Dec 2012
Vertical Market
t r o p r i A d e r r u o f c Se minals ngs 36 Tere Landi Saf
nting the dau ranteeing h it w a d u e are fac rucwhile g erators ocess quality ds and infrast s p o t r o u el, goo ring pr ay, airp e vario Every d ibility of ensu gers, personn nature of th tions require x t s la n respon rity of passe e. The comple official regu managemen u g c le n im e the s the same t s and fulfilli ically flexib t how a t tures a ems, processe ge and dynam takes a look ir current e s t d h & s t le a y s . h w s b it o n u s ted kn ort operatio red, along w a e s p dee ntire airp ecu ls are s of the e ts of termina trends. e n segme es and futur g n e ll cha
Viewpoint
product exploration
The Security Industry Restructures to Meet New Challenges
Video Quality
Verification Software Benchmarks Surveillance Performance
IMF projections for the rate of GDP growth across advanced countries in 2012 is 1.4 percent while the world market for physical security systems grew by 6 percent.
How can you tell if video surveillance looks good or bad? While there are specs such as frames per second and aperture, the final image quality is judged by how pleasing it is to the human eye.
COMPARISON OF PHYSICAL SECURITY PENETRATION BY MAJOR REGION 2006 & 2012 2012
2006
11.50 Product Sales/Capita $USD 42,224 GDP/Capita
90
China
How to Select the Right Video Quality Verification Software
DEC 2012
E.U. (7) 12.08 Product Sales/Capita $USD 39,740 GDP/Capita
88
14 22
26
www.asmag.com
North America 14.11 Product Sales/Capita $USD 47,000 GDP/Capita 14.81 Product Sales/Capita $USD 49,340 GDP/Capita
1.53 Product Sales/Capita 4,170 GDP/Capita 2.40 Product Sales/Capita $USD 6,120 GDP/Capita
Rest of Far East & S.E. Asia 1.90 Product Sales/Capita $USD 9,000 GDP/Capita 2 Product Sales/Capita $USD 9,800 GDP/Capita
22
Dec 2012
Special Feature
2013:
Upheavals in Security With 2012 behind us, the focus is now on the year ahead. A 2013 preview undoubtedly requires a review of 2012. In this section, a&s sums up the storms of the security industry in 2012 and peeks into the prospects of clear skies in the upcoming year.
52 58 70 72 76 80 84 86
46
Security Giants Preview 2013 EMEA Moves On in Different Paces Russia: The Bear Awakens Mature American Market Experiences Modest Growth Latin America Kicks Off Asia Surges Ahead in 2013 China: The Security Dragon Roars In India: The Elephants Stomps into the Security Market
network ManageMent
86
30 The Value of Network Assessment, Planning, Design and Execution
58
14 18 20 20
Video is critical and it is even more critical to get it right. Bandwidth optimization is not limited to mere tweaks to camera settings. Closer collaboration between IT department, system integrator and surveillance operator is more important than the old days of CCTV.
16 22
DEC 2012
www.asmag.com
22
Contents Editor’s Note Corporate News Market Observer
02 Show Calendar 1 104 New Products 110 Companies in This Issue
EDITOR'S NOTE a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies
YearlY review: what is next for 2013?
developments in CCTV, Digital Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home Automation and other fields relevant to electronic security.
ISSN 1997-6267
It is now reaching the end of 2012. It might be a little tough to give a very positive comment on the security industry of 2012, due to the sloppy global economy and lack of major technology breakthroughs. The security markets in different geographic regions also grew quite differently and the growth rate for each country was more or less affected by its economic development. Hence, in this issue, we interviewed several industry experts in the regions of EMEA, Americas and APAC to get their forecasts for the next year. What impressed me a lot are people’s viewpoints toward “growth” in the DACH market. People in the DACH region don’t like fast growth, but prefer stable and long-term growth instead. Fast economic growth always brings a certain level of disorder to the supply and demand in the market, which explains why the DACH market tries to avoid fast growth, but strives to maintain healthy growth despite the recession. The regions of Eastern Europe, Middle East, Latin America and APAC shed a promising light of growth, compared to other regions in the world. The drivers are mostly from government investments and the growth rates usually coincide with their national GDP growth. Other than that, we can also see some international events driving security demands — the upcoming 2014 FIFA World Cup and 2016 Summer Olympics in Brazil, the 2013 Universiade in Kazan, and the 2014 Winter Olympic and Paralympics Games in Sochi.
中華郵政北台字第1571號 執照登記為雜誌交寄 Parson Lee Joseph Lee John Shih
Publisher & Managing Director General Manager General Manager
Editorial
General Press Jill Lai Alf Chang Tevin Wang Alyssa Fann Christina Phillips Judy Wang Christine Chien
editor in Chief senior Consultant reporter reporter reporter reporter Coordinator
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com tevin.wang@newera.messefrankfurt.com alyssa.fann@newera.messefrankfurt.com christina.phillips@newera.messefrankfurt.com judy.wang@newera.messefrankfurt.com christine.chien@newera.messefrankfurt.com
executive Designer Designer Designer
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Arthur Wu
Circulation & Subscription
Collins Yuan Michelle Shih
Group Manager Coordinator
collins.yuan@newera.messefrankfurt.com michelle.shih@newera.messefrankfurt.com
Corporate Management
Juihui Lin Thomas Pin Chihung Lee
assistant to Managing Director account Manager it Manager
juihui.lin@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
asmag.com
Hayden Hsu Jerry Wu Cliff Kang
web editor in Chief hayden.hsu@newera.messefrankfurt.com assistant sales Manager jerry.wu@newera.messefrankfurt.com assistant sales Manager cliff.kang@newera.messefrankfurt.com
Secutech & Events (Overseas)
Echo Lin Sandra Chen Tina Chang
Manager Project Manager assistant Manager
echo.lin@newera.messefrankfurt.com sandra.chen@newera.messefrankfurt.com tina.chang@newera.messefrankfurt.com
Secutech & Events (Domestic)
Veronica Chen
Group Manager
veronica.chen@newera.messefrankfurt.com
International Advertising
Many industry experts forecast that next year the market will still continue to consolidate, which means more companies will be acquired by others or even disappear entirely. In 2013, the world security market might seem a little gloomy and uncertain, but it provides a good opportunity for a “healthy” company to stand out. Hence, it will be much easier to conclude with some key technologies and products for future growth, such as VSaaS for SMB sectors, biometrics for high-security verticals and the migration to IP — hybrid, HD-SDI and full-IP technologies. How security devices help increase business efficiency in different vertical markets will also definitely be a trend. For example, in this issue’s Product Exploration, we explored “Video Quality Verification Software” in VMS or VCA. The benefits it provides include saving time and maintenance expenses, while achieving higher security.
