VRPH IRUP RI VWURQJ DXWKHQ WLFDWLRQ VXFK DV 606 273 :LWK $SSOHŇ&#x2039;V UHFHQW DQQRXQFHPHQW WKDW WKH L3KRQH ZLOO EH HTXLSSHG ZLWK 1)& DQG PRELOH SD\PHQWV WKURXJK $SSOH3D\ ZKHUH XVHUV ZLOO XVH ELRPHWULFV ZLWK HYHU\ PRELOH SXUFKDVH ZH ZLOO VXUHO\ VHH DQ LQFUHDVH LQ ELRPHWULF VHFXUHG WUDQVDFWLRQV Âľ
9(57,&$/ 0$5.(7
2LO *DV )XHO 8S RQ 6DIHW\ DQG
From Fr om a s saf afet af ety et y an and se and secu curi cu rity ri ty p per ersp er spec sp ecti ec tive ti ve,, oi ve oill an and d ga gas s in inst stal st alla al lati la tion ti o s ar on are e am amon ong on g th the e mo most crit cr itic it ical ic al a and nd c nd cha hall ha llen ll engi en ging gi ng e env nvir nv iron ir onme on m nt me nts. s. TThe he s spe peed pe ed iin ed n wh w ic ich h an iinc ncid nc iden id ent en t ca can n esca esca es cala late la te t to oa disa di sast sa ster st er m er mea eans ea ns ttha hatt op ha oper erat er ator at ors or s ne need ed tto o ge get t in info form fo rmat rm atio at ion io n qu quic ickl ic kly kl y to b be e ab able le t to o re reac a t an ac and d mini mi nimi ni mize mi ze d dam amag am ages. Ad ag Adva v nc nces iin vi vide deo o te tech chno ch nolo no logy lo gy a and nd v vid ideo id eo c con onte on tent te nt a ana naly na lyti ly tics ti cs h hav ave av e grea gr eatt po pote tent te ntia nt iall to a assist oi o l an and d ga gas s in inst stal st allations s in d det etecti ting ng f fir ires ir es, le es es, leak aks, ak s, a and nd s sec ecur ec urit ur ity it y thre th reat re ats, at s, a as s we well ll a as s he help lp m mak ake ak e op oper erat er atio at ions io ns m mor o e ef or effi fici fi cien ci ent. en t.
Â&#x201E; %< ,65$(/ *2*2/ )5((/$1&(5
A
s oil exploration moves to new regions across the world, so does the need for better monitoring of remote facilities, increased protection against terror threats, and pipeline and leak detection monitoring solutions. Exploration and drilling security systems will be the largest segment in terms of spending and adoption followed by refineries and storage facilities. According to research by Frost and Sullivan, the global oil and gas infrastructure security market was estimated at US$19.6 billion in 2013 and will grow to $24.7 billion by 2021. Including network and cyber security, the combined oil and gas security market will reach $30 billion by 2018.
66 66
OC T 2014 OCT 2200014 14 14
Any damage to an oil and gas facility has grave consequences. Incidents have implications on employee safety, environmental damage, cleaning costs, damage penalties, equipment replacement, and the list goes on and on. This becomes even more challenging when considering the nature of these installations. There are hundreds of potential breach points for leaks and damages: numerous valves and pumps, meters upon meters of pipes. Even within the facility, environments are not the same. A refinery for example will include various types of oil, transported at different temperatures and pressures, from ambient temperatures and pressure up to 130 bars at 100°C.
w w. ww www.asmag.com wassmaag. g.com
6677
,17(//,*(17 9,'(2 62/87,21
XVCA CASINO SAY NO TO WRONG DOERS Everyone knows what surveillance cameras in casinos are for, but no one really worries about them unless they have something to hide, and for people who do, they hide it well. No longer do casinos bet solely on security cameras to spot crime ongoing in their premises, with video content analysis (VCA) to detect any unusual incidents, the house will always win.
Â&#x201E; %< /,6$ +68
C
asino get thousands of visitors on a daily basis, and with people bustling in and out of the premises, it gets hard to keep track of what is going on. Cameras are employed to cover every inch of the property to ensure there is no unlawful activity or accidents. However, with all the video coverage, it is impossible to expect humans to not miss a single frame that could lead to suspicious activity when monitoring the casino.
