A&S # I212 Aug. 2016

Page 1


&217(176

August 2016 www.asmag.com

SMART TECHNOLOGY

MARKET UPDATE

P. 36 INDUSTRY REPORT

P. 34

EMEA Market: Heightened Security Demands in a Less Secure World ......................... .................50

P. 58

A Quick Overview of Recent M&As

PRODUCTS OF THE MONTH

VIEWPOINT

3D People Counting for Retail Solutions Provides Precise Data..........21

Brexitt Leaves UK K Security Players Wondering What Will Come Next........28

NEWS FEATURE

The Right Approach to Securing Nightclubs...........................................30

AI is Ready to Work Side by Side With Security...............................................22 Evolution of Video Surveillance Influences Storage Architecture .......................23 Data Protection for Physical Security Systems Should be Tightened .............24 AUG 2016 Ɣ www.asmag.com

Guards, Step Aside! This Robott Sniffs, Detects and Alerts ..25 Pokémon Go Sweeps World by AR storm: What can Security Learn From it?...........26 Contents ...................................................12 Editor’s Note ............................................14

12

VERTICAL SOLUTION

Ensuring Safe Passage Through Tunnels.................................................58 IOT

A Deeper Look Inside the Industrial Camera .................................................62 SMAHOME

Apple Home & Siri: Promising or Just Hype? ....................................................66 Application Cases ...................................16 New Products ..........................................70

INTEGRATED SYSTEM

Getting a Sense of Perimeter Security Systems ................................44 Securing Critical Infrastructures With Thermal and Low Light Surveillance Cameras.....................48 Show Calendar ........................................75 Companies in This Issue........................77


a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

,661 Ë ŕľ˘ŕśľâ€ŤÍ”̝ݭ‏ύୡ ŕźš ੮ŕş—ŕ´š৪޾á•ťáƒ’Î ŕŞ€

9LGHR 6\VWHPV DUH 9LWDO LQ D &RQQHFWHG :RUOG

AUG 2016 Ć” www.asmag.com

‹†‡‘ •›•–‡Â?• –Šƒ– …ƒÂ? ’”‘˜‹†‡ Â?ƒ…Š‹Â?‡Ȁ…‘Â?’—–‡” ˜‹•‹‘Â? –‘ ”‡’Žƒ…‡ Š—Â?ƒÂ? „‡‹Â?‰• ƒ”‡ ‰‘‹Â?‰ –‘ ’Žƒ› ƒÂ? ‹Â?’‘”–ƒÂ?– ”‘Ž‡ ‹Â? –Š‡ …‘Â?Â?‡…–‡† ™‘”Ž† ‘ˆ –Š‡ ˆ—–—”‡Ǥ Š‹• –”‡Â?† ‹• ‰‡––‹Â?‰ Â?‘”‡ ƒÂ?† Â?‘”‡ ‘„˜‹‘—• ĥ ƒŽŽ –Š‡ ‹Â?†—•–”‹‡• Š‘’‡ –‘ Dz–”ƒÂ?•ˆ‘”Â?Çł ˜‹ƒ –Š‡ Â?–‡”Â?‡– ‘ˆ Š‹Â?‰• Č‹ ‘ ČŒ ”‡˜‘Ž—–‹‘Â?Ǥ ‘” ‹Â?•–ƒÂ?…‡ǥ ‹Â? ƒ††‹–‹‘Â? –‘ •‡…—”‹–› ‘” •ƒˆ‡–› ’—”’‘•‡•ǥ …ƒÂ?‡”ƒ• …ƒÂ? „‡ ‹Â?•–ƒŽŽ‡† ‹Â? ƒ ˆƒ…–‘”› –‘ ’‡”ˆ‘”Â? ’”‘†—…–‹‘Â? Ž‹Â?‡ ‹Â?•’‡…–‹‘Â?•Ǥ ”‘„‘– ‘” †”‘Â?‡ …ƒÂ? ƒŽ•‘ „‡ ‡“—‹’’‡† ™‹–Š …ƒÂ?‡”ƒ• –‘ ’”‘˜‹†‡ ’‡‘’Ž‡ ™‹–Š Â?‘”‡ …—•–‘Â?‹œ‡† •‡”˜‹…‡•Ǥ Â? ‘”†‡” –‘ ‡š’‡”‹‡Â?…‡ ƒÂ?† ‡Â?„”ƒ…‡ –Š‡ „‡Â?‡ˆ‹–• ‘ˆ ƒ—‰Â?‡Â?–‡† ”‡ƒŽ‹–› ‘” ˜‹”–—ƒŽ Â”Â‡ÂƒÂŽÂ‹Â–Â›ÇĄ —•‡”• Â?‡‡† ƒ …ƒÂ?‡”ƒ –‘ ”‡…‘”† ˜‹†‡‘ ‘” †‘ Â”Â‡ÂƒÂŽÇŚÂ–Â‹Â?‡ –”‘—„Ž‡•Š‘‘–‹Â?‰Ǥ – …ƒÂ? „‡ …‘Â?…Ž—†‡† –Šƒ– ˆ‘” ƒÂ? ‡Â?–‡”’”‹•‡ ‘” ‹Â?•–‹–—–‹‘Â?ÇĄ ˜‹†‡‘ •›•–‡Â?• ™‹ŽŽ Â?‘ Ž‘Â?‰‡” Â?ƒ––‡” ‘Â?Ž› ‹Â? •‡…—”‹–›ǥ Â•Â—Â”Â˜Â‡Â‹ÂŽÇŚ ŽƒÂ?…‡ ‘” •ƒˆ‡–› ƒ’’Ž‹…ƒ–‹‘Â?•ǥ „—– Â”ÂƒÂ–ÂŠÂ‡Â”ÇĄ –Š‡› …ƒÂ? „‡ Ž‡˜‡”ƒ‰‡† –‘ ’”‘˜‹†‡ ƒ Ž‘– ‘ˆ ‡š–”ƒ ˜ƒŽ—‡ ˆ‘” ‡Â?† —•‡”•Ǥ Šƒ– ‡š’Žƒ‹Â?• ™Š› DzÂ˜Â‹Â†Â‡Â‘Çł •›•–‡Â?•ǥ ƒÂ?† Â?‘– DzÂ•Â—Â”Â˜Â‡Â‹ÂŽÇŚ ŽƒÂ?…‡dz •›•–‡Â?•ǥ ƒ”‡ „‡…‘Â?‹Â?‰ ˜‹–ƒŽ ‹Â? ƒ …‘Â?Â?‡…–‡† ™‘”Ž†Ǥ Č‹ Â? ”‡…‡Â?– ‹••—‡• ‘ˆ ÂƒĆŹÂ•Â• Â?–‡”Â?ƒ–‹‘Â?ÂƒÂŽÇĄ ™‡ Šƒ˜‡ ƒŽ•‘ ‹Â?…”‡ƒ•‡† ‘—” ‡†‹–‘”‹ƒŽ …‘˜‡”ƒ‰‡ ‘Â? –Š‡ ƒ†‘’–‹‘Â? ‘ˆ …ƒÂ?‡”ƒ• ƒÂ?† ‘–Š‡” •‡Â?•‘”• ˆ‘” Â?‘Â?nj•‡…—”‹–› ’—”’‘•‡•ǤČŒ

—”–Š‡”Â?‘”‡ǥ –Š‡ †ƒ–ƒ ‡š–”ƒ…–‡† ˆ”‘Â? ƒŽŽ †‹ˆˆ‡”‡Â?– Â?‹Â?†• ‘ˆ ˜‹†‡‘ •›•–‡Â?• Šƒ˜‡ •–ƒ”–‡† –‘ ’”‘˜‹†‡ Š—‰‡ Â?‡ƒÂ?‹Â?‰ˆ—Ž ‹Â?ˆ‘”Â?ƒ–‹‘Â? ˆ‘” ‡Â?† —•‡”•Ǥ ••‹•–‡† „› ˜‹†‡‘ ƒÂ?ƒŽ›–‹…• •‘ˆ–™ƒ”‡ ‘” ‘–Š‡” ƒ”–‹ˆ‹…‹ƒŽ ‹Â?–‡ŽŽ‹‰‡Â?…‡ –‡…ŠÂ?‘Ž‘‰›ǥ ƒ Â”Â‡Â–ÂƒÂ‹ÂŽÂ‡Â”ÇĄ ˆ‘” ‡šƒÂ?’Ž‡ǥ …ƒÂ? —Â?†‡”•–ƒÂ?† Â?‘”‡ ƒ„‘—– Š‹• …—•–‘Â?‡”•Ǥ Č‹ ‘— …ƒÂ? ˆ‹Â?† ‹Â?–‡”‡•–‹Â?‰ ”‡Žƒ–‡† …‘Â?–‡Â?– ‹Â? –Š‹• ‹••—‡ǯ• …‘˜‡” •–‘”›ǤČŒ ƒÂ?› •‹Â?‹Žƒ” …ƒ•‡• ™‹ŽŽ „‡ ‰”ƒ†—ƒŽŽ› ‹Â?’Ž‡Â?‡Â?–‡† ‹Â? ˜ƒ”‹‘—• ‹Â?†—•–”‹‡•Ǥ Šƒ– ™‡ …ƒÂ? ’”‡†‹…– ‹• –Šƒ– ˜‹†‡‘ ™‹ŽŽ „‡ ƒ …‘”‡ •›•–‡Â? ƒÂ?† –Š‡ Â?‘•– ”‡“—‹”‡† ‘Â?‡ –‘ „‡ ‹Â?–‡‰”ƒ–‡† „› ‘–Š‡” •›•–‡Â?•ǥ †—‡ –‘ ‘ Ǥ Š‡Â? ƒŽŽ •›•–‡Â?• ƒ”‡ …‘Â?Â˜Â‡Â”Â‰Â‡Â†ÇĄ †‡Â?ƒÂ?†• ˆ‘” ˜ƒ”‹‘—• •‘ˆ–™ƒ”‡ ™‹ŽŽ „‡ …”‡ƒ–‡† –‘ ƒ†† ˜ƒŽ—‡ –‘ –Š‡ ˜‹†‡‘ •›•–‡Â?Ǥ ‡•‹†‡• ÇĄ ‘–Š‡” ƒÂ?ƒŽ›–‹…ƒŽ Â•Â‘ÂˆÂ–Â™ÂƒÂ”Â‡ÇĄ •—…Š ĥ ƒÂ?–‹nj†”‘Â?‡•ǥ …›„‡”•‡…—”‹–›ǥ Â?‡™ ƒ—–Š‡Â?–‹…ƒ–‹‘Â? Â?‡–Š‘†• ƒÂ?† Â?ƒ…Š‹Â?‡ Ž‡ƒ”Â?‹Â?‰ǥ …‘—Ž† „‡ –Š‡ Â?‡š– Â?‘•– ™ƒÂ?–‡† •‘ˆ–™ƒ”‡ ˆ‘” ˜‹†‡‘ •›•–‡Â?•Ǥ – ‹• ‹Â?’‘”–ƒÂ?– ˆ‘” ƒŽŽ •‡…—”‹–› ’”‘ˆ‡••‹‘Â?ƒŽ• –‘ ’ƒ› Â?‘”‡ ƒ––‡Â?–‹‘Â? –‘ Â?‡™ •‘ˆ–™ƒ”‡ ƒÂ?† –Š‡ ˜ƒŽ—‡ ‹– …ƒÂ? „”‹Â?‰ –‘ –Š‡ •›•–‡Â?Ǥ Š‹Ž‡ ƒŽŽ –Š‡•‡ –‡…ŠÂ?‘Ž‘‰‹‡• ƒ”‡ …‘Â?˜‡”‰‹Â?‰ǥ –Š‡ •‡…—”‹–› ‹Â?†—•–”› •Š‘—Ž† –Š‹Â?Â? ‘—–•‹†‡ ‘ˆ –Š‡ „‘š Â?‘”‡ –‘ ‹Â?Â?‘˜ƒ–‡ ™Šƒ– ™‡ …ƒÂ? ’”‘˜‹†‡ ˆ‘” –Š‡ ‡Â?† —•‡”•Ǥ