Jill Lai
jill.lai@newera.messefrankfurt.com
[Headquarters]
Joanne Wu Kay Yang Audrey Fang Helen Chen Jessica Lee
assistant sales Manager operation officer Coordinator Coordinator assistant
joanne.wu@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com helen.chen@newera.messefrankfurt.com jessica.lee@newera.messefrankfurt.com
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Cemre Ilkan Evris Consolos Muris Hadzic Manish Gandhi Tim Shen Y. C. Suh Takashi Komori Nguyen Thu Ha
Usa/Canada europe (italy) europe (turkey) europe (U.K.) southeast europe india China Korea Japan vietnam
bobbie@globetrottermedia.com produzione@ethosmedia.it cemre.ilkan@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz tim@asmag.com.cn ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com
Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s International China Best Buys, a&s Asia (above published in English), a&s China, a&s Installer, a&s Taiwan, a&s Solution and Info Security (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2012 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
18 22
DEC 2012
www.asmag.com
22
Intelligent Touch Terminal VoIP Intercom
IP Reader & Controller
emerald emerald™ is a multi functional intelligent access terminal that is revolutionising the security industry. With its sleek design and state of the art custom LCD touch screen, emerald is a powerful card reader and controller in one, featuring fully integrated Voice over IP (VoIP) intercom and a range of Remote Applications that provide a whole new multifaceted access control experience. emerald uniquely opens emerald™ – The industry’s most multifunctional intelligent access terminal. Visit us at Intersec Hall 4, Stand 205C.
For more information contact us on: T: +44 (0)28 9045 6767 E: cem.info@tycoint.com or visit us at www.cemsys.com/emerald © 2012 Tyco Security Products and its Respective Companies. All Rights Reserved.
Remote Applications
Corporate News Panasonic to Reorganize Systems & Communications Company Panasonic announced that its Board of Directors decided to conduct mergers where Panasonic System Solutions Japan (PSSJ), a whollyowned consolidated subsidiary of Panasonic, will absorb Panasonic System Networks (PSN), a wholly-owned consolidated subsidiary of Panasonic, and Panasonic System Solutions Infrastructure (PSSIS), a wholly-owned subsidiary of PSN. PSSJ mergers are expected to take effect on Mar. 1, 2013. It was also decided that the mobile phone base station business of Panasonic Mobile Communications (PMC), a wholly-owned consolidated subsidiary of Panasonic, will be transferred, through a corporate split (PMC Station Business Transfer), to the newly merged company after implementation of PSSJ mergers. At the same time,
the mobile phone terminal business of PMC will be transferred to a new mobile phone terminal business company which will be newly incorporated through a corporate split of PMC (PMC Terminal Business Transfer). Then, Panasonic will absorb the remaining PMC (having only a function to hold and manage its assets) through a merger (PMC Merger) with an expected effective date of Apr. 1, 2013. Panasonic aims for expansion of the solution business through unification of several functions by integrating PSN and PSSIS with PSSJ through the merger. Furthermore, Panasonic will seek improvement of its development capability and enhancement of its business capability, by integrating the PMC's mobile phone base station business.
Analog Surveillance Equipment Accounts for 87 Percent of Consumer Market, IMS Says
Suprema Wins Mexican e-Passport Project Suprema, a provider of biometrics and ID solutions, announces that the company has won a nationwide electronic passport project of the Mexico Government. The project, steered by Secretaria de Relaciones Exteriores (SRE, Ministry of Exterior) of Mexico, is aimed to develop a passport issuing system for 2.7 million electronic passports across all 32 states in Mexico, including the Federal District of Mexico City. With the initial shipment, Suprema has supplied over 500 units of biometric and passport issuing devices. Furthermore, SRE has a plan to expand this newlydeveloped electronic passport issuing system to its overseas Mexican embassies and newly opening offices in its domestic regions. Suprema’s fingerprint live scanner, which captures 4-finger slaps and two-thumbs, will replace SRE's existing single-finger readers to improve capturing speed and image quality of fingerprints. In addition, the new passport reader provides a higher level of security on issuance of electronic passports and the fingerprint scanner enables biometric sign-on using pre-registered fingerprint at SRE's nationwide passport issuance stations.
Analog security cameras accounted for 87 percent of total camera shipments in the consumer and DIY video surveillance market, according to a recent market report from IMS Research, part of IHS. However, unlike the professional market, the consumer market is not predicted to see a significant revenue transition from analog to network video surveillance equipment in the next five years. This is for two main reasons. Firstly, in a highly price-sensitive market, consumer network cameras are on average, double the price of analog cameras. Secondly, many of the major suppliers to the consumer market are primarily focused on analog equipment and have comparatively small ranges of network products. Despite the difficult retail climate, the consumer market for video surveillance equipment has continued to perform well, with double-digit growth forecast for both analog and network product categories. “Many retailers stocking video surveillance equipment realize it is a growing category that has not yet reached saturation. The Total Camera Shipments faster growth seen in network in Consumer and DIY equipment has not cannibalized Surveillance Market sales of analog equipment; there is still organic growth in both product lines. For standard multiple camera installations, Analog security analog offers a cheaper solution cameras complete with many of the account for 87% of total camera functions available from network shipments. equipment. Analog bundles will remain fit for purpose for many consumers in the future.” concluded Josh Woodhouse, Market Analyst and repor t Source: IMS Research author.
20 22
DEC 2012
www.asmag.com
$918 million
200
$377 million
201
$35.4 million
2011 22
2014
2016
Corporate News Verint Participates in Launch of "Total Airport Security Solution" Field Trial at London's Heathrow Airport Verint Systems announced that it is leading and providing key technologies to the first Total Airport Security Solution (TASS) proofof-concept at Heathrow in London. TASS is comprised of a multi-level video and situation intelligence offering specifically designed to help airports advance their threat detection capabilities. Verint, along with several key partners from leading European technology companies, launched the field testing of the TASS prototype in October 2012. During the trial, three pre-identified security threat scenarios were tested, allowing members within the
North Carolina Hospital Adopts Iris Recognition for Patient Safety, Record Integrity and Fraud Prevention As part of their concerted focus on patient safety, preventing duplicate medical records and overlays and eliminating medical identity theft at the point of care, Hugh Chatham Memorial Hospital has adopted a multi-biometric patient identification system with iris recognition as the preferred modality. The system was launched in the Outpatient Admissions and Radiology departments with future plans for expansion to the emergency room and physician practices. This multi-modal biometric patient identification system supports fingerprint, finger vein, palm vein, iris and face recognition. M2SYS Technology, the developer of this system, brings a decade of diverse biometric technology experience to the healthcare industry. "For those who are still unaware of biometric patient identification systems, this is the time to educate yourself on how this technology can be leveraged to raise patient safety levels, prevent duplicate medical records, eliminate medical identity theft and lower hospital liability,” commented Mizan Rahman, Founder and CEO of M2SYS Technology. “We are at a critical juncture right now in healthcare where hospitals and medical facilities need to completely understand the technology available for patient identification and how it actually works. I am very pleased that we are able to help Hugh Chatham Memorial Hospital enhance their patient safety initiatives.”