0267 &20021 7+5($76 ,1 &$6,126 Although casinos have gaming regulations that are implemented for safety measures, law enforcement employed to fight crime, and surveillance cameras on every gaming table, there are still people out there who believe rules are there to be broken. According to the Nevada State Gaming Control Board, approximately 500 people are arrested each year for attempting to cheat at casinos in the state of Nevada, U.S., and out of the total number of arrested, nearly a third of those arrests are casino employees. This staggering fact has urged casinos to be more aware of their security, as even insiders cannot resist the lure of â&#x20AC;&#x153;easy money.â&#x20AC;?
74
OCT 2014
9&$ ,6 127 -867 7+( (<( ,1 7+( 6.< Perhaps it is because of the large amounts of cash situated on the premises, but casinos have always been a natural target for criminal activity. Some of the most common threats in casinos are re cheating, theft, and fraud. In a gaming ffacility ili constantly humming with activity, it is impractical to only rely on the security team to be able to identify all potentially suspicious activity. In the past, most casinos encountered various crimes even under conditions where video surveillance cameras were installed. Insufficient resolution to
(YHU VLQFH 9&$ KDV EHHQ LQWURGXFHG WR WKH JDPLQJ LQGXVWU\ PRUH JDPH IUDXGV DUH GHWHFWHG
www. ww www.asmag.com ww. w as asmag.com
7755
&$6( 678'<
6WDWH RI WKH $UW ,QFLGHQW 0DQDJHPHQW 6\VWHPV 6HFXUH 5HVRUWV :RUOG &DVLQR 1HZ <RUN Resorts World Casino New York City is New Yorkâ&#x20AC;&#x2122;s first world-class gaming casino connected to the famous Aqueduct racetrack in South Ozone Park, Queens, and has played host to some of Thoroughbred racingâ&#x20AC;&#x2122;s biggest heroes over the years. With over 400,000 square feet of gaming facilities and a 70,000 square feet event space for big-ticket events, Resorts World Casino employs over 1,300 people and sees an average of 20,000 guests daily, utilizing 6,500 parking spots. Resorts World New York has implemented state-of-the-art security and surveillance technologies to ensure the safety and security of their facility, guests, and personnel. Â&#x201E; $'$37(' )520 ,9,(: 6<67(06¡ 5(62576 :25/' &$6,12 &$6( 678'<
7+( %86,1(66 &+$//(1*( Since opening its doors in October 2011, Resorts World Casino continues to have solid growth and record revenues. Unfortunately, with success also comes a number of persistent security issues from both insiders and outsiders. The casino handles numerous security incidents every single day, including common incidents such as theft, unwanted banned patrons, personal injuries, vandalism, etc. Even a routine incident can often take an inordinate amount of manpower and, if not handled in a timely manner, can compromise business operations and services and potentially cause exposure to liability. The process of recording, tracking, and reporting was a manual process that inhibited the investigation and reporting process. Information was inconsistent and not readily retrievable, and media files were often not associated with an incident. Compiling meaningful reports was a lengthy and onerous task, making it difficult to correlate events to identify areas of risk and optimize staff allocation. Jason Arnett, Director of