John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

General Press Jill Lai Editor-in-Chief Alf Chang Senior Consultant William Pao Reporter Lisa Hsu Reporter Prasanth Aby Thomas Reporter Emily Lin Editor

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Tzu-Yin Chien

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com tzuyin.chien@newera.messefrankfurt.com

Officer

michelle.shih@newera.messefrankfurt.com

Circulation

Michelle Shih

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Manager

willy.wang@newera.messefrankfurt.com

Trade Fair Manager Group Manager Project Manager Assisant Project Manager

peggy.wu@newera.messefrankfurt.com veronica.chen@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com crystal.chen@newera.messefrankfurt.com

asmag.com

Willy Wang Secutech

Peggy Wu Veronica Chen Jason Cheng Crystal Chen

International Advertising [Headquarters]

Israel Gogol Audrey Fang

Manager Officer

israel.gogol@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Osman Kanatli Evris Consolos Adis Hodzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana

U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India T Taiwan China Korea Japan Vietnam Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru

0HVVH )UDQNIXUW 1HZ (UD %XVLQHVV 0HGLD /WG Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com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‹ 0HVVH )UDQNIXUW 1HZ (UD %XVLQHVV 0HGLD /WG $OO ULJKWV UHVHUYHG 1R SDUW RI WKLV PDJD]LQH PD\ EH UHSXEOLVKHG UHSULQWHG RU UHGLVWULEXWHG LQ DQ\ IRUPV LQFOXGLQJ HOHFWURQLF ZLWKRXW ZULWWHQ FRQVHQW IURP WKH SXEOLVKHU

$GYHUWLVHUV DUH UHVSRQVLEOH IRU WKHLU RZQ DGYHUWLVHPHQW FRQWHQW 7KH SXEOLVKHU LV QRW OLDEOH IRU DQ\ OHJDO LPDJH SDWHQW RU WUDGHPDUN GLVSXWHV IURP DGYHUWLVHPHQWV RU DPRQJ DGYHUWLVHUV /HJDO FRQVXOWDQW -XOLD 6 + <X $WWRUQH\ DW /DZ )LUVW /DZ ,3 2IILFHV

jill.lai@newera.messefrankfurt.com

14


APPLICATION CASES A S Ï02%3%.43Ï3.!03(/43Ï/&Ï3%#52)49Ï#!3%3Ï&2/-Ï!#2/33Ï4(%Ï ',/"%Ï4/Ï02/6)$%Ï50 4/ $!4%Ï).&/2-!4)/.Ï/.Ï(/7Ï02/$5#43Ï!.$Ï 3/,54)/.3Ï!2%Ï"%).'Ï%-0,/9%$Ï).Ï$)&&%2%.4Ï).$5342)%3

!)20/24

6)3)/. "/8Ï$%0,/9%$Ï!4Ï$%.-!2+Ï!)20/24 9LVLRQ ER[ GHYHORSHG DQG GHSOR\HG D XQLTXH VROXWLRQ WKDW DOORZV SDVVHQJHUV GHSDUWLQJ WR RU DUULYLQJ IURP RXWVLGH WKH 6FKHQJHQ $UHD WR FOHDU LPPLJUDWLRQ LQ WKH VDPH KDOO XVLQJ XQLTXH VHOI VHUYLFH ELRPHWULF H*DWHV DW 'HQPDUN·V &RSHQKDJHQ $LUSRUW 7KLV ZDV PDGH SRVVLEOH WKURXJK WKH GHSOR\PHQW RI D IOH[LEOH WZR ZD\ IORZ $%& VROXWLRQ EDVHG RQ WKUHH GHSDUWXUH WKUHH DUULYDO DQG WKUHH ELGLUHFWLRQDO H*DWHV

7KHVH JDWHV DOORZ WKH 'DQLVK 3ROLFH WR G\QDPLFDOO\ VZLWFK WKH IORZ DFFRUGLQJ WR WKH SUHGLFWHG YROXPH RI SDVVHQJHUV HQWHULQJ RU H[LWLQJ WKH DUHD 7KH H*DWHV DUH YHU\ HDV\ WR XVH WUDYHOHUV DXWKHQWLFDWH WKHLU SDVVSRUWV WKURXJK D WUDYHO GRFXPHQW UHDGHU DQG PDWFK WKH LQIRUPDWLRQ FRQWDLQHG RQ WKH FKLS ZLWK WKHLU OLYH FDSWXUHG IDFLDO ELRPHWULFV E\ ORRNLQJ DW WKH FDPHUD

%$5#!4)/.

AUG 2016 Ɣ www.asmag.com

16

+HQFH WKH VFKRRO FKRVH WR LQVWDOO D V\VWHP E\ +DQZKD 7HFKZLQ $PHULFD ,W IHDWXUHG 6DPVXQJ YLGHR VXUYHLO ODQFH FDPHUDV DV ZHOO DV HPHUJHQF\ SXOO VWDWLRQV DQG GXUHVV EXWWRQV WKDW ZHUH FRQQHFWHG WR WKH &DQWRQ SROLFH VWDWLRQ ,I DQ DODUP LV DFWLYDWHG WKH SROLFH FDQ LPPHGLDWHO\ YLHZ WKH VFHQH IURP WKH FDPHUDV %DVHG RQ WKLV DXWKRULWLHV FDQ TXLFNO\ GHWHUPLQH D FRXUVH RI DFWLRQ LQFOXGLQJ VRXQGLQJ DXGLEOH

3#!4)Ï3934%-Ï ).34!,,%$Ï).Ï53Ï (/4%,

$ OX[XU\ KRWHO LQ WKH KHDUW RI 0DQKDWWDQ 8 6 QHHGHG D V\VWHP WKDW FDQ JXDUDQWHH WKH VHFXULW\ RI LWV PRGHUQ IDFLOLWLHV DQG RI LWV XVHUV DQG HPSOR\HHV )XUWKHUPRUH LW UHTXLUHG D FRPSUHKHQVLYH VHFXULW\ SODWIRUP WKDW LQFOXGHV WKH HOHPHQWV QHHGHG WR UHVSRQG TXLFNO\ WR DQ\ HYHQW LQ RUGHU WR GLVVXDGH YDQGDOLVP 7KH LPSOHPHQWHG V\VWHP FRQVLVWHG RI 6&$7,·V 9LVLRQ UHFRUGLQJ SODWIRUPV WKDW FDQ PDQDJH XS WR ,3 FDPHUDV DQG LV IXOO\ LQWHJUDWHG ZLWK WKH KRWHO·V FDPHUDV DQG DSSOLFDWLRQV 7KH ,3 FDPHUDV KDYH GLIIHUHQW IRUPDWV WR DGDSW WR WKH GLIIHUHQW VSDFHV EXOOHW FDPHUDV ZHUH LQVWDOOHG RXWGRRUV DQG PLQL GRPH 7KLV VLJQLILFDQWO\ LPSURYHG YDQGDO SURRI FDPHUDV ZHUH LQVWDOOHG LQVLGH WKH IDFLOLWLHV RSHUDWLRQDO HIILFLHQF\ DQG 6&$7,·V :DWFKHU VROXWLRQ VHFXULW\ IRU WKH DLUSRUW D SRZHUIXO VRIWZDUH IRU HDV\ DQG WKH 'DQLVK 3ROLFH DQG UHPRWH DGPLQLVWUDWLRQ 7KH VRIWZDUH SODWIRUP RI WKH HQWLUH SRRO RI YLGHR RIIHUV ERUGHU JXDUGV QRW UHFRUGHUV LQ WKH KRWHO ZDV DOVR RQO\ UHOLDEOH LGHQWLILFDWLRQ HPSOR\HG 7KLV ZD\ VXUYHLO RI WUDYHOHUV EXW DOVR DQ ODQFH LPDJHV FDQ EH DFFHVVHG RYHUYLHZ RI HYHU\ SDVVHQ YLD WKH KHDGTXDUWHUV RI WKH JHU·V SURFHVV WKH DELOLW\ WR KRWHO DQG IURP WKH FRPSXWHUV LPPHGLDWHO\ UHDFW WR DOHUW VLWXDWLRQV IRUJHG GRFXPHQWV FRQQHFWHG WR LW RQ WKH QHWZRUN 7KH UHVXOWLQJ V\VWHP LV LGHQWLW\ WKHIWV DPRQJ RWKHUV KLJKO\ FDSDEOH RI DGDSWLQJ DQG FRQWURO RI WKH ZKROH WR WKH FKDQJLQJ QHHGV RI VHFXULW\ LQIUDVWUXFWXUH WKH KRWHO DOORZLQJ IRU WKH LQWHJUDWLRQ RI WKLUG SDUW\ V\VWHPV VXFK DV ILUH SURWHFWLRQ DQG DFFHVV FRQWURO

(!.7(!Ï4%#(7).Ï"//343Ï3%#52)49Ï&/2Ï53Ï3#(//,

2IILFLDOV KDYH DOUHDG\ WLJKWHQHG VHFXULW\ PHDVXUHV DW $OO 6DLQWV &DWKROLF 6FKRRO LQ 0LFKLJDQ 8 6 +RZHYHU WKH FHQWUDO ORFDWLRQ RI WKH DGPLQLVWUDWLYH RIILFH VWLOO SRVHG DV D VHFXULW\ FKDOOHQJH DV YLVLWRUV KDG WR EH SK\VLFDOO\ JUDQWHG DFFHVV DQG HVFRUWHG WR WKHLU GHVWLQDWLRQ ,Q WKH HYHQW RI DQ LQFLGHQW LW DOVR WRRN D ORQJ WLPH WR DOHUW WKH RIILFH DQG HYHQ PRUH WLPH WR QRWLI\ VWDII WKURXJK WKH SXEOLF DQQRXQFHPHQW V\VWHP

(/30)4!,)49

DOHUWV ZLWK GLIIHUHQW WRQHV DQG SDWWHUQV WR LQGLFDWH VSHFLILF FLUFXPVWDQFHV DQG DVVRFLDWHG UHVSRQVHV 7KH 6DPVXQJ ,3 YLGHR VXUYHLOODQFH FDPHUDV GHSOR\HG LQFOXGH D PL[ RI 37= GRPH VWDQGDUG 37= DQG RXWGRRU IL[HG FDPHUDV 7KH YLGHR LV UHFRUGHG RQ VLWH ZLWK D FKDQQHO 6DPVXQJ 195 DQG LV WUDQVPLWWHG YLD D 9HUL]RQ * FRQQHFWLRQ WR WKH SROLFH VWDWLRQ IRU PRQLWRULQJ