22
DEC 2012
airport community to observe and evaluate the TASS system. Part of the Seventh EU Framework Program, TASS is a four year project that is expected to run until March 2014. The TASS consortium is led by Verint and composed of 20 leading European technology companies, research institutes and end-user organizations. Heathrow security officials will continue to conduct several simulated scenarios testing the system’s functionality and interoperability with the integrated technologies.
UK Youth Care Facility Protects Its Premises with CEM/Tyco Platform CEM Systems, part of Tyco Security Products, announced that Aycliffe Secure Center, provider of comprehensive secure care facilities for young people, has chosen CEM's latest security management system and biometric technologies to help protect and secure its premises. ADT, a European supplier of electronic and fire solutions, successfully installed and managed the full end-to-end deployment of the solutions. The crux of Aycliffe's business is to provide a safe and secure environment for its young residents who are between the ages of 11 and 17. It offers high quality, secure accommodation, as well as education and assessment prior to the reintegration of adolescent individuals back into the community. ADT worked closely with CEM and Aycliffe to ensure the best solution was installed to match Aycliffe's specific business requirements. CEM system was chosen because it is a powerful and fully integrated security management system, ideal for securing large facilities such as Aycliffe, offering powerful access control, alarm processing, photo badging and integration to third party systems.
Aero-Dienst Protects Hangars with Panomera Aero-Dienst has provided its customers with an extensive range of services in business-related aviation for over 50 years. This includes maintenance and operation as well as purchase, sales and management for business jets. Almost 300 employees look after the special requirements of their customers. “We intend to afford our customers the highest level of security when they entrust us with the care of their jets,” declares Managing Director Martin Bauer. Accordingly, Aero-Dienst was searching for a video surveillance system that would meet its needs — leaving nothing to chance in the process. None of the test configurations satisfied the company’s requirements, until the Dallmeier Panomera came into the picture. Unlike conventional HD and megapixel cameras, which only have one lens, Panomera functions with multiple lenses, each with a different focal length. With this novel sensor concept, surveillance can be ensured even for extremely large areas, at the highest possible resolution, to the farthest background of the area of coverage. Two Panomera systems were installed in each hangar, in opposite corners of the structure. All four hangars will be subject to surveillance in this way.
www.asmag.com
22
VIEWPOINT
The Security Industry Restructures to Meet New Challenges IMF projections for the rate of GDP growth across advanced countries in 2012 is 1.4 percent while the world market for physical security systems grew by 6 percent. Allowing for even higher rates of growth in emerging and developed economies, this is much more than a worthy performance, particularly for a mature industry. Video surveillance achieved 11.8 percent, double the rate of aggregate growth for the industry, while access control achieved 7.2 percent. Variation in performance across subsectors is even wider with IP Video Surveillance topping the performance charts at around 30 percent. SUBMITTED BY MEMOORI BUSINESS INTELLIGENCE
Why Structural changeS have IncreaSed demand
The main reason that the security industry has been able to prosper during the worst trading conditions for decades is that the structure of the business has morphed not just to compensate but to meet and beat the challenges. Our 2012 Annual Report shows that both the middle strata and small companies have increased the size of the market and their share. The minnows are taking on the sharks and winning, both through the development of leading edge products and growth through acquisition and alliances. But the main driver is that they are delivering products and systems that are transforming the security industry from a cost center to a cash generator. The business has also benefitted from IT, communications and defense companies’ continued forays into the security industry, leveraging their expertise in digital technology and making serious inroads into homeland security and transport markets. The second structural change is that the routes to the market have changed with system integrators now securing 50 percent of all product sales. Manufacturers are now partnering with system integrators to develop solutions that work across different vertical markets that add value, not just for improving security but to increase operating efficiencies as well.
26 22
DEC 2012
www.asmag.com
â–˛ Allan McHale, Director of Memoori Business Intelligence
IP Networking products can offer much more than analog when they are joined with other building services and the business enterprise. These additional benefits have definitely increased demand because they deliver a much improved ROI. There is no reason why the traditional distributor route cannot deliver the same service, but most distributors have not seen the need to change and prefer to shift analog boxes while their share of the market declines.
market groWth by Sector and regIon
The total value of world production of products at factory gate prices in 2012 was around US$20.6 billion. Of
22
this, video surveillance products at $10 billion increased their share to 49 percent, access control at $4.8 billion took a 23.5 percent share and intruder alarms at almost $5.8 billion had a 27.5 percent share. The developed markets of North America and Europe are losing market share to Asia and particularly China, which will be the largest single market before the end of this decade. Asia has increased its share to over 35 percent for all physical security systems, while growth has been much more modest in North America and Western Europe, with an aggregate increase from 6 to 7 percent and 3.5 percent respectively over the last three years. This trend will continue well into the next decade. The measure of penetration of physical security products in any country is an important factor because it sets a benchmark for the latent potential that is available to exploit. There is an enormous latent demand waiting to be exploited in the emerging markets of the world — these are the markets that manufacturers should be developing now because they will grow at much
22
higher rates than the developed markets of the Western world. China, for example, currently has a penetration of one-sixth of the U.S. but this stood at one-tenth in 2011, showing that the market is growing rapidly by taking up this latent potential. The penetration of physical security products is highest in North America where GDP per capita is forecast at $49,340 and security sales per capita $14.81. In the E.U.(7), GDP per capita is projected at $42,240 and security sales per capita at $11.50. In China the GDP per capita in 2012 is projected at $6,120, and sales per capita is $2.40 showing that the potential for future growth is enormous. This market has forged ahead at the highest rates of growth recorded in our industry and its aggregate growth over the last five years has not slowed down. However, despite the fact that its penetration has increased by almost 60 percent during this time, its penetration is still only a fraction of that in North America so there is much latent potential still to be exploited.