THE BENEFITS %\ GHSOR\LQJ D IXOO\ LQWHJUDWHG LQFLGHQW UHSRUWLQJ DQG ULVN PDQDJHPHQW VROXWLRQ 5HVRUWV :RUOG LV QRZ ZHOO HTXLSSHG WR GRFXPHQW VKDUH DQG PDQDJH DOO RI WKHLU VHFXULW\ DQG VXUYHLOODQFH LQIRUPDWLRQ EHWZHHQ QHFHVVDU\ GHSDUWPHQWV 5HVRUWV :RUOG WUDQVIRUPHG WKHLU FXPEHUVRPH PDQXDO SURFHVVLQJ LQWR D KLJK SHUIRUPDQFH VHFXULW\ ULVN PDQDJHPHQW VROXWLRQ UHDSLQJ UHDO GLYLGHQGV ZKLFK LQFOXGH Â&#x2021; $XWRPDWHG GDWD VHDUFKLQJ TXHU\LQJ VDYHG KRXUV D PRQWK VHDUFKLQJ DQG FRPSLOLQJ VLQJOH RU PXOWLSOH VHDUFK FULWHULD ZLWK WKH DELOLW\ WR VDYH VWDQGDUG GDLO\ ZHHNO\ PRQWKO\ FXVWRPL]HG UHSRUW ILOWHUV DV UHTXLUHG Â&#x2021; ,QFLGHQW UHSRUWLQJ SURGXFHG D WLPH VDYLQJV RI KRXUV D PRQWK ZLWK L9LHZ 6\VWHPŇ&#x2039;V LQFLGHQW UHSRUWLQJ DQG ULVN PDQDJHPHQW V\VWHP FHQWUDO GDWD UHSRVLWRU\ SURYLGLQJ GHWDLOHG LQFLGHQW DQG DGYDQFHG UHSRUWLQJ VWDWLVWLFV Â&#x2021; $XWRPDWHG LGHQWLILFDWLRQ QRWLILFDWLRQV RI WUHVSDVVHUV RU EDQQHG VXEMHFWV RQ SURSHUW\ VDYLQJ SURFHVVLQJ WLPH DQG DLGLQJ SROLFH ZLWK HYLGHQFH UHVXOWLQJ LQ
82
OCT 2014
Surveillance of Resorts World New York initiated the project to automate their security reporting, mitigate risk, and improve efficiencies. Arnett looked to iView Systemsâ&#x20AC;&#x2122; gaming experts for an integrated security and risk management solution to automate their incident reporting, daily log, officer dispatch, and lost and found functions, as well as to identify and track employees and visitors.
Resorts World Casino New York is New Yorkâ&#x20AC;&#x2122;s first world-class gaming casino. With over 400,000 square feet of gaming facilities and a 70,000 square feet event space for big-ticket events, Resorts World Casino has implemented state-of-the-art security and surveillance technologies to ensure the safety of their facility, guests, and personnel.
7+( 62/87,21 With iView Systemsâ&#x20AC;&#x2122; experience in the gaming industry and Resort World sister casino in Singapore already using iView Systems technology for security and surveillance reporting, Arnett looked to Tony Day, Senior Account Executive for iView Systems, to map out their security and surveillance reporting needs. â&#x20AC;&#x153;They required an incident reporting and risk management system that would allow them to document all daily activity and incidents, along with the ability to include supporting evidence such
as media files or individual reports. Additionally, Resorts World required the capability to track all personnel and vehicles, as well as manage and control details such as lost and found items, visitor management, employee audits, and document disputes, and provide player analysis by surveillance,â&#x20AC;? Day said. $ /$<(5(' $3352$&+