3D People Counting for Retail Solutions Provides Precise Data (GLWRU½V 1RWH

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

VIVOTEK SC8131 STEREO CAMERA

V

IVOTEK’s SC8131 is a stereo counting camera armed with VIVOTEK’s 3D depth technology and video surveillance functionality, providing 2-megapixel, real-time precise tracking video and high accuracy counting up to 98 percent. The stereo camera generates data and information from people counting and flow path tracking, which can be applied to store layout improvement, promotional evaluation, staff planning, and control of service times. Thus, providing business owners with key metrics to effectively make operating decisions and increase return on investment (ROI). • • • • •

VIVOTEK 3D depth technology Hig gh accuracyy rate up p to 98% Local storage data for counting report Easy installation and configuration Seamless counting with VAST V VMS

Supplier: VIVOTEK

URL: www.vivotek.com

GEOVISION GV-3D PEOPLE COUNTER VMS

T

he GV-3D People Counter integrates Asus Xtion Pro to count and analyze the number of people passing by the designated detection area. You can connect the GV-3D People Counter with a VGA or HDMI monitor for direct display of counting data and configure device settings through an on-screen display (OSD) menu. • • • • •

Counts the number of people (in and out) Support for HDMI and VGA compatible monitors IIR R rem remote ote con contro troll to con config figure ure on on-scr screen een dis displa playy (OS (OSD) D) men menu u Support for data compiling and chart analysis on GV-Web Report Audio alarm for traffic in wrong direction and exceeding maximum entries, exits or stays • SSDHC card supported Supplier: Geovision

URL: www.geovision.com.tw

SENSORMATIC STEREO OVERHEAD TRAFFIC SENSOR

S

ensormatic’s Stereo Overhead (3D) Traffic Sensor mounts to the ceiling to provide a holistic traffic view with enhanced activity analysis and video validation abilities. Advanced capabilities allow the sensor to count side-by-side traffic, track multiple people simultaneously, differentiate between adults and children, and avoid counting carts and strollers. As shoppers pass through the sensor’s field of view, they leave a unique trail or path. Each path is tagged with a unique ID that can then be converted into numerous metric opportunities within the sensor. • • • •

Assists in analyzing effectiveness of promotions and marketing campaigns Connects directlyy to existing g store networks Minimizes nuisance alarms to improve the shopper experience Reduces power consumption of EAS system components when leveraging the Power-OnDemand feature • D Decr ecreas eases es ser servic vice e cos costs ts wit with h rem remote ote mon monito itorin ring g of EAS equ equipm ipment ent Supplier: Sensormatic

URL: www.sensormatic.com

21


A S Ï%80,/2%3Ï4/0)#3Ï4(!4Ï!2%Ï'%.%2!4).'Ï).4%2%34Ï).Ï4(%Ï3%#52)49Ï).$53429 Ï/&&%2).'Ï 2%!$%23Ï)-0/24!.4Ï&!#43Ï!.$Ï).&/2-!4)/.Ï2%,%6!.4Ï4/Ï4(%)2Ï02/&%33)/.

NEWS FEATURE 0RUH DQG PRUH $, LV EHLQJ DSSOLHG WR VHFXULW\ DV ZHOO IRU H[DPSOH DFFHVV FRQWURO WR DLUSRUWV RU RWKHU FULWLFDO LQIUDVWUXFWXUH DUHDV DV WKH WLHV EHWZHHQ WKHP JHW VWURQJHU BY William Pao

AUG 2016 Ɣ www.asmag.com

ǡ Ǧ ȋ Ȍ ǡ Ǧ Ǥ ǡ ǡ Ǥ Dz ǡ ǡ Ǥ ǯ ǡ ǡ Ǧ ǡ Ǧ ǡdz ǡ Ǥ Dz

22

ǡ ǡ Ǥdz Dz dz Ǥ Dz ǯ Ǧ

ǡdz Ǥ ǡ ǯ Ǥ Dz ǡ ǡ ǡ ǡdz Ǥ Dz Ǧ Ǧ ǡ ǯ Ǥdz ǡ ͜͡​͜ ͜͠ ǡ

“These solutions can be applied to create safe and secure environments, monitor large-scale social infrastructure, and help enterprises enhance their marketing abilities and operational efficiency.”


Ǥ Ǥ ǯ Ǧ ȋ Ȍ ǡ

Ǥ Ǥ Dz ǡdz ǡ

ǡ ǡ Ǧ ǡ Ǥ

$Q LQFUHDVH LQ YLGHR GDWD DQG DQDO\WLFV XVDJH SXWV D VWUDLQ RQ WUDGLWLRQDO VWRUDJH VROXWLRQV $ WLHUHG DSSURDFK PRYHV GDWD WR GLIIHUHQW ȟWLHUVȠ RI VWRUDJH DOORZLQJ XVHUV WR VKDUH DQG UHWULHYH GDWD PRUH HIIHFWLYHO\ BY William Pao

Ǧ Ǧ ǡ Ǥ ǡ ͝ǡ͜​͜​͜ ǡ ͞ ǡ ͟͜ ǡ ǯ ͤ͢͠ ͜͞͡ Ǥ ǡ Ǥ ǡ Ǥ Ǥ Ǥ Ǧ Ǥ Dz Ǧ ǡ ǡdz Dz Ǧ Ǥdz Dz Ǥ ͝ ǡ ͠ ͤ

“A tiered storage approach will allow end users to spend more of their budget on security and not on storage.” Ǥdz ǡ ǡ Dz dz Ǧ ǡ Ǧ ǡ Ǧ Ǧ Ǥ Dz Ǧ ǡ ǡdz Ǥ Dz ǡ ǡ

Ǥdz ͟͜͞Ǥ͠ ͝Ǥ͠​͠ Ǥ ǡ Dz dz Ǥ ǣ ǣ ǡ Ǥ Dz Ǧ Ǥ Ǧ ǡ ǡdz Ǥ Dz ǯ ǡ ǡ Ǥdz ǣ Ǧ ͡ Ǥ Dz ǡ Ǧ ǡ ǡ ǡ ǡdz Ǥ Dz ǡ Ǧ Ǧ ǡ Ǥ Ǥdz

23


%5(;,7 (;,7 (;,7

W\ 3OD\HUV :RQGHULQJ :KDW :LOO &RPH 1H[W

0O +VOF #SJUPOT WPUFE UP MFBWF UIF &VSPQFBO 6OJPO &6 JO B IJTUPSJD SFGFSFOEVN 5IF NPWF TVCTFRVFOUMZ TFOU TIPDLXBWFT BDSPTT UIF HMPCF BT QFPQMF TUSVHHMFE UP BCTPSC JUT NFBOJOHT BOE JNQMJDBUJPOT "MM FZFT BSF BMTP XBUDIJOH IPX UIF NPWF NJHIU BGGFDU UIF 6, TFDVSJUZ JOEVTUSZ BY Y William Pao

eedless to say, the “remain or not to remainâ€? question was a hot topic during IFSEC 2016 held from June 21 to 23, days leading up to the poll. While most of the companies that we spoke with showed some concerns about the issue, they emphasized that regardless the outcome, the demand for security would always be there. “The need for security is not driven by whether we are in the EU or not in the EU,â€? said Billy Hopkins, Technical Manager at IDIS Europe. “We’ve always had terrorist threats since the 70s, which is why we’ve got more ANPR (automatic numeric plate recognition) in this country than anyone else. This is why our number plates are designed for ANPR. It won’t remove the demands for security.â€? AUG 2016 Ć” www.asmag.com

,03$&7 2) %5(;,7 For security players, the impact of Brexit would mostly come from three areas: movement of people, trade and business confidence. According to them, since the U.K. needs workers from the rest of the continent, possible

28

restrictions over the movement of people resulting from Brexit may become an issue. “We do have a UK skills shortage across engineering, sales, marketing ‌ every discipline you can imagine. So if we don’t have free movement of people across Europe, that means we can’t be here in U.K. and hire someone, say, from Spain. It wouldn’t be impossible of course, but all the processes to do that have to be figured out in the medium to longer term,â€? Hopkins said. Trade emerges as another possible Brexit impact that might affect security companies. “One offshoot of Brexit that may happen is now you have to redo all the trade agreements between the EU and the U.K. This all leans towards more potential trade protectionism, not lower barriers,â€? said Joseph Grillo, CEO of Vanderbilt International. “I think lower barriers are best overall.â€? “If you are a U.K.-based company exporting to Europe, then of course I would suspect that would be a challenge for companies from an administration perspective,â€? said Atul Rajput, Regional Director for Northern Europe at Axis Communications. However, these companies maintain that they have operations internationally and would survive the impact of tariffs or other trade barriers even if they were put in place. “From Axis’s perspective we have offices all over Europe. The Axis UK office does not export into Europe; we are primarily focused on serving our local market. In that way Axis as a company can minimize any risks that may surface,â€? Rajput said. “We have offices in France, Italy, Spain and Germany, among others, and the distributors that we work with procure directly from our headquarters in Sweden who ship to individual countries.â€? “We operate our business throughout Europe. We sell in several different currencies. A lot of our manufacturing is in Asia, the Nordic region and Eastern Europe,â€? Grillo said. “We almost have natural currency hedging that happens, because we’re buying in different currencies and selling in seven or eight currencies. So I don’t see any big impact on us.â€?

81&(57$,17< 0$77(56 :256( According to these players, it’s the uncertainty that might create the most impact, as people take a wait-and-see attitude on whether to continue investing in the

%6,$ 5HVSRQGV WR %UH[LW 9RWH 2XWFRPH

2Q -XQH IRXU GD\V DIWHU WKH YRWH WKH %ULWLVK 6HFXULW\ ,QGXVWU\ $VVRFLDWLRQ %6,$ ZKRVH PHPEHUV SURYLGH RYHU SHUFHQW RI 8. VHFXULW\ SURGXFWV DQG VHUYLFHV LVVXHG D VWDWHPHQW PDLQWDLQLQJ WKDW WKH 8 . ZLOO UHPDLQ D UHOHYDQW DQG GRPLQDQW SOD\HU LQ VHFXULW\ ´,W ZLOO EH LPSRUWDQW IRU WKH 8 . WR SHUVXDGH WKH ZRUOG WKDW ZKLOH LW PLJKW EH OHDYLQJ WKH (8 LW LV QRW OHDYLQJ (XURSH DQG PRUHRYHU WKDW LW ZLOO UHPDLQ DQ HQWKXVLDVWLF SDUWQHU LQ DOO VHFXULW\ DQG WUDGH LVVXHV ¾ WKH VWDWHPHQW VDLG ´7KH %6,$ ZLOO FRQWLQXH WR ZRUN ZLWK DOO RI WKH NH\ RUJDQL]DWLRQV LQ WKLV SURFHVV WR HQVXUH WKH LQWHUHVWV RI WKH VHFXULW\ LQGXVWU\ DUH EHVW UHSUHVHQWHG DV WKH 8 . PRYHV IRUZDUG WR D QHZ FKDSWHU LQ LWV KLVWRU\


as people take a wait-and-see attitude on whether to continue investing in the U.K. or worse, relocate their headquarters to another country. Already, Vodafone has warned it could move its headquarters from the U.K., citing it was important to retain access to the EU’s free “movement of people, capital and goods,” BBC reported. Banks are also considering what they should do next. The Times cited a high-level Goldman Sachs executive as saying the company wouldn’t rule out moving some or all of the bank’s 6,500 UK staff members to Europe. While banks are in the financial industry, they are among the heaviest users of security. In a recent study, IHS expressed the view that a lack of business confidence is expected to hurt security in the long term. “If formal proceedings to leave the EU are started by the U.K., it would become more certain that the security equipment market will suffer,” the paper said. “This would begin in 2018 with effects from slowing investment and the lack of new construction projects. Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most by this trend. However, a large cut to infrastructure spending would be just as damaging for the video surveillance market.” Those views coincided with the sentiment expressed by the security players themselves. ”The biggest challenge will be market uncertainty which a vote to leave would create, as the one thing markets value above all else is stability, which gives companies the confidence to invest,” Rajput said. “Business hates uncertainly. People hold investment back to wait to see what happens. Even if there are people who are going to invest in new equipment and new systems, they might hold back until they see what happens,” said Alastair McLeod, CEO of Veracity. “Now that Britain has voted to leave the EU, we have another three or four

years of uncertainty until everything is worked out and settles down again.” “I don’t think there will be any impact directly on the decision to fit security equipment; the impact will be on general business confidence,” said Andrew Pigram, Managing Director for U.K. at Bosch Security Systems. “It means whether people will invest in new buildings, whether we decide we need more schools or less schools, whether we think the economy will go down or up … security gets put in when the economy is moving. If the economy slows, security will slow probably.” In spite of the uncertainty, most companies held the attitude that the people have made a decision, and the companies have no choice but to press forward. Managing the risk effectively — that’s the consensus reached by most of the interviewees that we spoke with.