DEC 2012
www.asmag.com
22 27
VIEWPOINT COMPARISON OF PHYSICAL SECURITY PENETRATION BY MAJOR REGION 2006 & 2012 2012
2006
E.U. (7) 12.08 Product Sales/Capita $USD 39,740 GDP/Capita 11.50 Product Sales/Capita $USD 42,224 GDP/Capita
China 1.53 Product Sales/Capita 4,170 GDP/Capita
North America 14.11 Product Sales/Capita $USD 47,000 GDP/Capita
2.40 Product Sales/Capita $USD 6,120 GDP/Capita
14.81 Product Sales/Capita $USD 49,340 GDP/Capita
Rest of Far East & S.E. Asia 1.90 Product Sales/Capita $USD 9,000 GDP/Capita 2 Product Sales/Capita $USD 9,800 GDP/Capita
In the rest of Asia (including India) the penetration chart shows that this area now has a lower level of penetration than China. There are a number of countries in this group that have large populations such as India, Indonesia, the Philippines and Vietnam, and these countries have dragged down the penetration to $2 per capita. However Japan, Australia, South Korea and Singapore have much higher penetration of security on a parallel to western countries. Countries that have a long term potential to develop their latent potential include India, Thailand, Indonesia and the Philippines. With such high penetrations in the western markets, growth has to come from the opening up of new vertical markets, the migration from analog to IP network systems and continual improvement in delivering a higher ROI.
market ForecaSt to 2017
Our forecast for the next five years to 2017 is based on world market trading conditions remaining fairly static; thereafter gradually growing through the following four years. We forecast a CAGR of 5 percent over the 5-year-period.
28 22
DEC 2012
www.asmag.com
This could be considered rather optimistic, considering that the European market will remain static at best. But since the end of 2007’s economic slowdown, the physical security market still managed to grow by a CAGR of 2 percent within the traumatic 5-year-period. The security industry is now in a much healthier state with a product portfolio that can deliver more attractive opportunities for their clients to improve security. This together with the unstoppable growth of IP video network and access control, coupled with management identification and verification, will drive the market forward. In addition, further growth opportunities are opening up in relatively new vertical markets and the smart building sector where system integrators from the security business are using PSIM and SAP platforms to deliver holistic systems incorporating monitoring building and energy performance in addition to security and safety. In the event that these drivers do not live up to their expectations, we can rely on the BRIC and other emerging markets to continue growing, and the move to cloud based systems. For more details visit the website athttp://memoori.com/physical-security-2012 .
22
Network MaNageMeNt
The Value of Network Assessment, Planning, Design and Execution
Video is critical and it is even more critical to get it right. Bandwidth optimization is not limited to mere tweaks to camera settings. Closer collaboration between IT department, system integrator and surveillance operator is more important than the old days of CCTV. Submitted by Aronson security Group
J
ust a few years ago, an exchange between a CCTV project leader and the IT team would be deemed far-fetched. The reason was that CCTV systems were overwhelmingly analog and in general a DVR was responsible for the recording, so discussions on bandwidth or other IT support was not necessary. That unbelievable exchange, cooperation between CCTV project leaders and IT teams, has now become a reality. Given that IT network teams can — and do — reprioritize bandwidth traffic and other services as demands dictate, adapting to this new reality is more important than ever. It is important to note that despite the fact that IT infrastructures are becoming less expensive (per unit) year after year, this expenditure should not be incurred lightly, especially with the cost of bandwidth over WAN and storage. Today, more than ever, HD/IP-based CCTV projects must be incorporated into an enterprise's IT operational planning model, which includes demand/capacity planning, network operations, configuration and change management and so on. Like any high-technologybased system, IP CCTV systems need to have a fresh (but proven) approach to technology evaluation, systems design, product selection and implementation/installation. More and more IP CCTV projects are being spearheaded with an enterprise’s IT organization. Now, and for the foreseeable future, IP CCTV is predominately a green-field project. With that in mind, the proper selection of the right technology is critical to the successful implementation and ongoing operation of the CCTV system. Therefore, well before the technology is even evaluated, a justifiable and logical IP CCTV
30 22
DEC 2012
www.asmag.com
strategy needs to be in place, and this strategy must be compatible with the IT infrastructure that must support it. Developing an IP CCTV strategy that includes functional and technical requirements as defined in part by the IT organization goes a long way when it comes to navigating between suitable technologies. Of course there are many more possible considerations that can be included in the strategic framework for an IP camera system. The key take-away is to begin the design process with key IT infrastructure people on board. Then, describe and document the technical and
Some key factorS to conSider: Here are a few key factors to consider when developing an initial strategy: • Security risks — describe the security risks that the system is intended to mitigate and also to substantiate the value of the IP CCTV system. • Function — describe what the cameras are intended to achieve. For example, are the cameras intended to provide video verification of an access control system alarm? A key strategy is to match the function to a pre-established design standard already accepted by the enterprise. • Technical — it is important to clarify the critical technical requirements of the system with a team that includes key IT personnel. This must be aligned with the cases, which are the key to the value proposition. Both must be in place in order for the deployment to be considered successful. For example, if you have a corporate VMS standard, then a key technical requirement is to ensure that the cameras are compatible with the VMS.
22
functional requirements to ensure the overall system is well thought out and acceptable before any serious technology evaluations are set in motion.
It is especially important to take an end-to-end, top-to-bottom view of the technology stack and the int eg rat ion requirement s w h en evaluating IP CCTV technology. A simple example; is there the possibility Technology evaluaTion that a single camera will require two Once an IP CCTV strategy is agreed channel licenses instead of one due upon, the next phase is technology to the integration requirements from evaluation. The goal here is quite the VMS to the security platform? simple; use the criteria defined in Knowing the answer to a question like your strategy to begin the process this would certainly help to rein in the of matching potential technologies technology evaluation process and that best suit your application. Many â–˛ William Plante, Director of Professional Services, Aronson possibly even have one rethink their Security Group factors will come into play during the strategy! Video compression and wide evaluation process, such as current standards, network dynamic range (WDR) requirements are also significant limitations and constraints, video storage and archiving, to evaluating technology. Even the seemingly simple cost, application considerations (for example, where will task of ensuring that camera lenses are compatible to the the cameras be used and under what environmental resolution you intend to achieve is an essential considerconditions), network security protocols, technical and ation. A certain degree of flexibility towards alternatives functional integration and rules, and so on. and other options is warranted.