In addition to tracking and reporting incident and events, Resorts World has implemented a layered approach to
VDYLQJV RI 86 D \HDU Â&#x2021; $XWRPDWHG GLVSDWFK UHSRUWLQJ VDYHG KRXUV D PRQWK Â&#x2021; 6WUXFWXUHG GDWD FROOHFWLRQ UHSRUWLQJ LV VLPSOH IDVW DFFXUDWH GDWH WLPH VWDPSHG FRQVLVWHQW WR UHGXFH WHGLRXV HUURU SURQH GDWD HQWU\ ZLWK GRFXPHQWHG DXGLW WUDLOV WKDW DUH VHFXUH VHDUFKDEOH ZLWK LQVWDQW VWDWLVWLFDO UHSRUWLQJ DQG GLVWULEXWLRQ Â&#x2021; ,QFLGHQWV ,QYHVWLJDWLRQV ß $ELOLW\ WR FDSWXUH FRPSOHWH VWRU\ YLGHR VFDQQHG GRFXPHQWV H[WHUQDO ILOHV OLQNV WR ORQJ WHUP '95 VWRUDJH UHDO WLPH YLGHR FDSWXUH OHJDO DQG SURFHGXUDO IRUP DXWRPDWLRQ XVH RI IRUFH :6,% WUHVSDVV Â&#x2021; 6HJPHQWHG YLHZV RI DOO RI LQFLGHQWV FRUUHODWHV VXEMHFWV SHUVRQQHO DQG FRQWDFW LQIRUPDWLRQ Â&#x2021; &URVV IXQFWLRQDO FRPPXQLFDWLRQ RI LQFLGHQWV %2/2V DV ZHOO DV VKLIW DQG SHUVRQQHO EULHILQJV ZHUH DOO YDVWO\ LPSURYHG ZLWK VSHHG DQG HIILFLHQF\ Â&#x2021; 0LQLPXP WUDLQLQJ UHTXLUHPHQWV SURYLGHG IRU IDVW XVHU UHDGLQHVV
detect, deter, and resolve issues in a proactive manner. iViewâ&#x20AC;&#x2122;s visitor management system checks in and monitors contractors and vendors or suppliersâ&#x20AC;&#x2122; access to the property. With so many suppliers coming and going at all hours, the system provides detailed logs of visits and screens against watch lists, which aides with access, accountability, and compliance. â&#x20AC;&#x153;Weâ&#x20AC;&#x2122;re able to pre-register visitors and ensure contractors and suppliers are in compliance with licensing and insurance regulations
DQG TXHU\LQJ QRW WR PHQWLRQ WKH LQFUHDVHG LQWHJULW\ RI RXU GDWD FROOHFWHG :H ZHUH DEOH WR UHDOL]H IXOO UHWXUQ RQ LQYHVWPHQW LQ MXVW DQG D KDOI PRQWKV Âľ ´7KH VHFXULW\ DQG VXUYHLOODQFH VWDII LPPHGLDWHO\ IHOW DW HDVH XVLQJ WKH VRIWZDUH JLYHQ WKH VLPSOLFLW\ DQG DFFXUDF\ RI WKH XVHU LQWHUIDFH 7KH VRIWZDUHŇ&#x2039;V ORJLFDO ZRUNIORZ DOORZV XV WR FROOHFW DQG PDQDJH GDWD DQG UDSLGO\ DQDO\]H DQG DFW DV ZHOO DV LGHQWLI\ WUHQGV DQG VKDUH UHSRUWV ZLWK H[HFXWLYH PDQDJHPHQW Âľ
´:H GLG QRW H[SHFW WR VHH VXFK VLJQLILFDQW EHQHILWV VR TXLFNO\ ¾ VWDWHG -DVRQ $UQHWW 'LUHFWRU RI 6XUYHLOODQFH RI 5HVRUWV :RUOG 1HZ <RUN ´%\ DXWRPDWLQJ RXU VHFXULW\ DQG VXUYHLOODQFH IXQFWLRQV ZH KDYH VDYHG FRQVLGHUDEOH PDQ KRXUV UHSRUWLQJ VHDUFKLQJ
www.asmag.com
83
The overarching view in the security industry right now is that IP, which employs a network infrastructure and offers HD video, will one day replace analog solutions, which have defined video surveillance for half a century. For analog players, who are seeing declines in sales and revenue, they must find ways to regain their former dominance in the industry. HD-overcoaxial solutions, which deliver HD video over users’ existing coaxial cabling, represent their ultimate battle for survival amidst the IP invasion.