29


7KH 5LJKW $SSURDFK WR 6HFXULQJ 1LJKWFOXEV (JWFO UIF VOJRVF OBUVSF PG UIFJS CVTJOFTT JU JT EJGGJDVMU UP TFDVSF OJHIUDMVCT &OTVSJOH TBGFUZ XJUIPVU TDBSJOH UIF DVTUPNFST BXBZ BOE DBQUVSJOH WJEFP JO MPX MJHIU BSF POMZ TPNF PG UIF DIBMMFOHFT *O UIJT BSUJDMF XF UBML UP TPNF TFDVSJUZ DPOTVM UBOUT UP HFU UIFJS QFSTQFDUJWF PO UIF NBUUFS BY Y Prasanth Aby Thomas

AUG 2016 Ć” www.asmag.com

n June 12, 2016, forty-nine people at a nightclub in Orlando, Florida were shot dead by a 29 year old. Fifty-three people were wounded in the attack, while the attacker himself was shot dead by the police after a three-hour standoff. In July, another shooting incident took place at a nightclub in the same state, resulting in the death of two and injuries to 16 people. These incidents captured the attention of the media and observers around the globe, and much debate has ensued on the motive of the killer and concerns on the increasing numbers of attacks on civilians.

30

Perhaps something that did not get as much attention as it deserved was the subject of what nightclubs should do to improve the safety of their customers. Nightclubs are soft targets for terrorist attacks due to the large numbers of people gathering there and the informal atmosphere it encourages. To many experts, security should start with the right planning. Bryan Strawser, Principal Consultant and CEO at Bryghtpath pointed out that in many nightclubs security and staffing are taken very lightly. “In many situations involving nightclubs and bars, security design and staffing is often an afterthought rather than being an integral part of the business,� Strawser said. “Often, security staffing is inadequate for crowd and overall threat profile of the business. Businesses could rectify this by fully evaluating their risks and building a security program that is centered on mitigating and responding to their identified risks.� Others focus on the quality of the nightclub staff. Tommy Burns, President of Burns & Associates, suggested that what is currently lacking in this segment is training. “[The main issues currently] are a lack of training for the staff, and lack of policies and procedures, lack of post-orders, as in the things that they are supposed to do,� Burns said. But providing security to nightclubs is not as easy as with other businesses. There are certain specific challenges that come with the inherent nature of nightclub operation and these pose significant risks of leaving gaps in the security structure.

&+$//(1*(6 72 6(&85,1* 1,*+7&/8%6 The very fact that most people in bars and nightclubs are often in an inebriated condition

Bryan Strawser, Principal Consultant and CEO, Bryghtpath

Tommy Burns, President, Burns & Associates


is the first challenge to making the place secure. But then, that’s the nature of the business and an inevitable hurdle that has to be worked around. Complicating things further are the large numbers of people that throng these places. But perhaps the biggest challenge of all is the low light conditions that nightclubs operate under. “Bars and nightclubs are difficult to secure because of the presence of alcohol, large crowds, minimal security staffing and the general lighting environment,” Strawser said. “Often these businesses are dimly lit, have dance/strobe lights and loud music, making it both difficult to see criminal activity and recognize an attack when it does happen. Bars and nightclubs can better protect themselves by hiring adequate staff, carefully evaluating their risks and adopting security measures appropriate to their identified risks.” Burns too noted that the challenges include providing a safe environment while keeping it open. Customers might not like their bags being checked, being subjected to metal detection checks, or even a TSA-style frisking. Nightclub owners, on their part, would be wary of scaring away their customers with these kind of checks which are actually necessary. The challenge then, is to strike a balance and ensure that the security remains tight while customers go through as less hassles as possible.

35$&7,&$/ 62/87,216 Asked about the ideal, practical solution for nightclub security, Burns elaborated on his previous point that the major inadequacy is lack of trained staff. “[Nightclubs need] an ample amount of security personnel that’s trained,” said Burns. “The most practical security solution for a nightclub includes a fully trained security staff.”

Strawser gave a broader view, indicating that a security plan should be put in place after careful consideration of all the variables involved. “As in any business, we strongly recommend evaluating all risks that could impact a business and then adopting security measures to mitigate or eliminate those risks,” Strawser said. “For example, having a strong, professional security force at the entrance to a club with effective security screening such as magnetometers and bag checks can help deter criminal activity involving weapons and other contraband.”

,03529,1* 7+( 7(&+12/2*< Ideally, technology should play a key role in ensuring security in nightclubs. High-end video surveillance systems and access control solutions should be installed to monitor activities in and around the site to be in control of any kind of situation that might arise. To keep

31


Valeri Filianov, Sales Director, EMEA, Pyronix

David Montague, Sales Director, EMEA, FLIR Systems

Atul Rajput, Regional Director, Keen Yao, VP, International Business Northern Europe, Axis Communications Center, Hikvision Digital Technology

A QUICK OVERVIEW OF RECENT MAJOR

M&As 5IF DPOTPMJEBUJPO USFOE JO UIF TFDVSJUZ JOEVTUSZ DPOUJOVFT XJUI B TUSJOH PG NBKPS NFSHFS BOE BDRVJTJUJPO EFBMT UBLJOH QMBDF SFDFOUMZ "U *'4&$ TPNF PG UIF DPNQBOJFT UIBU XFSF EJSFDUMZ JOWPMWFE JO UIFTF EFBMT TQPLF UP B T *OUFSOBUJPOBM PO XIBU NPUJWBUFE UIFN BOE XIBU PCKFDUJWFT UIFZ XFSF USZJOH UP BDIJFWF UISPVHI UIF BDRVJTJUJPO BY William Pao

AUG 2016 Ć” www.asmag.com

34 4

mong the more high-profile M&A deals in the security industry of recent were Hikvision Digital Technology’s purchase of Pyronix, Axis Communications’ purchases of 2N and Cognimatics, and FLIR Systems’ purchase of DVTel.

+,.9,6,21 3<521,; '($/ 0$.(6 ¡3(5)(&7 6(16(¡ The Pyronix deal, announced in May, was the first overseas purchase of a company by Hikvision, the world’s second largest security player which has already acquired numerous firms in its home base of China. Now, with Pyronix, Hikvision has acquired a technology partner that has both the technology and the knowledge about the EMEA (Europe, Middle East and Africa) market. “We’ve been partners with Pyronix for some time. Their products are very competitive. Due to our collaboration and common vision, we believe this is a good opportunity for us to expand,â€? said Keen Yao, VP of International Business Center at Hikvision Digital Technology. “Pyronix operates primarily in Europe and is a leader in the intruder alarm field. Since one of our business acquisition objectives is to increase our global


presence, acquiring Pyronix makes perfect sense for us.” Pyronix holds the same favorable view toward the acquisition, saying it is beneficial especially from a technology point of view. Valeri Filianov, EMEA Sales Director at Pyronix, said that the acquisition would expedite the introduction of video-intruder alarmintegrated solutions that the EMEA market is looking for. “When you have an alarm system and a video system, the integration means when one particular alarm event happens, the video has to do something, and vice versa,” said Filianov. “In order to achieve that, Hikvision is already investing into the Pyronix R&D, bringing more development resources so that we can accelerate our product development process including a full integration between our intrusion and video products. Hikvision has great knowledge in R&D and big financial capacity to do so, while Pyronix has the understanding of the market and the intruder technology knowhow.”

$;,6·6 %$&. 72 %$&. $&48,6,7,216 Speaking of integrated solutions, a recent acquisition by Axis Communications also reflects this trend. In June, the IP video giant announced the purchase of Cognimatics, a leader in people counting technology that is needed by retailers for business enablement. “We’ve seen a significant increase in demand from customers for retail solutions. While loss prevention is still the main driver, we have seen a rapid increase in deployments of business intelligence application through using analytics,” said Atul Rajput, Regional Director for Northern Europe at Axis Communications. “The acquisition of Cognimatics, one of the market leaders in their field for store optimization solutions, allows Axis Communications to leverage their best-of-breed technologies they’ve built up over 13 years and to be faster to market in terms of the solutions our customers are demanding today.”

Rajput also dispelled concerns that because of the deal Axis would favor Cognimatics over other VCA technology partners. “The retail landscape for store optimization is a very diverse area and there are a plethora of different analytic solutions available based on your particular business need. Each customer has unique requirements, and the thing with deploying a suite of analytics is it’s not a one-stop solution. There are different requirements, and therefore the complexity of the analytics means you need to have a broader selection of companies that can also offer customization,” he said. “Cognimatics meets several requirements today, but there are other analytics such as queue counting and POS integration, so it is important to have a range of best-of-breed solutions available allowing our customer freedom of choice. We’ve made it clear since the acquisition that we have over 1,400 partners in different technologies, and that best of breed still remains an important party of our strategy.” Another Axis acquisition that caught the attention of the industry was its purchase of Czech Republic-based 2N, a company that Rajput said shares a common vision with Axis and can help the company broaden its IP offerings. “Axis has had a vision for over 20 years of connecting disparate devices to intelligent networks, effectively what we know today as the Internet of Things, and in our industry we see more and more technologies converging over IP. As a respected and established company, 2N, who is a market leader in IP intercoms, a technology Axis do not sell today, seems a natural complement to our array of security solutions and consistent with the vision we have had for many years,” he said. “Axis sells IP door stations today, so one of the benefits is sharing technology expertise. So mutually we can help each other to improve our roadmap of products together.”