22
DEC 2012
www.asmag.com
22 31
Network MaNageMeNt Keep Technology on poinT
There are many technology solutions that endeavor to address the same problems; bandwidth and storage being two key elements. While it is worthwhile to explore them, prudence is certainly justified before you make such a capital investment. For example, much is being said about the notion of video storage at the camera level and certainly some clever solutions have been derived from this idea (imagine RAID-like redundancy at the camera level). The best advice is to exercise critical judgment and solicit opinions from your technical team. Keep technology “on point” by adhering to the functional and technical requirements — for the most part, this is fail-safe. Many of the same considerations that govern the IP strategy will also govern the system design. Storage and bandwidth utilization and cost considerations are typically the primary design drivers. Especially in large deployments that span across WANs, system designs that employ local storage and use view-on-demand or activity-based event management are becoming more frequent and necessary. Likewise, image characteristics such as frames per second, resolution and so on will also influence the system design. Once again an end-to-end, top-to-bottom system design process is indispensable. Finally, the system’s design may be deeply affected by the network team, who simply may not even permit such a large-scale bandwidth utilizing system to operate on the network. You may be required to design the system to be “out-of-band,” in other words, off of the production network. This calls for additional infrastructure and costs, which may become a critical factor for your strategy. If the strategy as well as the technology evaluation and systems design process were meticulously thought out, then matching products to the system design is, hopefully, a straightforward matter. This is not necessarily “easy,” and you should follow the roadmap you have laid out. Obviously, some system components will be predetermined. Often times, the type of IT infrastructure used to support the CCTV system such as switches, patch panels, cabling and converters must be compliant to IT standards and purchasing agreements may dictate the manufacturer you are required to use. There are some understated considerations that are important to note. For instance, the manufacturer's product management program and service and support model should be as important a decision factor as the capability of the camera itself. No one wants to be stuck
32 22
DEC 2012
www.asmag.com
▲ Storage, bandwidth utilization and cost considerations are typically the primary design drivers.
in a technological cul-de-sac, nor do they want to be frustrated with a manufacturer's underperforming service plan. Personally, I tend to prefer technologies with some proven installations and similar design and intent to the project at hand even if that is not always possible. Again, design and engineering standards help considerably. Lastly, HD/IP-based systems’ implementation and installation share some unique characteristics that also need to be accounted for. For instance, the qualification of the installing vendor, use of fiber optic cable, network gear and developing a network installation plan; these are some of the things that next generation systems integrator should be well versed in. Fiber optic cables and CAT6 cables have different bend tolerances compared to coax, hence the equipment layout needs to accommodate this. Especially important is the ability of the systems integrator to troubleshoot network conflicts collaboratively with the network team. For this reason, a plan that requires post installation network performance monitoring and fine tuning must be ready for execution in order for the implementation to be truly successful. Various industry analysts expect that the adoption of digital video systems will continue to grow and will become the dominant technology in the not-too-distant future. Who drives a CCTV project, how that project will be managed, the kind of technologist that will design the system and the competencies of the installation company are among those elements certain to change. Implementing a structured engineered approach from the technology evaluation process through to project delivery is certainly a guarantor of a successful project.
22
Vertical Market
36 22
DEC 2012
www.asmag.com
22
spon g re n i t n e dau the eing th es at h t i e r t w u n t ara ruc ced s, e fa hile gu infrast system r a s r d b w e o n u t s a ty at d pera s quali goods arious eep-se re o t r s v , he rpo nel re d oce enti y, ai ring pr person ure of t s requi of the rminals a d t n u y t e s, Ever y of ens senger plex na equlatio agemen nts of t e s t e r m i n r a l l o m i a sib ity of p . The c officia ible m w seg nd futu o r x a e g h u e n s l m sec me ti lfilli ically f look at llenge a d fu sa the sses an dynam takes a rent ch d r e s n u c c a & o pr ledge eir s. a tion w th th kno t opera ong wi al or airp cured, e s are s. d tren
t r o p r i A d e r r u o c f e s S inal gs m n r i Te e Land f a S S
By Tevin Wang
erving as a gateway to the world, airports are the most important hubs for passenger and cargo travel between cities, countries and continents. The rapid growth of urbanization means that, sooner or later, existing airports will have to be extended or new airports constructed so to satisfy the ever increasing demand for mobility. How to effectively manage and control security to ensure not only passenger and worker safety, but also national security has always been an issue of paramount importance.
Regional TRends
North America will continue to lead in
22
DEC 2012
investments and remain a substantial part of the global aviation security market. The Visiongain Report expects the emerging APAC market to become a significant aviation security market to watch. According to the report, the Middle East is another key regional market to look out for — owing to the robust growth path of its economy, which is stimulating domestic demand for civil aviation and encouraging greater levels of investments in aviation infrastructure.
aPaC There have been significant developments in airport infrastructures in the APAC region, with the opening of many new airports and expansion of others. According to a Frost & Sullivan report, the APAC airport security market accounts for 12 percent of the total homeland security spending for the region. The report projects that the airport security
www.asmag.com
22 37
Vertical Market
market will grow to US$9.23 billion in 2015. The three major segments of the market are: airport screening, surveillance and access control. Some key markets for airport security growth are: Singapore, Thailand, Hong Kong, China, Malaysia, Indonesia and India. Airport developments and expansions have been aggressively carried out across the APAC region, especially in Thailand, China, Indonesia, Malaysia, Australia and the Philippines. “China and India together have planned to develop and construct at least 93 new airports, in an effort to cater to the fast-growing air traffic demand in the two countries,” said Amartya De, Aerospace & Defense Consultant at Frost & Sullivan. Hong Kong International Airport has a five-year development plan and a 20-year plan, which are renewed every five years. The facility’s Master Plan 2025 includes long-term expansion projects to accommodate increases in passenger and cargo volumes. The sum of security spending will be around $470.5 million. Thailand has also firmed up its own airport-development plans, although only Phuket International Airport and Suvarnabhumi Airport in Bangkok have been identified as candidates for
Rick Ramsay, Senior Product Manager, Avigilon
38 22
DEC 2012
▲ APAC and the Middle East are becoming significant aviation security markets to watch.
development. The security spending is estimated to about $411.3 million. Malaysia is trying to project itself as an aviation hub for low-cost carriers (LCC). A new, dedicated LCC terminal is currently under construction at Kuala Lumpur International Airport, and the security spending will be about $180.6 million. Eyeing to become an air traffic hub in South-East Asia, Vietnam is also looking to develop at least three new international airports and expand seven of its existing terminals starting in 2011 through to 2020. Japan and South Korea will be spending $9 billion to expand the capacity of three major airports. Incheon International Airport has developed into one of the busiest Anthony airports in the Incorvati, Business Development Manager, region and the Transportation, North America, Axis South Korean Communications government has plans to build an airport city to establish itself as a major international business center. Their airport security expenditure is projected to hit $518.4 million.
www.asmag.com
22
Airport security spending in Australia is expected to reach $640.2 million by 2015, and by which time the airport security spending in Singapore will have reached $298 million. The Middle easT Aviation has been earmarked as a key growth area for the Gulf over the next decade. The wider Middle East is forecasted to see 400 million air travelers by 2020, according to IATA data. Despite a worldwide slump, the aviation industry in the Middle East region continues to gain momentum as Gulf states move to position themselves as global travel hubs, according to Khaled Almazroui, GM of Fujairah International Airport. “Gulf nations are set to spend $90 billion on airport development by 2020, almost a third of which will be funneled into security. Of the total $90 billion, about 30 percent will be spent on security equipment and training.” Almazroui said. “To name a few developments, Dubai has allocated $10 billion, Abu Dhabi $6.8 billion, Qatar $11 billion, Jeddah $1.5 billion, Muscat $1.2 billion and Kuwait approximately $2.1 billion.”