63(&,$/ )($785(
+' RYHU &RD[LDO
8OWLPDWH %DWWOH IRU 6XUYLYDO E\ $QDORJ 0DQXIDFWXUHUV %< $/) &+$1*
E
ver since 960H and HD-SDI emerged in 2011, video surveillance players have been trying to find solutions that enhance the quality of CCTV, which remains the mainstream surveillance technology. Analog cameras are inexpensive and easy to install, and
86
OCT 2014
they still dominate the market with 70 to 80 percent of market share. However, IP cameras are threatening the very existence of analog players, who are seeing a steady revenue decline. Against this backdrop, analog players seeking to survive have put intensive efforts into the R&D of
high-resolution HD-over-coaxial solutions. HDCVI, HDTVI, ccHDtv, and AHD are the products of those efforts. Any HD-over-coaxial solution, be it 960H, HD-SDI, HDCVI, HDTVI, AHD, and ccHDtv, must be easy to use over the end user’s legacy coaxial cable. HD transmission
63(&,$/ )($785(
Fiber Links Boost HD-Over-Analog Solutions 6LQFH +' RYHU FRD[LDO VROXWLRQV GHOLYHU YLGHR IRU XS WR PHWHUV DQ\ GLVWDQFH ORQJHU WKDQ WKDW UHTXLUHV WKH XVH RI ILEHU WUDQVPLVVLRQ 7KHUH ZDV D WLPH ZKHQ +' 6', ZDV WKH RQO\ QRQ ,3 VLJQDO IRUPDW WKDW FRXOG EH FRQYHUWHG WR RSWLF VLJQDO ´$V D UHVXOW GLVWDQFH ZDV D PDLQ IDFWRU IRU GHFLGLQJ ZKDW +' WHFKQRORJ\ WR HPSOR\ ¾ VDLG 'DULXV /XNRFLXV 'LUHFWRU RI 6DOHV IRU (0($ DW 27 6\VWHPV <HW WRGD\ WHFKQRORJLFDO DGYDQFHV KDYH DOORZHG ILEHU WUDQVPLVVLRQ WR DSSO\ WR RWKHU +' RYHU FRD[LDO VROXWLRQV LQFOXGLQJ +'79, +'&9, SOD\HUV DOVR FODLP WKH\ KDYH FRPH XS ZLWK VROXWLRQV HQDEOLQJ FRQYHUVLRQ IURP +'&9, WR RSWLF WKXV DOORZLQJ YLGHR WUDQVPLVVLRQ RI RYHU PHWHUV $FFRUGLQJ WR /XNRFLXV EHLQJ D SURYLGHU RI FRPSUHKHQVLYH WUDQVPLVVLRQ VROXWLRQV 27 GRHV VHH WKH QHHG WR GHYHORS ILEHU RSWLF SURGXFWV WKDW VXSSRUW DOO NLQGV RI ĺ Darius Lukocius, Director of Sales,
+' IRUPDWV ´+RZHYHU ZKHQ WR KDYH VXFK SURGXFWV GHSHQGV RQ VHYHUDO WKLQJV LQFOXGLQJ WKH SRSXODULW\ RI VXFK WHFKQRORJ\ WKH SURSUL HWDU\ QDWXUH RU SDWHQW RI VXFK WHFKQRORJ\ DQG WKH HIIHFWLYHQHVV RI WKH FRVWLQJ RI VXFK SURGXFWV Âľ KH VDLG :KHQ LPSOHPHQWLQJ +' 6', VXUYHLOODQFH LQVWDOOHUV QHHG WR EHZDUH RI VHYHUDO WKLQJV ´6LQFH +' 6', FDPHUDV PDLQO\ FRPH ZLWK WZR GLIIHUHQW GDWD UDWHV É&#x17D; *ESV DQG *ESV É&#x17D; ZKHQ FKRRVLQJ +' 6', ILEHU RSWLF FRQYHUWHUV WKH VSHFV KDYH WR FRPSO\ Âľ /XNRFLXV VDLG ´6LQFH WKH PD[LPXP WUDQVPLVVLRQ GLVWDQFH RI +' 6', RQ PXOWLPRGH ILEHU LV QR PRUH WKDQ WZR NLORPHWHUV LW LV DGYLVHG WR FKRRVH VLQJOH PRGH ILEHU IRU ILEHU OLQN LQVWDOODWLRQ Âľ
EMEA, OT Systems
should be achieved using 5C-2V (RG-59U) or 3C-2V (RG-6) coaxial cable without quality loss, and the traditional distance barrier of 100 to 200 meters must be overcome. The solution must incur no extra cost for installation or upgrade, resist quality loss over a long distance, and enable easy upgrade to megapixel-level HD surveillance. Further, it must be high in quality and competitive in price to gain a stronger foothold in vertical markets. In summary, for a solution to be called HD-over-coaxial, six basic requirements must be met: It must have high video clarity and color separation, as well as high signal filtering, noise reduction, and image restoration capabilities; As HD-over-coax is claimed as a breakthrough technology, it must be able to transmit signals for a longer distance over existing coaxial cable; The solution must not be subject to latency, compression-related quality loss, or any compromise to video quality;
1 2 3
4
The backend equipment must be compatible with the 960H format, and future compatibility with analog splitters and matrix systems must be considered; HD-over-coax must be easy to use and operate and allow settings on both frontend and backend equipment; Any solution must have low cost and high quality. There are HD-over-coaxial DVRs that can support both 960H and 720/1080p. These are called hybrid HD DVRs. There are even HD DVRs that are bolstered by Intersilâ&#x20AC;&#x2122;s decoder chip and the TCP/IP interface to support 960H, 720p/1080p, and IP signals. These are called Tri-brid HD DVRs.