)/,5 $,0,1* )25 (1' 72 (1' 62/87,216 Finally, FLIR Systems gained a lot of publicity when it purchased DVTEL at the end of last year. The rationale was pretty clear. The company has already built up a reputation as the leader in thermal imaging, with last year’s revenue standing at US$1.6 billion. But to get from there to “$5 billion,” the company needs to go beyond thermal and reach more segments of the market with a more diverse portfolio. “If you look at the market for thermal imaging, we’ve got maybe a 70 percent market share in Europe. So where do we go from there? We can grow, but it needs a change of business, and the way FLIR would change its business is look into end-to-end solutions, fish in the ocean, not pond,” said David Montague, Sales Director for EMEA at FLIR Systems. DVTEL, based in Ridgefield Park, N.J., offers video management systems, advanced video analytics software, visible and thermal security cameras and related servers and encoders. The combination allows FLIR to offer end-to-end solutions that Montague said carry various advantages. “The benefit first of all for distributors is that we offer quite a unique proposition for them to invest in. We’ve got the analytics, PSIM and everything … the whole package that we can offer as a good solution. The benefit to the distributor is exactly that,” he said. “The advantage to the integrator and end user is that you go to one person. If you get a problem onsite, you are not saying onsite this FLIR guy is here to look into the product, the image looks good, but it’s not working with the analytics, and the analytic is someone else. What you got now is a complete solution, one person for example going onsite and he’s responsible for the whole CCTV, so you can always refer back to the person.” In summary, the consolidation trend in the security industry has been going on for some time and is showing no signs of stopping. The companies that we spoke with engaged in acquisitions to diversify their product offerings, meet demands for more integrated solutions, and build a stronger presence in a particular region. Given the synergy and positive effects that come out of these acquisition deals, it is expected we’ll only see more of them in security in the near future.

35


.12: <285 &86720(5 :,7+ AUG 2016 Æ” www.asmag.com

36


5(7$,/ 9,'(2 $1$/<7,&6 +$9( &20( $ /21* :$< 6,1&( 7+( ($5/< '$<6 7+(< $5( 12 /21*(5 -867 $%287 6(&85,7< %87 025( $%287 81'(567$1',1* 7+( &86720(5 $1' 2))(5,1* 7+( %(67 6(59,&( ,1 7+,6 $57,&/( :( 7$.( $ /22. $7 7+(,5 .(< )($785(6 $1' %(67 $3352$&+(6 72 5,*+7 ,03/(0(17$7,21 BY Prasanth Aby Thomas

n

o

p

q

r

n David Jones, VP, Marketing, IntelliVision o Jason Luther, Head, Products, RetailNext p Eric Olson, VP, Marketing, PureTech Systems q Brien TerBush, Global A&E Manager, Aimetis r Uma Welingkar, VP, Product Management, 3VR

37


*HWWLQJ D 6HQVH RI 3HULPHWHU 6HFXULW\ 6\VWHPV 3HULPHWHU GHWHFWLRQ FDQ JUHDWO\ YDU\ LQ VFDOH IURP D VPDOO VLQJOH IDPLO\ KRPH WR D PDVVLYH FULWLFDO LQIUDVWUXFWXUH FRPSRXQG 5HJDUGOHVV RI VL]H WKH DGGLWLRQ RI SHULPHWHU VHQVLQJ WHFKQRORJ\ WR DQ\ DSSOLFDWLRQ FRXOG VLJQLILFDQWO\ LQFUHDVH VHFXULW\ EXW RQO\ LI WKH ULJKW VHQVRUV DUH EHLQJ XVHG DQG XVHG FRUUHFWO\ BY Eifeh Strom, Freelancer

erimeter security is made up of many different parts. Fences and gates provide barriers, and video surveillance cameras can help monitor a perimeter. However, the use of different types of sensors, from fence sensors to buried sensors to motion sensors, plays a vital role in the effectiveness of a perimeter intrusion detection system (PIDS).

AUG 2016 Ć” www.asmag.com

THE USE OF DIFFERENT TYPES OF SENSORS, FROM FENCE SENSORS TO BURIED SENSORS TO MOTION SENSORS, PLAYS A VITAL ROLE IN THE EFFECTIVENESS OF A PERIMETER INTRUSION DETECTION SYSTEM (PIDS).

44

Based on figures from a report by MarketsandMarkets, the overall global perimeter security market is expected to grow from approximately US$14 billion in 2015 to US$20.3 billion by 2020, at a CAGR of 7.6 percent — this includes technologies, such as microwave sensors, infrared sensors, radar sensors and fiber-optic sensors. Knowing what type of sensor to deploy based on specific needs is the key to maximizing a PIDS’ effectiveness. Understanding the challenges, requirements and newest trends in sensor technology could all help ensure that the right sensors are being used.

&+$//(1*(6 ,1 '(3/2<,1* 6(16,1* 7(&+12/2*,(6 Every technology has its challenges when it comes to deployment. The challenges of deploying perimeter sensing technology depend on the application and requirements. “One of the key challenges in deploying perimeter sensing technology is ensuring that the appropriate detection solutions are specified for a particular application,� said Maira Zanrosso, Director of Sales and Marketing at Southwest Microwave. Ensuring uniform detection sensitivity along the entire protected perimeter is another challenge of deploying perimeter sensing technology. “Variations in fence fabric or tension can affect the detection performance of certain fence detection systems. Variations in ground material or soil conductivity can affect the detection performance of certain buried cable solutions,� Zanrosso added. To combat this issue, Southwest Microwave offers Sensitivity Leveling, a proprietary technology. The technology is a proprietary calibration process that compensates for environmental variations to ensure uniform detection sensitivity along the protected area. One of the biggest challenges, however, is false alarms and how to reduce such alarms from occurring. “If a user’s system triggers false alarms often, then they may end up abandoning it altogether — and it’s unlikely their neighbors will respond or want to invest in such a system either!� said Farshid Ossareh, Product Line Leader at Honeywell Security and Fire. For example, homeowners that have pets might need to invest in more


advanced sensors that can differentiate small animals from human intruders so that their pets aren’t constantly triggering false alarms. As a result, false activations have been the main driver in PIR sensor development due to the risk of damaging the end user’s confidence in his security system. Jeremy Weese, COO of Senstar also addressed the challenge of minimizing false activations, or nuisance alarm rates. “Sensing technology has to be able to distinguish between real intrusions, and disturbances caused by environmental conditions such as wind, rain and snow.” Another challenge Weese noted was being able to secure gates effectively. “While sensing cable can be easily installed on fences, it can be quite cumbersome to use on swinging or sliding gates.” Many companies have developed a way to deal with nuisance alarms. For example, Honeywell’s outdoor PIRs offer curtain detection, which could help minimize the risk of false activations. Senstar equips many of its sensors with environmentally derived adaptive processing technology (EDAPT), which helps mitigate the effect of environmental changes such as wind and heavy rain. Southwest Microwave employs a proprietary technology called Point Impact Discrimination, which can identify localized attempts to cut or climb a fence, while ignoring distributed fence noise generated by wind, rain or vehicle traffic. Another way companies are meeting these challenges is by integrating cameras with sensors for video verification. In fact, in March of this year, Honeywell acquired

45 45


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ndrea Sorri, Director ctor t , Busine Busine sin ss Development, Government, n City Surveillance S and Critical Infrastructure, Axis Communications

rotecting and securiring ng critical infrastructures poses a number of challenges. Be it illegal trespassing, vandalism, copper theft or even sabotage, security system ms ne n ed to be able to not only alert operat op tors to incidents, but also to enab ble the hem to identify the type, scope and d severirity of an incident so that pro oper act op ctiions can be taken. Traditional ct secu cu urity syystem components such as microwaave barriers, motion and tram mpling sensors all require a second conffiri matio on level in order to clearly identiffy fy an incident in and to exclude the po ossibilityy of o a false alarm. Some perimetters are nott easy to define and to cor ordo don do n of o f. This is esp s ecia iallly true for ia solar powerr plants and win ind d po p wer installations in remote locations. Wild d life and weather conditions can trigger false sensor alarms. AUG 2016 Ć” www.asmag.com

7+( 32:(5 2) ,17(//,*(17 9,'(2 $1$/<7,&6 Surveillance cameras therefore play an important role in protecting and securing critical infrastructures. They a lo al low w operators to gather further

48

information once an initial alarm has been triggered. Modern IP-b bas ased ed d surrve v ilillance cameras feature advanced video analytics, allo llo owi wing ng th he cam amer era itself self to di differentiate whether a certain defined lilne has been n cr c os osse s d, or wh het ethe heer th ther ere is activity spotted in a certain sector of its field off vi view ew. Int ew n elligent video pro roce cess ssin ing g capabilities make it posssi s ble for IP-based surve veeililla lanc la n e cameras to tell people orr ve v hicles apart from animals or heavy snow fa fallll. They can even detect the direction people or vehicles are mo oving ng g Anddrea rea Sorri, Directtor,r, as well as memorize and learn from typical patterns wh hicch havee BBussiness ine Devvelopment, Government, City Surv rveil ei lance triggered false alarms in the past.

and Critical Infrastr structure, tr Axis Communications ns

6((,1* ,1 7+( '$5. As thee securityy in indu d stryy has seen the cost of therm mal im maging components drop significantly over the he coursse of the last few years, therrmaall cameras have beeco c mee more and more affordaable to integrate in security systemss. The pr prev e ious u hig gh costt of thermal cameera r s resu ult l ed in them being used only in sm mal a l nu numbers pe p r in inst stal st a latiion o , and only if the investment could be justified. While the herrm he rmall is not a new w technolo logy, advancements in image sensor technology and chip deesi sign g hav gn avee led to lower pricces, making th hermal cameras much moree attracctitve to now ad dd, d even in n larger nu umb ber erss, to security systems. T ermal cameras can detect incidents in completee darkn Th ness, not requiring any additionall light ight sou ourc rces rc e such as flood lights or infrared d whicch consume energy, cr c eate shadows and reveal their loc ocat attio atio ions ns.. Th ns T ey provide image gees based d on the heat that alw ways radiates from any object, vehicle or perrso on. Thi his gi give ive vess th theerm ermal came meeras the power to seee thro th roug ro ugh h co c mplete darkness and to deliver images that allow operato to ors to de d tect and nd act on suspicious activity no matter what time of day or type of weath her er.. Thermal cameras do not, however, provide detailed images that allow w fo for clear identification. Yet their strength lies in being able to reliably spot people hiding behind bushes, and to handle the most difficult weather conditions, enabling operators to see through heavy rain and snowfall, haze and dust. Thermal cameras therefore typically provide the best accuracy for intelligent video analytics.