assess, Plan and design
Airports are facing several challenges: the efficient and cost-effective management of the increasing numbers of passengers, freights, and baggage; the creation of environmentally friendly solutions and products; plus compliance of rising, multifaceted worldwide security standards. Another obstacle of airport planning is the balancing of conflicting requirements: maximum security and travel experience. “When considering the design approach, as well as the benefits, for check-in counters, airport customs, duty-free shops, entrances, gates, and baggage claim, my way of thinking is straightforward: risk, threat and vulnerability analysis has to be applied,” said William Plante,
Director of Professional Services, Aronson Security Group. “Airports require a common operating picture for an effective and disciplined response. They must identify, organize and communicate data to create that picture. And they must tie their regulatory standards to their operational execution.” Preventive measures such as video surveillance, intruder alarms, access control, biometric identification and X-ray systems are key components to forming the basis of aviation security systems. In addition, fire safety and extinguishing and evacuation systems are also a must. N e t w o r k i n f r a s t r u c t u re a n d sufficient bandwidth play important roles in airport planning. According to Siemens, maintaining smooth
22
DEC 2012
and reliable operations of terminal buildings and equipment is critical to an airport’s viability. Should an incident occur, rapid intervention is a must. Threats have to be identified early and eliminated in a reliable and consistent manner — affecting as few passengers as possible. With that said, it is best to prevent incidents to avoid their occurrence in the first place. Whether it is a suspicious bag, a column of smoke, or unauthorized access — all the various processes must work together to ensure an appropriate level of response. Plante agreed. “Since there are multiple owners and ‘customers’ responsible for airport security, I think the process optimization should be based upon the risk assessment for each distinct area, and that COP
www.asmag.com
22 39
Vertical Market
(Common Operating Picture from a Security Information Management approach) with edge intelligence should be applied.” TeRMinal Zones Security screening begins as soon as passengers arrive inside the terminal, according to Siemens. A fingerprint or 3-D face-recognition scanner records and compares your biometric data, which can also be used to increase security and speed processing at the gate. CheCk-in CounTeRs “Security cameras and CCTV systems are essential to monitoring and scrutinizing suspicious activities, left baggage, abandoned vehicles and other potentially harmful situations,” said Rick Ramsay, Senior Product Manager, Avigilon. Large groups of travelers also indicate traffic bottlenecks. Check-in bottlenecks usually lead to poor passenger experience, increased complexity and potential disruptions. Overcrowded check-in counters also increase mishandled baggage tendency. According to SITA baggage report, mishandled baggage cost the
industry some $3.7 billion per year and this does not include delayed flight costs due to baggage problems, gate parking costs for baggage delayed flights. Intelligent video systems can also be used to detect bottlenecks at check-in. This means airport procedures can be optimized and long waiting periods avoided, according to Siemens. Solutions should be designed to achieve one purpose: to improve the mobility and security of passengers and personnel and at the same time optimize efficiency. To a v o i d p a s s e n g e r f r a u d a t check-in counters, HD quality video should be used. HD makes facial details as well as the information on boarding passes, IDs and passports readily available for cross-referencing, according to Anthony Incorvati, Business Development Manager, Transportation, North America, Axis Communications. Speedier processing at check-in counters translates to higher passenger satisfaction rates, lowered costs, increased revenues and even an increased level of security to give airport operators a competitive edge in this highly dynamic environment.
▲ Check-in bottlenecks usually lead to poor passenger experience, increased complexity and potential disruptions.
40 22
DEC 2012
www.asmag.com
22
aiRPoRT CusToMs Airport customs require high security with detailed monitoring to ensure people that pose a threat are not bypassing protocols or entering secured areas. “In addition, customs officials who do not follow proper procedures can be problematic,” said Ramsay. “Airport security is threatened when these systems are not properly in place.” Applications such as line crossings, wrong-way or loitering detection are mostly deployed for strategic locations such as customs gates and aircraft ramps. VCA is often used from site to site, depending on project requirements. Simple VCA such as motion and object detection can help to spot people who have crossed checkpoints from the non-security side to the secured side, and will issue alarms to notify relevant personnel. In addition, it can also provide evidence to assist with tracking and identifying the intruder. duTy-FRee shoPs Duty-free and other retail shops share and retain the same threats that traditional retail environment face. “Whether shops are located in airports or malls, the potential for theft, false liability and faulty purchases or returns remains,” said Ramsay. “Duty-free shops can benefit from POS integration, to have the capability to spot suspicious activities before they occur and utilize quicksearch features to facilitate investigations.” Typically, these shops are treated as a tenant-based service by the airports. “Airports sell them bandwidth for use in their stores, and then it is up to the stores to purchase their own systems,” said Incorvati. “On top of 'gaining’ all the typical security
Vertical Market
threats that airports experience, the shops must also worry about Loss Prevention initiatives. As in the retail world, these shops are also leveraging analytics and software with their surveillance systems for marketing and operational purposes.” Airports generate revenue through retail operations. Long lines take away the time that travelers have to shop and spend in the commercial areas of the airport. Crowd detection video analysis helps by alerting airport officials whenever crowds or queues exceed certain thresholds. Airport control room operators see the alerts on a map that links to real-time or recorded video. This enables them to immediately know when and where there is overcrowding in order to fix it. enTRanCe gaTes Arriving and departing passengers must not mingle, especially before the arriving passengers are screened. Entrances to gates need to be accessible to the public in case of emergencies. “Potential threats arise when these areas are understaffed o r b l o c k e d f ro m a c c e s s , ” s a i d Ramsay. “Alarms that are linked to pop-up videos to display potentially dangerous situations are essential for ensuring safe gate entrances. Immediate review of such video is the key to ensuring forced doors alarms are inspected. Airlines will benefit from adequate staffing, staff attendance and quick resolution of customer disputes.” Baggage handling and ClaiM Baggage handling is restricted to staff who have authorization to work in close proximity to aircrafts, and this requires access control and screening
42 22
DEC 2012
▲ HD and vandal-resistant cameras are deployed throughout the conveyor belt systems to monitor checked-in baggage.