5 6
&203$5( $1' &2175$67 %(7:((1 62/87,216 HDCVI, HDTVI, and AHD share one thing in common: as opposed to 960H that uses the CCD sensor, HDCVI, HDTVI, and AHD use the megapixel-level CMOS or
Exmor CMOS sensor. The purpose is to capture HD images at the source level. Among manufacturers of CMOS sensors are Sony, Omnivision, Pixelplus, and BYD. The formation of images differs slightly according to brand. Another similarity as far as components are concerned is the use of an image signal processor (ISP) in conjunction with the sensor. This device ultimately determines the final image displayed by HDCVI, HDTVI, and AHD solutions. The chipset could be integrated into the sensor module or into the transceiver at the backend of the HDCVI, HDTVI, or AHD camera. Image signal processors, whose manufacturers include Sony, Fullhan, Nextchip, and Eyenix, process and enhance images formed by the sensor. As ISPs of different companies are designed differently, they have different ways of handling backlight compensation, WDR noise reduction, and the 3As, namely auto white balance, auto exposure, and auto focus. One final thing that the solutions have
www.asmag.com
87
Companies in This Issue Products of the Month • AVENTURA TECHNOLOGIES • HIKVISION DIGITAL TECHNOLOGY • ZNV TECHNOLOGY
News Feature • ANIXTER INTERNATIONAL • HIKVISION DIGITAL TECHNOLOGY • NVT • PELCO BY SCHNEIDER ELECTRIC
Product Exploration • • • • • •
ALLEGION AMAG TECHNOLOGY BRIVO LABS GALLAGHER GEMALTO HID GLOBAL
• HUNDURE TECHNOLOGY • NEDAP SECURITY MANAGEMENT • SECURENVOY
Intelligent Video Solution • • • •
DVTEL HIQVIEW VIDICORE HONEYWELL SECURITY
Vertical Market • BOSCH SECURITY SYSTEMS • EVITECH • EX-SIGHT • IOMNISCIENT • MSL GROUP • OSPREY INFORMATICS • PELCO BY SCHNEIDER ELECTRIC
Next Issue Product Exploration RFID
Vertical Market HEALTHCARE
Industry Report SECURITY 50 & INDUSTRY TRENDS
Intelligent Video Solution AIRPORT/SEAPORT
Special Feature VSaaS/ACaaS/SaaS www.asmag.com
101
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO. 21 27 7 15 31 32, 33 37 BARN DOOR, INSIDE FRONT COVER, 1 8 63 79 9 5 BACK COVER 48,49 FRONT COVER 6 104 42-47 81 INSIDE BACK COVER 23 69 2 93 64, 65 25 34, 35 4 11 39 19 3 61
ADVERTISER MAJOR ITEM 3S VISION IP CAMERA / NVR / VIDEO SERVER AAEON TECHNOLOGY INC. NVR / FIRE WALL AIMETIS CORP. SOFTWARE AXIS COMMUNICATIONS AB NETWORK VIDEO SOLUTIONS BOSCH SECURITY SYSTEMS CCTV CNB TECHNOLOGY INC. CCTV COMMAX CO., LTD. SURVEILLANCE DAHUA TECHNOLOGY CO., LTD. SURVEILLANCE DYNACOLOR INC. IP CAMERA / NVR FOCTEK PHOTONICS, INC. LENS FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR GKB SECURITY CORPORATION HDPRO CO., LTD. CCTV HIKVISION DIGITAL TECHNOLOGY CO., LTD. DVR ICATCH INC. DVR MERIT LILIN ENT CO., LTD. IP