7+(50$/ $1' /2: /,*+7 6859(,//$1&( &$0(5$6 $ 3(5)(&7 7($0 T e idea Th ideaal co id oun unte terp te par arts ts to o th theerma m l ca cameras are low w liligh ghtt ca gh came mera me raas. ras. s The hese ssee are based ed d on tth he la latest ima m ge sen ensor technology offfer e in ng ex exccept ptio pt iona io nall le na leve vels ve ls of liligh ghtt seens gh nsittivvitity nsit ty. Low w lilght ca cam meras capture color video o ev ev in even n ve v ry dar ark and ark an nd ex extr trem tr em me lo low w lilig light condititio ittions. C lor video is an importan Co antt fa an fact ctor ct or for or effec ff ctitive v ly ide ve dent ntifififyi nt yiing peopl plle, vehicles and objects. ob Low light came m raas al me allo low lo w op per eraator orss to or t evalu uate atte a si s tu tuat atio at ion io n without alerting ng the int ntru ude de der. An incid iden id entt de en dete t ct c ed d by a th ther erma er maal caame m ra can an be further analyz yzed yz ed usi sing ng g a lo ow w ligh ig ght came ca meera r . This iss makes e low lig ig ght cam amer eras er ass the ideal counterpa paart par rts to rts o the hermal cam herm amer eras er a. as

5(027( 021,725,1* 2) &5,7,&$/ ,1)5$6758&785( ,167$//$7,216 Security systems for remot otte cr c itic ical al infraast s ru ucturee in inst sttal alla laatition o s need to operatte ef on e fici cien ci entltly, en tly, y and to a large degree, also independ den entltltly. y. When heen an n ala larm is triggered, d, opera peera rato tors to rs mus ustt be b ab ble to qu q ickly assess the incident in order to de dete term te r ine neceess s ar aryy st step eps. ep s. It is not fea e si sibl be to send out a se secu curity guard or even n call local law enforcem em men entt ev e erry time m there is an n ale lert rt of und ndef nd efin ef ined type, scope pe and n severriitty. y IPP ba b sed security systems allllllow ow for o the sea eaml eaml mles es es inte in tegr te g attion off dififfe fere fe rent re nt system co omp pon o ents and enable operators to access al alll re r levant info f rmation from one com fo mmo m n se secur cu urity man anag agem e ent console. Automated alerts can n be set up and incid den ntss asssesse ss seed in n rea eal titime m from a remo me ote loc o ation.

,17(*5$7,1* 02%,/( '(9,&(6 )25 )$67(5 ,1&,'(17 5(63216( IP-b based security syyst s ems allow operatorrs to t mak akee fu full use of mo mobi b le devicces es. A te text x meessage ca m c n, for exaamp ple, be sent wh when en a sec ecur urritityy sens nsor nsor o iss be being g tr t ig gge gere reed. d With a smartphone, imagees es fro om th hermall ca cam me s can meras n be acc cccesseed iin n ord rd der to further analyzee the situatio on. n. If itit’’s not o a fal a se alert, low w lilgh ht ca c mera mera me rass ca can n be engaged to provide imag ag ges e that a allow ow for or the id denttifiiccat a io on off peo eopl ple, pl e obj e, bjjects and vehicles. Security gu guar arrds d can n act corrrespond co din i gl g y as a theyy kn now whaat situation they are dealing with an nd can call in lo oca cal law en enforc rcem rc emeent em en if necces e sa s ry. False alarms are also qu quicklyy id id ntified iden d as su uch c .

())(&7,9(/< 6(&85,1* $1' 3527(&7,1* &5,7,&$/ ,1)5$6758&785(

of pro rote tect ctin ing g an and d se secu uring ng critical infr frasstr truc u turee. With th IPP-based baa seecu c riity sys y tems m , th ms thee vaarirou us sy s ssttem m com mponents can n be seamlessly integraated with h ea each c oth ch ther e and er accesssed via a commo mo on se secu curiririty cu ty manaage g me m nt con nso s le. Operrat a or orss can maake ful u l usse of o mob obilililee devi deev cees such as sm martphones and d ta t bletts, enabling g detailed incident nt inf nfor orma or m tion on and vid deo footage to to be accce c ssed d by seccurity guardss on th he mo move. In ntellig igent video processing ig n capabilitties provide motion analysis, virtual gaate t s, virtual fences and human vs vs.. an nimal differentiation. The IP infrastructure maakes secu uririty ity ty syystems sccal a able and future proo of.f. Multiple locations occ can easililily be i tegrateed and man in a aged ed d cen entral ally al ly. For securiring riing and protect cting ct g cr crititiical crit ic infrastructure, it is all a maatter of network. As incident nts occu curr,r, ope cu p rators n ed to involve thirird parties such ne h as the lo loca c l po ca police, fifire ree services and other gove go vernment ve ntt age genc enc ncie ies. A network ie video o su survei eillllancee sys yste tem m al a lo lows w for two-w way a comm mm munic i attio ion an nd re real al-t -ttim imee sharin ng of detaiile led d in inci cide ci den de nt inform mat atio io on in ncl cluding g vi v deo deeo fo f otage, enabling ng optimal coope p raati pe tion tion o betwee een ee n operator and d out utt utside partiees.

Advances in seecu curiririty t syste ty tem te m co comp m on mp o en e ts suc uch h as thermal and low lig ght h cam a er erass coupled with intelligent video eo ana n lytics css allllow o operators to overcome ow me the h challlen llen nge g s

49


(0($ 0DUNHW

+HLJKWHQHG 6HFXULW\ LQ D /HVV 6HFXUH

AUG 2016 Ɣ www.asmag.com

hee GDP growth in Europ h pe haas be been en ssllow o due to a combinatio on of fac actors acto in ncl clud ud din ng un unem e pl p oyment nt,, ge g opo op pol olititic iccal al tens te nsio ns i ns io n and a dec ecliline ne in expo ort rtss du duee to to a sl slow owdo ow down n in Ch hin inaa an and d ot o her expo exxpo p rtt dest stin inat natio i ns ns. Ov Over errall, all, the Wor o ld Ban ankk fo f reecasts th that at GDP grro ow wth h in n the th he eu euro r areaa will bee 1.66 pe percentt ffo or both this yea year and d next.t. The 1.6 percent forr thi h s ye year iss s aller th sm han the 2.4 perce cent glo lobal averagee foreecasted d. Y t fo Ye for th he secu uriritty ind ndu ustr try in Europe, e, thi hing gs are quite diff ffferen ent: the he exh hibiitor ors we spo p ke with du duriing IFSEC 20016 1 alm most s unaanim mou usly ag greeed tha hatt a mo more noticeab ble grow wt wi wth willl be seen en n thi h s yearr. “F “Fo or sec ecurritity, y, laastt year we we still had d som om ome me impactt in n cert rtai tain n maarket rkets rk from m thee fin nan anci ciaal crisis. ri Thi hiss year we can n se seee th hatt it’s basicallyy gone nee,” sai aid d Th hom mass Lausten n, VP P of EM EMEEA EA at Mileston ne Syysttem e s. “Ove “O vera ralll, I wo w uld ulld sayy we we’ree se seei eing ei ng growt wth th qu quitiitte stab ab ble in Eu Euro Euro rop pe,” saiid Daavid pe” pe vid Mo ontague ue, Secu Seecuriritty ty Salles Director for EMEA aatt FLIR R Systeems. “Hisstoric orrical allyy therm rmal imaging has been quitee exp pen nsive, bu ut no ow, w becau usee price has been dro oppin ng, it’t s become the best est solution at an affordable priice.”

50


'HPDQGV :RUOG

“Seccur uritiy is gro owiing, so some me ver e titca calss mor o e th than an oth hers, and d overaalll the here is a po osititiv ivee fe feeelin ng. g. Thee movvem emen ent fr f om m analog to o IP is acceeler elerat atin in ng, g, and th herre is a grro owing ing use of re resi esi side d nt de n ial ssm mart home me-t -typ -t ypee prod duccts in Nort No rthe hern rn Europ o e, e,� saaid Peter er Ain insw s orrth sw t , Di Dirrector off Mark Mark rket etin ing g forr EM MEA A at Tyyco o Sec e urityy Prod od o duc ucts tss. “We haave good d gr gro owth acrosss all re ow regi gio onss in i EMEA,� said id d Garret eth h El E laams, MD for Access Co Contro nttro ol at ASSA AB ABLOY. “Th Th The h pipelinee for us is gro owi wing ng g. We’rre findin in ng a lot lo ot mo mo projec more ro cts acro ro oss ss a broad sco ope of sectors, from m gove veern rnmentt to co comm mmeer ercial and d private sectors. Heallth thca caree and higher education facilities are being built or refurbished. Legacy systems are growing old, and there is an opportunity to refresh.� Andrew Pigram, Management Director for U.K. at Bosch Security Systems, said business in the U.K. has been good due to a booming construction sector. “When you look across London, you see a lot of big building cranes, which is a positive indication that the construction

&DPOPNJDBMMZ TQFBLJOH UIF &.&" &VSPQF .JEEMF &BTU BOE "GSJDB SFHJPO JT QFSGPSNJOH UFQJEMZ #VU UIBU IBT OPU TUPQQFE B NPSF GPSNJEBCMF HSPXUI JO UIF SFHJPOĹ&#x;T TFDVSJUZ NBSLFU XIFSF EFNBOET IBWF HSPXO FTQFDJBMMZ BGUFS B SFDFOU TUSJOH PG UFSSPSJTU BUUBDLT UIBU IBWF EFWBTUBUFE DPVOUSJFT MJLF #FMHJVN BOE 'SBODF 4VDDFFEJOH JO &.&" UIFSFGPSF SFRVJSFT B GVMM VOEFSTUBOEJOH PG UIFTF EFNBOET BT XFMM BT UIF BCJMJUZ UP GVMGJMM UIFN By William Pao

51


(QVXULQJ

6DIH 3DVVDJH 7KURXJK 5IFSF BSF UIPVTBOET PG LJMPNFUFST PG UVOOFMT BSPVOE UIF XPSME 'PS NBOZ QFPQMF MJWJOH JO MBSHF DJUJFT TQFOEJOH UIFJS EBJMZ DPNNVUF VOEFSHSPVOE TFFNT OBUVSBM :FU GFX BSF BXBSF PG UIF JNNFOTF FOHJOFFSJOH DIBMMFOHFT JOWPMWFE JO LFFQJOH USBGGJD GMPXJOH TBGFMZ VOEFSHSPVOE PS UISPVHI B NPVOUBJO BY The a&s Editorial Team

urope stands out as an exceptional case study in regard to tunnel security. Tunnel security in Europe has been greatly promoted through EU regulation, specifically EU directive 2004/54, which required the risk assessment of all tunnels and, depending on the outcome, required them to be refurbished or sometimes also to be extended, for example, with extra rescue tubes. “The need to retrofit tunnels was one of the major market drivers in the tunnel industry. The lifetime of tunnels is typically several decades. However, as the equipment inside a tunnel becomes more and more based on electronics, the lifetime of typical electronic components is also reduced. The average periods for refurbishing tunnels with electrical equipment have been reduced in recent years from around 20 years to around 15 years,� explained Christoph Seewald, Head of Industry Management Transport Logistics for German sensor manufacturer SICK.

5(*8/$7,21 352027(6 1(: 7(&+12/2*< The new EU legislation concerning tunnel safety and limiting the impact of possible incidents prescribes the mandatory use of video analytics in tunnels over a length

AUG 2016 Ć” www.asmag.com

A COMPREHENSIVE SOLUTION TYPICALLY CONSIST OF SEVERAL SECURITY AND SAFETY DOMAINS, LIKE FOR EXAMPLE, FIRE DETECTION, PUBLIC ADDRESS AND EVACUATION, AND VIDEO SYSTEMS.

58

of 500 meters to ensure automatic incident detection. “This means that video surveillance cameras with built-in video analytics, like intelligent video analytics, will slowly become commonplace in future tunnel design, since these intelligent techniques are a necessity to potentially prevent or at least limit the impact of tunnel incidents,� explained Szymon Chlebowski, Solution Consultant of Business Development EMEA in Bosch Security Systems. A comprehensive solution typically consist of several security and safety domains, like for example, fire detection, public address and evacuation, and video systems. “All monitoring solutions are firstly installed to detect disruptions that may cause accidents as early as possible. Secondly, in case of an incident, solutions for public address and evacuation have to be in place to safely guide people out of a hazardous situation,� he added.