procedures. Iris recognition can be deployed to manage employees crossing from the landside to airside. Since Sept. 11, the baggage area is fully automated and requires high-level security access rights. Hundreds of HD and vandal-resistant cameras are deployed throughout the conveyor belt systems to monitor checked-in baggage. These vandalresistant cameras are embedded with image tampering analytics that will trigger an alarm when security events occur. Potential security threats in baggage claim areas include baggage theft by airport employees or passengers, passengers collecting incorrect baggage, theft committed by external thieves and people attempting to access secure areas of the airport without permission. HD quality video is helpful for seeing the facial details of thieves as well as offer detailed images of threats. Intelligent surveillance solutions encompass the collection of information from various sensor systems such as video cameras, radars and GPS to facilitate the assessment and evaluation of the activities in a specific area. Video analytics ensures
www.asmag.com
22
that conspicuous or suspicious passenger behavior, abandoned luggage in corridors, lounges or at the gates, check-in and duty free areas can be immediately identified. And it allows necessary measures against drug smuggling, theft and terrorists attacks to be taken at the earliest opportunity possible. According to Siemens, whenever people or vehicles pass through defined security zones, live, real-time video is automatically displayed on a single screen for security personnel’s verification. The signals can be evaluated quickly and securely, and necessary measures can be automatically or manually executed. This represents a considerable cost reduction for airport operators and increased the security for the airport as a whole.
all aBouT The deTails
“In airport security, it is important to be able to zoom in and determine distinguishable details,” said Ramsay. “This will flag potentially hazardous situations and enable security professionals to review pre- and post-incident footage for fast response whether at check-in counters, duty-free shops, gate entrances or
Vertical Market
baggage claim areas. “All of these areas pose unique challenges, which can be overcome by a strategic and intelligently designed HD surveillance system. The key to designing the most effective surveillance system in any situation is to determining what ’evidence’ needs to be captured and developing a security solution based on these needs.” “The best way to determine which camera is most appropriate for each scenario is by using the pixels-per-foot concept,” advised Ramsay. “To do this, we measure the number of pixels being captured by the image sensor and divide it by the horizontal width of the scene covered. By carefully defining what we want to capture and determining the placement of the camera from the target, we can set expectations of the exact detail we will gather. In general, we focus on using higher megapixel cameras to cover larger areas and strategically position these cameras to where they are most beneficial. This allows us to reduce the number of cameras necessary and effectively capture useful footage.”
inTegRaTion and ManageMenT
In airports, it is crucial to implement systems that are created with an open platform and have the ability to work collaboratively. A complete system that unites different aspects of security, such as HD hardware and software, access control, and external alarms, will provide the best surveillance possible. Airports have many islands of information, essentially security systems that are silos, according to Moti Shabtai, VP Security, Nice Systems. “The first benefit of PSIM (Physical Security Information Management) is its ability to tie these
44 22
DEC 2012
▲ Through integration, security control can respond to identified threats in a more efficient and effective manner.
sub-systems together in a cohesive common operating picture. PSIM integrates, synthesizes, and analyzes information and alerts from different security and safety systems.” “The second benefit relates to visualization. Once the dots are connected between these complex sets of information and incidents are revealed, they’re overlaid on a map-based interface — making it easy to get a real-time visual representation of an event and the associated assets and people involved. Everyone involved in the incident share a common understanding of what is going on,” said Shabtai. “Finally, PSIM ensures consistent responses, in keeping with the airport’s pre-defined standard operating procedures. The airport employs a variety of security and life safety systems, including video surveillance, access control, fire alarms, CAD, Voice over IP (VoIP) and automated external defibrillator (AED) alarms. Through the use of PSIM, airports are able to integrate all of these systems into a common operating picture (COP), which allows dispatchers to have access to all of the real-time information they need, in a relevant context, on PSIM screens. PSIM will put forward appropriate response(s) based on
www.asmag.com
22
all of the different indicators; such an adaptive, pre-defined response plan ensures standard operating procedures are followed.”
FuTuRe
According to a Frost & Sullivan report, security spending at airports around the world is expected to increase to over $45 billion by 2018. "High threat perceptions of criminal or terrorists attacks will continue to boost investment in airport security," according to the report. "Regional and global legislations are constantly amended and updated in an attempt to address up-to-date criminal or terrorist activities. This has compelled airport operators worldwide to continually update to the latest security procedures and technological solutions." The integration of security systems is becoming vital for airport security managers. Through integration, security control will become more comprehensive and can respond to identified threats in a more efficient and effective manner. Therefore, technology that can be easily integrated will be in the most competitive position in the procurement process.
Special Feature
2013:
Upheavals in Security With 2012 behind us, the focus is now on the year ahead. A 2013 preview undoubtedly requires a review of 2012. In this section, a&s sums up the storms of the security industry in 2012 and peeks into the prospects of clear skies in the upcoming year.
BY John shi
THE GLOBAL ENVIRONMENT
The global recession in 2008 shook the security industry and shattered the myth that the industry is immune to the ups and downs of the economic environment. The security industry has traditionally been driven by government budgets, and the slashing of government budgets in the U.S. and the E.U. in the aftermath of the recession deeply affected the security industry, as it froze or postponed security projects. With the already matured economies at a standstill, all eyes are on the emerging economics such as the BRICs, the Middle East and Asia.
46 22
DEC 2012
www.asmag.com
22
TIGHT BUDGETS SQUEEZE SECURITY
Tighter budgets correlated with price sensitivity and in turn, price comparisons. The tightening of budgets also coincided with the influx of low-priced Chinese products in the market. Consequently, price turned into a powerful force shaping end-user purchasing behavior and this spread through all market segments rapidly. Cost-effective solutions from major
22
DEC 2012
brands crush the security industry from the top, while low-priced Chinese products do so from the bottom. Together, the two forces affect the entire security industry on all levels, from manufacturers to distributors, system integrators and installers. With no escape from the intensive competition and profitsqueeze, all industry players must face the question of how to survive.
INDUSTRY RESTRUCTURING
In this current market environment, manufacturers are confronted with intense competition, which causes prices to fall and in turn, batters the distribution channels with declining revenues. No industry player is spared from the challenge of how to increase revenues while sustaining profits, and in the survival of the fittest game, companies must adapt to the changing environment. For example, Norbain, a leading security company in the U.K., announced mid-year that they were restructuring. The network that they have established throughout the years fell apart, and their overseas branches became independent entities. A similar scenario is seen in the U.S. — Rainbow CCTV and GVI hung up their white flags. The traditional giants are toppling over in the battlefield, but new giants are rising up at the same time. For example, IT giant Ingram Micro entered the security market in 2009; other IT industry players are also following suit and taking giant strides into the IP security world. In the market today, grim financial circumstances and technological evolution are submerging the companies that are unable to move along with the tides, but at the same
www.asmag.com
22 47
Special Feature
time new competitive companies are emerging with confidence. As the saying goes, heroes are created in times of war. In Southeast Asia, value-added is the buzzword. Sales representatives find that they are required to strengthen their technical support and customer services. For distributors, most are focusing on complete systems to offer comprehensive solutions. They are also shifting towards providing complete product lines to offer end users integration and interoperability. Roles within the industry are also changing. For example, some video surveillance sales representatives are adding access control systems to their products lines in order to increase revenues and profits. At the same time, veteran system integrators are throwing in the towel and becoming distributors of major brands, hoping to cash in on the IP trend.