CAMERA / NVR CAMERA / IP CAMERA / HD-SDI CAMERA / DVR MICRO DIGITAL INC. MINTRON ENTERPRISE CO., LTD. CAMERA NEXTCHIP CO., LTD. CHIP OB TELECOM ELECTRONICS CO., LTD. FIBER OPTIC TRANSCEIVER DIGITAL SURVEILLANCE PANASONIC SYSTEM NETWORKS CO., LTD. QNAP SYSTEMS, INC. NVR / VMS RICOM LENS RIFATRON CO., LTD. DVR SHENZHEN COMMANDER TECHNOLOGY CO., LTD. CASING SHENZHEN SUNELL TECHNOLOGY CORPORATION CAMERA SURVEILLANCE SHENZHEN TVT DIGITAL TECHNOLOGY CO., LTD. SHENZHEN ZNV TECHNOLOGY CO., LTD. SURVEILLANCE TAMRON CO., LTD. CAMERA TVLOGIC CO., LTD. DVR IP CAMERA / SOFTWARE /VIDEOSERVER VIDEOTEC S.P.A. IP CAMERA / SOFTWARE / VIDEO SERVER VIVOTEK INC. WEBGATE INC. DVR ZHEJIANG DALI TECHNOLOGY CO., LTD CCTV
COUNTRY TAIWAN TAIWAN CANADA SWEDEN GERMANY KOREA KOREA CHINA TAIWAN CHINA CHINA TAIWAN KOREA CHINA TAIWAN TAIWAN KOREA TAIWAN KOREA CHINA JAPAN TAIWAN CHINA KOREA CHINA CHINA CHINA CHINA JAPAN KOREA ITALY TAIWAN KOREA CHINA
E-MAIL Sales@3svision.com.tw sales@aaeon.com.tw info@aimetis.com contact-sap@axis.com apr.securitysystems@bosch.com korea@cnbtec.com hkki@commax.com overseas@dahuatech.com info@dynacolor.com.tw sales@foctek-lens.com sales@fjsmt.com sales@gkbsecurity.com sales@hdprocctv.com overseasbusiness@hikvision.com marketing@icatchinc.com sales@meritlilin.com sales@microdigital.co.kr service@mintron.com.tw sales@nextchip.com overseas@obtelecom.com --nvr@qnap.com sales@forecam.com contact@rifatron.com sjw@yjdcase.com sales@sunellsecurity.com overseas@tvt.net.cn znvservice@zte.com.cn newbiz@tamron.co.jp yshong@tvlogic.co.kr info@videotec.com sales@vivotek.com support@webgateinc.com sales@dali-tech.com
MAJOR ITEM FINGERPRINT RFID MODULE / LOCK / READER ELECTRIC LOCKS ELECTRIC LOCKS ACCESS CONTROL FINGERPRINT ACCESS CONTROL FINGERPRINT
COUNTRY MALAYSIA TAIWAN TAIWAN FRANCE SWITZERLAND KOREA MALAYSIA KOREA
E-MAIL info@fingertec.com promag@gigatms.com.tw Is@home-safe.com.tw info@sewosy.com sales@supremainc.com sales@uwcelectric.com sales@ten-bio.com
ADVERTISER SICURIT ALARMITALIA S.P.A. ZENITEL NORWAY AS
MAJOR ITEM ALARM ALARM
COUNTRY ITALY NORWAY
E-MAIL export@sicurit.it ole.falck@zenitel.com
ADVERTISER ICPDAS CO., LTD. PIXELPLUS CO., LTD SCENE ELECTRONICS (HK) CO., LTD. SONY CORPORATION DSBG. SYSTEM LSI DIVISION
MAJOR ITEM SWITCH SEMICONDUCTOR ILLUMINATOR SEMICONDUCTOR
COUNTRY TAIWAN KOREA CHINA JAPAN
E-MAIL info@icpdas.com kahn@pixelplus.com sales@led-scene.com -
ACCESS CONTROL PAGE NO. 57 55 10 59 41 17 79 59
ADVERTISER FINGERTEC WORLDWIDE SDN. BHD. GIGA-TMS INC. LI SHYANG TECH CO.,LTD SEWOSY SIEMENS SUPREMA INC. UWC ELECTRIC (M) SDN. BHD. VOIM TECHNOLOGIES INC.
INTRUSION ALARM PAGE NO. 101 72, 73
OTHER PAGE NO. 91 28, 29 81 12, 13
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.