&+$//(1*(6 )25 7811(/ 6(&85,7< Tunnels have unique challenges not found in other road conditions. These include low light, limited space to place cameras, distorted sound bouncing off the walls of the tunnel, constraints in servicing the equipment, equipment


7XQQHOV getting dirty from dust and other particles, etc. Manufacturers therefore need to come up with innovative solutions to ensure safety and security. The limited lighting options inside the tunnel poses as a challenge. To counter it, manufacturers use low light cameras and high dynamic ranges which can help counter the differences in lighting between the tunnel itself and its portals. Jenoptik, for example, deployed “Robot Black Flash� technology in two long Thuringian tunnels on German highways 4 and 71. Both tunnels require specific flash technology to ensure that drivers are not blinded by the flash. For that purpose, an infrared flash was developed which is almost invisible to the human eye and thus, cannot blind drivers, but nonetheless enables high-resolution image quality for the correct recognition of drivers and license plates. One of the challenges in tunnels is the large amount of environmental noise. This includes lighting changes, shadows, highlights and reflections. The video software must understand these types of noise and ignore them. “A second challenge with tunnels is low ceiling heights and constrained space, which result in camera mounting locations with very low look angles but views

Larry Bowe, President and CEO, PureTech Systems

Szymon Chlebowski, Solution Consultant, Business Development, EMEA, Bosch Security Systems

Christoph Seewald, Head, Industry Management Transport Logistics, SICK

which can reach to several hundred meters. At long distances and low look angles, cars appear to be merged and overlapped. The camera does not get to see the entire car until it is very close. Understanding the separation of vehicles in this situation is a challenging problem. At PureTech, we address this with the use of geo-referenced video. This provides us location, real size and speed information, which in turn, enables our software to recognize individual cars, versus something that looks more like a continuous train,� explained Larry Bowe, President and CEO of analytics provider PureTech Systems. Other companies also employ the concept of pinpointing the exact location of vehicles inside the tunnel and its portals using other sensors, and not just video. Radar is used to detect vehicles regardless of weather or lighting conditions, and laser sensors are used inside the tunnel. The position coordinates of any found object are then usually transferred to a camera system to align the orientation of the camera towards the detected object.

9,'(2 $1$/<7,&6 )25 7811(/6 /DUU\ %RZH 3UHVLGHQW DQG &(2 RI DQDO\WLFV SURYLGHU 3XUH7HFK 6\VWHPV VHHV WKUHH SULPDU\ GHPDQGV IURP FOLHQWV XVLQJ YLGHR DQDO\WLFV WR PRQLWRU WXQQHOV

‡ 6HFXULW\ ² ORRNLQJ IRU XQDXWKRUL]HG LQWUXVLRQV DQG DEQRUPDO DFWLYLW\ ‡ 6DIHW\ ² PRQLWRULQJ IRU HYHQWV WKDW FRXOG UHVXOW LQ GDQJHURXV VLWXDWLRQV VXFK DV SHRSOH OHDYLQJ YHKLFOHV VSHHGLQJ YHKLFOHV VWRSSHG YHKLFOHV DFFLGHQWV ZURQJ GLUHFWLRQ SUHVHQFH RI VPRNH RU WKH GHWHFWLRQ RI DQLPDOV LQ WKH WXQQHO ‡ 7UDIILF 0DQDJHPHQW 0HWULFV ² XQGHUVWDQGLQJ WKH FXUUHQW IORZ RI WUDIILF QXPEHU RI YHKLFOHV DQG VSHHG WKH W\SH RI YHKLFOHV SUHVHQW DQG KRZ WKDW FKDQJHV RYHU WLPH

59


" %&&1&3 -00, */4*%& 5)&

*/%6453*"- $".&3" 5IF EJGGFSFODFT CFUXFFO JOEVTUSJBM DBNFSBT VTFE JO NBDIJOF WJTJPO TZTUFNT BOE WJEFP TVSWFJMMBODF DBNFSBT VTFE GPS TFDVSJUZ NJHIU OPU CF JNNFEJBUFMZ PCWJPVT IPXFWFS VQPO DMPTFS JOTQFDUJPO UIF EJTUJODUJPOT BSF DMFBS 5IJT BSUJDMF BJNT UP DMBSJGZ TPNF PG UIFTF EJGGFSFODFT BT XFMM BT FYQMBJO UIF JNQPSUBODF PG JOEVTUSJBM DBNFSBT JO NBDIJOF WJTJPO TZTUFNT BY Eifeh Strom, Freelancer

AUG 2016 Ć” www.asmag.com

ndustrial cameras are generally small and compact, capable of capturing high-resolution images. However, they are also highly specialized and an important component of machine vision systems and automated production. “Throughout all steps of manufacturing, from inspection of raw materials and production monitoring (i.e., flaw detection) to final inspections and quality assurance, they [industrial cameras] are an indispensable part of achieving top efficiency and strict Eva Tischendorf, Team Leader, quality standards,� according to a white paper by Basler. Communications, Basler A market research report from MarketsandMarkets reported that the overall machine vision market is expected to grow from US$8.1 billion in 2015 to $12.5 billion by 2020, at a CAGR of 9.1 percent during the forecast period. The machine vision camera market alone reached $1.3 billion in 2015 and is expected to grow at a CAGR of 8.3 percent during the period 2016 to 2021, according to a report by IndustryArc. But what is it that makes an industrial camera better for machine vision applications, and why can’t video surveillance cameras be used in the same way? We spoke to Eva Tischendorf, Team Leader of Communications at Basler to find out.

*(1(5$/ 63(&6 )25 ,1'8675,$/ &$0(5$6 Industrial cameras generally consist of two basic components — the image sensor

62


and the digital data transmission interface. However, these are not the only two things to consider. In fact, determining the aforementioned is only the beginning. “The first question is whether one needs an area scan camera or a line scan camera and if it needs to be monochrome or color,” Tischendorf said. “Users then need to decide on the resolution (MP), speed (fps), sensor technology (CCD or CMOS), sensor technique (rolling or global shutter), the interface (USB 3.0, GigE or CameraLink), the housing, and which features the cameras should have.” Is the camera being used on a fast-moving production line where the objects being scanned are in constant motion? If yes, a line camera would be the better option. Will the object on the line make a stop at any point during production? If yes, an area camera could suffice. But what about the resolution and fps? While different needs will yield different requirements, some experts believe that industrial cameras should have at least a video format of more than 640 x 480 pixel resolution at 30 fps. When comparing sensor technology, the trend is heading toward CMOS being the future. Sony, the world’s largest CCD sensor maker announced last year that it will stop manufacturing CCDs in 2017 and focus on CMOS technology. That does not mean, however, that CCDs are outdated. Depending on the application or need, CCDs could be the better option. The question of interface is another that offers many different choices. Deciding which to use means considering the bandwidth requirements of the application.

,1'8675,$/ &$0(5$6 96 6859(,//$1&( &$0(5$6 Although some manufacturers produce both industrial cameras for machine vision systems and video surveillance cameras, they are not interchangeable. “Industrial cameras send the images as uncompressed (’raw’) data directly to the PC. The PC is then responsible for processing the relatively large volume of data,” Tischendorf explained. “The big benefit of this method is that no image information is lost. This is crucial for a variety of industrial applications, in the medical and life sciences, or in traffic and transportations.” On the other hand IP cameras, which are typically used in surveillance applications or in combination with industrial cameras, record videos (e.g., MPEG-4, MJPEG or H.264) and are placed with a robust housing to be resistant to jolts and harsh weather, making it suitable for both indoor and outdoor applications. Additionally, IP cameras have been engineered to deliver excellent image quality even under extremely poor lighting and weather conditions. “Network cameras acquire the images and compress them,” she said. “This reduces the volume of data to such a degree that it can be stored in the camera. By connecting to a network, a theoretically unlimited number of users can also access the camera.”

Another major difference between these two types of cameras is who controls and uses them. Video surveillance cameras are typically managed and controlled by security professionals. In contrast, since attention to detail is a vital role of industrial cameras, machines are tasked with these jobs.

+2: 7+(< $5( 86(' A machine vision system and industrial cameras could be deployed in any number of applications, ranging from manufacturing to medicine to traffic monitoring even to security. One application in which industrial cameras play a particularly important role in is the optimization and automatic monitoring of production processes, according to Tischendorf. “Industrial cameras are tasked with gathering, storing and archiving important information so that users or software can make decisions that would be unfeasible without that visual data.”

THE MACHINE VISION CAMERA MARKET ALONE REACHED US$1.3 BILLION IN 2015 AND IS EXPECTED TO GROW AT A CAGR OF 8.3 PERCENT DURING THE PERIOD 2016 TO 2021, ACCORDING TO A REPORT BY INDUSTRYARC. 63


)($785( 60$KRPH

AUG 2016 Æ” www.asmag.com

66


$SSOH +RPH 6LUL 3URPLVLQJ RU -XVW +\SH? Ă?

; #n5 *1/'

0 70'X 22.' 708'+.'& #0 #.. 0'9 1/' +6g%'064+% #22 %#..'& t 1/'Xt 9*+%* 9+.. /#-' +65 &'$76 +0 + EN 6*+5 (#..T *' #22 9+.. #%6 #5 # *7$ (14

1/' +6g'0#$.'& &'8+%'5X 4')#4&.'55 1( 6*'+4 /#07(#%674'4T

The annual WWDC conference in June was not short on flair and amboyance, as Apple made a big splash with the introduction of iOS 10, a new operating system due for release in fall of this year. But for anyone in the connected home business, the head turner must have been the announcement of “Home,â€? an aptly named app that Apple chose to rekindle its romance with HomeKit — a moniker that was close to be forgotten along the likes of Amazon Home, Google Now and many more. “After the long-awaited anticipation Apple at least mentions HomeKit again and did something about it,â€? Z-Wave Europe CEO Christian Paetz said. Many believe that the announcement of Home is a positive step for Apple, because there is ďŹ nally a centralized app that can manage the IoT devices comprising the HomeKit ecosystem. Prior to Home, users would need to download third-party apps in order to control their devices. In short, this very long awaited release may gain traction in the smart home market.

67


7$"CSJEHF 7#1 J H "MM *O 0OF 4UBOE "MPOF "OBMZUJDT "QQMJBODF

$PN/FU $/.$ 4'1 . .FEJB $POWFSUFS

4VQSFNB #JP&OUSZ 8 Q Z 'JOHFSQSJOU "DDFTT $POUSPM

Features:

Features:

Features:

• • • • •

• • • • • •

• Adds analytics to existing IP and analog (via the VMS) camera installations • Supports 4 channels at 1080p and up to 16 channels with D1 resolution • Standalone or used with VMS • Instantly receives alerts via VMS, email or HTTP • Configures rules and reviews events via web browser on any device • Internal 500GB HDD for f pre/post alarm storage

3-port media converter 2 TX input ports and a single SFP port Port isolation Exclusive MUX feature f Link fault f pass-through feature f

Ĺ‚ ComNet/U.S. Ĺ‚ Email: info-europe@comnet.net

1:150,000 matches in 1 second IP67 dust and waterproof IK08 vandal-proof structure Dual frequency, f multi-smartcard reader Live finger f detection technology Supports PoE

Ĺ‚ Suprema/Korea Ĺ‚ Email: inquiry@supremainc.com

Ĺ‚ VCA Technology/U.K. Ĺ‚ Email: info@vcatechnology.com

#PTDI 7.4 Features: • Supports multiple management server requirements for f large industrial facilities f across different time zones • Maximum 500 ONVIF cameras per management server • Access to live including PTZ control and recorded videos of up to 9,999 sites with Bosch DVR recorders, DIVAR IP 3000/7000 and single management server computers

• Maximum resilience to ensure continuous operation • Up to 2,000 cameras with a single recording server • Supported HD resolutions: 720p and 1080p; 5, 8 and 12 MP ł Bosch Security Systems/Germany ł Email: apr.securitysystems@bosch.com

0O44* 0DVMBSJT 7.4

(SVOEJH (3/ ( 1 /73

Features:

Features:

• Streamlined motion detection support • Ocularis Client is available in both 32-bit and 64-bit versions • Recorder migration and camera replacement tool makes upgrading faster f and easier • Ocularis recorder update service now includes software upgrades • Keyword search added to Ocularis Client • Two T new view types added to Ocularis Client: 1 x 2 and 4 x 3 x 4

• Built-in 8-channel PoE switch for f direct IP camera connection • Various V recording features: f normal, schedule, motion, alarm • Multiplex: live/playback, recording, backup, networking • Video recording with NAS system and local HDD • Recorded files f backup via USB device • ONVIF protocol support

Ĺ‚ On-Net Surveillance Systems/U.S. Ĺ‚ Email: info@onssi.com

Ĺ‚ Grundig Security/Germany Ĺ‚ Email: info@grundig-security.com

AUG 2016 Ć” www.asmag.com

70

/FEBQ ."$& 3FBEFS .. 23

Q 3FBEFS GPS 4NBSUQIPOFT Features: • Enables use of smartphones to identify people • Supports NFC, Bluetooth Low Energy, proximity and smartcard technology and (optionally) QR • Operates with any access control system • Combines convenience and security • Easy setup ł Nedap Identification Systems/Netherlands ł Email: identification@nedap.com


FYBDR7JTJPO 7.4

43* *0. "DDFTT $POUSPM 5BCMFU

Features:

Features:

• • • • • •

• Unlocks doors for f any interior controlled area • Provides network access only when authorized user is present • Uses a temporary key code to grant time-limited access • Captures time and attendance data • Displays notices and reminders for f all to see • Provides two-way communication with guards

Direct archive search Camera connection diagnostics Hard disk drive serviceability Bandwidth control MP4 crop export W service dashboard Web

Å‚ Exacq Technologies (part of Tyco Security Products)/U.S. Å‚ Email: exacqinfo@tycoint.com

Å‚ SRI International/U.S. Å‚ Email: info@sri.com

"SFDPOU 7JTJPO "7 %/ 4VSSPVOE7JEFP 0NOJ .JOJ .FHBQJYFM $BNFSB Features: • • • • • •

12-MP resolution 4 x 8mm lenses 3-axis gimbal Remote focus f True day/night Surface mount

Å‚ Arecont Vision/U.S. Å‚ Email: avsales@arecontivison.com

.155 1SP155 4NBSU %FWJDF #BTFE 7JEFP 1VTI UP 5BML 4FSWJDF Features: • • • • • •

Smart device-based video push-to-talk (PTT) service with WiFi/3G/LTE Voice and video PTT and instant messaging Real-time video sharing PTT/photo transfer/user’s location sharing Compatible with two-way radio through RoIP gateway (ProGate) Integration with various mobile devices, support date encryption and E2EE for f strong PTT security Free download of ProPTT2 app and build own PTT system with ProPTT2 server package

Å‚ IMPTT/Korea Å‚ Email: biz@imptt.com

"YJT . -8 /FUXPSL $BNFSB

%BMMNFJFS 7.$ 7JEFP .BOBHFNFOU $FOUFS

5FSBDVF &/$ )%.* 7JEFP &ODPEFS

Features:

Features:

Features:

• • • •

• Compatible with SeMSy III systems • Joystick for f control of PTZ dome cameras • Touch T screen ffor easy operation of playback f functions • Jog-shuttle for f detailed evaluation of video sequences • Components can be used as standalone devices • DIN EN 50130-4 compliant

• H.264 baseline, main, high profile and MJPEG • Up to 1920 x 1200 at p60, 3440 x 1440 at p24 or 4K at p15 • Embedded and analog audio inputs • Adjustable frame rate and auto scaler • Up- and downscaling with cropping • Frame synchronizer for f seamless switching

HDTV 1080p resolution Wide dynamic range Infrared light for f day/night use Offers edge storage via memory cards up to 64GB • Supports wireless connection to other networks ł Axis Communications/Sweden ł Email: axis-sap@axis.com

Å‚ Teracue eyevis/Germany Å‚ Email: IPTVSystem@teracue.com

Å‚ Dallmeier electric/Germany Å‚ Email: info@dallmeier.com

71


6HSWHPEHU ² 0DUFK

WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with indicate a&ss portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx. September 2016

OFSEC

• Date: 2016/09/05–09/07 • Venue: Oman International Exhibition Centre, Muscat, Sultanate of Oman • Tel: +968-2478-8476 • Email: info@muscat-expo.com • URL: www.muscat-expo.com/ofsec

Adria Security Summit

• Date: 2016/09/06–09/08 • Venue: Kongresni Centar, Sarajevo, BiH • Tel: +387-33-788-985 • Email: summit@asadria.com • URL: www.adriasecuritysummit.com

IFSEC Southeast Asia

• Date: 2016/09/07–09/09 • Venue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia • Tel: +44-20-7921-8127 • Email: Agnius.Kazlauskas@ubm.com • URL: www.ifsecsea.com

• • • • •

Security Essen

Date: 2016/09/27–09/30 Venue: MESSE ESSEN, Essen, Germany Tel: +49-201-7244-0 Email: info@messe-essen.de URL: www.security-essen.de

• • • • •

Date: 2016/09/28–09/30 Venue: Halls B & C, Marina Bay Sands, Singapore Tel: +65-6278-8666 Email: info@cems.com.sg URL: www.safetysecurityasia.com.sg

ISAF Istanbul • • • • •

Intersec Buenos Aires

Date: 2016/09/29–10/02 Venue: Istanbul Expo Center, Istanbul,Turkey T Tel: +90-212-503-32-32 Email: marmara@marmarafuar.com.tr URL: www.isaffuari.com

Security China

• Date: 2016/10/25–10/28 • Venue: China International Exhibition Center (New Center), Beijing, China • Tel: +86-10-68731710 • Email: secu_chinashow@yahoo.com.cn • URL: www.securitychina.com.cn

ASIS • • • • •

Secutech Vietnam

Date: 2016/09/21–09/24 Venue: Friendship Cultural Palace, Hanoi,Vietnam Tel: +886-2-8729-1099 Email: stvn@newera.messefrankfurt.com URL: www.secutechvietnam.com

MEFSEC

Date: 2016/12/11–12/13 Venue: Cairo International Convention Centre, Cairo, Egypt Tel: +971-4-407-2702 Email: syed.javed@informa.com URL: www.mefsec.com

November 2016 • • • • •

• • • • •

Expoprotection

Date: 2016/11/07–11/09 Venue: Paris Porte deVersailles - Pavillion 1, Paris, France Tel: +33-1-47-56-50 11 Email: marie-aurelie.goncalves@reedexpo.fr URL: www.expoprotection.com

Smart Summit Asia

Date: 2016/11/30–12/01 Venue: Suntec Convention and Exhibition Centre, Singapore Tel: +44-330-3353900 Email: sponsorship@smartsummit.net URL: www.iotsmartsummitasia.com

January 2017

Intersec

• Date: 2017/01/22–01/24 • Venue: Dubai International Convention and Exhibition Centre, Dubai, U.A.E. • Tel: +971-4-389-4500 • Email: andreas.rex@uae.messefrankfurt.com • URL: www.intersecexpo.com March 2017

Safe Secure Pakistan • • • • •

• • • • •

Date: 2017/03/07–03/09 Venue: Pak-China Friendship Centre, Islamabad, Pakistan Tel: +92-21-111-734-266 Email: info@safesecurepakistan.com URL: www.safesecurepakistan.com

Security Show Date: 2017/03/07–03/10 Venue:Tokyo T Bright Sight,Tokyo, T Japan Tel: +81-3-3512-5670 Email: tradefairs2017@smj.co.jp URL: https://messe.nikkei.co.jp

MIPS • • • • •

Date: 2017/03/21–03/24 Venue: Expocentre Fairgrounds, F Moscow, Russia Tel: +7-499-750-08-28 Email: security@ite-expo.ru URL: www.securika-moscow.ru AUG 2016 Ɣ www.asmag.com

• • • • •

Date: 2016/09/12–09/15 Venue: Orlando, Florida, U.S. Tel: +1-703-519-6200 Email: asis@asisonline.org URL: http://securityexpo.asisonline.org

• • • • •

Safety & Security Asia

October 2016 • Date: 2016/09/07–09/09 • Venue: La RuralTrade T Center, Buenos Aires, Argentina • Tel: +54-11-4514-1400 • Email: ezequiel.gorbaran@argentina.messefrankfurt.com • URL: www.intersec.ar.messefrankfurt.com

December 2016

Protect • • • • •

Date: 2017/03/29–03/30 Venue: SMX Convention Center, Manila, Philippines Tel: +632-818-6828 Email: leverage@leverageinternational.com URL: www.protect.leverageinternational.com

75


Companies in This Issue Products of the Month • GEOVISION • SENSORMATIC • VIVOTEK Viewpoint • AXIS COMMUNICATIONS • BOSCH SECURITY SYSTEMS • BRYGHTPATH • BURNS & ASSOCIATES • IDIS EUROPE • RSI VIDEO TECHNOLOGIES • VANDERBILT INTERNATIONAL • VERACITY • XTRALIS

Industry Report • AXIS COMMUNICATIONS • FLIR SYSTEMS • HIKVISION DIGITAL TECHNOLOGY • PYRONIX

• OPTEX • SENSTAR • SOUTHWEST MICROWAVE

Market Update • ASSA ABLOY • AXIS COMMUNICATIONS Smart Technology • BOSCH SECURITY SYSTEMS • 3VR • CANON • AIMETIS • FLIR SYSTEMS • INTELLIVISION • GENETEC • PURETECH SYSTEMS • HIKVISION DIGITAL • RETAILNEXT TECHNOLOGY • IDIS Integrated System • MILESTONE SYSTEMS • AXIS COMMUNICATIONS • PANASONIC • HONEYWELL SECURITY AND FIRE • PAXTON

Next Issue

• • • • • • •

PYRONIX SRI TYCO SECURITY SYSTEMS VANDERBILT INTERNATIONAL VERACITY VIDEOFIED XTRALIS

Vertical Solution • BOSCH SECURITY SYSTEMS • PURETECH SYSTEMS • SICK IoT • BASLER

Integrated System

Smart Device/Software

ACCESS CONTROL FOR SMART BUILDINGS

BIOMETRICS Vertical Solution

MRT & RAILWAY STATIONS

77


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.