CHINA
The impact of China as a manufacturing powerhouse is not to be dismissed. To illustrate its impact, a Moscow sales representative’s experience provides a good example. The company concentrated on Korean and Taiwanese products last year, but had to greatly increase the quantity of Chinese products they carry this year. This is because their competitors have begun selling Chinese products, creating a doubleedged sword for them. If they do not follow suit, their sales revenue would be severely affected, but going along with the others provides few rewards. The company complained that 48 22
DEC 2012
Chinese products have a low profit margin and fast-changing product specifications. These products need to be sold as soon as possible or face the fate of clearance sales. Hence, with time, industry players will be squeezed out of the market because it is unprofitable.
THE IP REVOLUTION
In the not too distant future, IP will extend its lead over analog in the market. According to IMS Research (an IHS company), Axis Communications, a company that specializes solely in IP cameras, has risen to become the No.1 vendor in the global camera market. T h e re i g n i n g p o s i t i o n o f A x i s demonstrated the rapid pace of the changing tides in the security industry. IP technology is maturing quickly and intensifying competition amongst vendors. At 2011 Secutech Taipei, IP cameras from both large and small manufacturers were compared and tested. At that time, IP camera specifications between the manufacturers varied greatly. Results of conformance to the ONVIF specification were equally disappointing. Fast forward to April 2012 and the
second IP camera testing event, the manufacturers were able to showcase cameras that were consistent in specifications. Also, it was discovered that there was a similarity of up to 80 percent between the cameras in image quality and conformance to ONVIF. This maturation has occurred within the time span of a year and should serve as a strong signal for the video surveillance industry — it is telling the industry that IP cameras will now be differentiated by brands, marketing and customer service, and in 2013, price as well.
CLOUD COMPUTING
The maturation of IP applications coupled with the maturation of cloud computing is propelling the concept of security as a service.
Tighter budgets correlated with price sensitivity and in turn, price comparisms. Price turned into a powerful force shaping end-user purchasing behavior.
www.asmag.com
22
Special Feature
Both providers and end users can expect to benefit from this combination. First, end users no longer have to invest large amounts in infrastructure and maintenance because they can now subscribe m o n t h l y t o m o re re l i a b l e a n d consistent services. Second, service providers can now enjoy more stable revenues with monthly subscription fees.
HOME SECURITY HAS HIGH POTENTIAL
The high penetration of smart devices in the society today allows everyone to have a remote monitoring device on hand. As humans are visual beings, the maturation of this technology has potential for fast growth. Home owners can keep a watchful eye on their homes, and business owners can maintain a grasp on their operations. Demand for home security is also changing the industry. Buyers from this industry would be telecos and security service providers. In the future, IP cameras are also likely to be distributed through the warehouse store channels to cater to the general market. Four channel DVRs and NVRs will likely be replaced by this trend, thus transforming end-user applications in the market.
SMART ACCESS CONTROL
Wi t h t h e s e c u r i t y i n d u s t r y migrating to IP, access control is riding along with the waves. Wireless electronic locks and NFC stand out as noteworthy trends in this segment. Firstly, the wireless feature enables easy and fast installation. Secondly, it provides flexibility in access grants, while ensuring security for end users 50 22
DEC 2012
â–˛ Restructuring is inevitable if the industry is to move forward.
that require constant changes in access provisions. Thirdly, this new technology is convenient because access control can be managed and updated remotely via software in accordance to requirements. Mobile access control is made possible with the high market penetration of smartphones. NFC enabled smartphones can now receive access control credentials over-the-air in this innovative application. When innovative technologies are introduced into security, industry players stand out when they can provide end users with creative applications that are more convenient, efficient and secure.
BIOMETRICS
Biometrics is another segment witnessing new, exciting applications. An access control company based in Hong Kong, for example, found a way to address safety issues in the event of explosion accidents at mining sites in China. During such an event, it is imperative that the local government and insurance companies have a grasp of how many people are hurt, missing or trapped underground, but this has been difficult in the past. Biometric access control systems, however, allows management to have a
www.asmag.com
22
grasp of the number and identities of employees working on-site and underground at all times.
HD-SDI EXPECTS TO SEE GROWTH
In 2013, HD-SDI can expect advancements in transmission and storage technology. More competitive prices can also be expected with the technological breakthroughs. This will make HD-SDI more attractive to end users and encourage rapid adoption of this technology in various market segments.
COUNTDOWN TO CLEAR SKIES
Despite the general economic uncertainty, excess supply versus demand and the influx of Chinese products, the 2013 market remains worth anticipating for. However, in the current economic climate, restructuring is inevitable if the industry is to move forward. At the same time, value-added is a significant trend in the security industry, and companies are racing to add value to their products in the search for higher profits. The past year has been rough for some but resilience will pay off; spring will come when the new market order falls into place.
22
AUG 2011
www.asmag.com
22 93
Storage AcAdemy
Submitted by Seagate
Storage Capacity:
A Central Part of Today’s Surveillance Landscape As storage capacity demand increases over 50 percent every year, the need for fast, high-capacity and reliable storage solutions is clear. But can the hard drive industry keep up with burgeoning storage demands, particularly from the surveillance market?
A
ccording to estimates from Seagate, it would take over 18 million TB of storage to support currently deployed surveillance cameras for a 14-day recording period. The number of hard drives required for this storage capacity would stretch across China twice if laid end to end! These statistics underscore the staggering growth of surveillance and storage technologies over the past 15 years. Increased capacities, improved performance and lowered costs in storage technology are driving growth in global camera shipments. Research firm In-Stat forecasts over 51 million camera shipments by 2014. Furthermore, IMS Research expects more than 70 percent of network cameras will be megapixel resolution by 2015, requiring at least four times the amount of storage than analog cameras used today. For the storage industry, more cameras plus higher resolutions equal increased storage needs. To m e e t g r o w i n g storage demands, drive manufacturers must maintain data integrity while improving areal density. Breakthroughs in track density — how closely tracks of data are arranged on a drive — are becoming
particularly important stepping stones toward increased capacities. For example, Seagate ® SV35 Series™ hard drives now have up to 3TB of capacity — enabling up to 42 days of high-quality video recording (1,280x1,024 frame resolution, 30 fps, H.264 compressed video) and making them ideal for SDVR configurations with multiple camera inputs. SV35 Series drives boast 340,000 tracks per inch, making each track only 75 nanometers wide — smaller than a single flu virus. Seagate also leveraged this technology on their Pipeline HD ® video-optimized drives and Constellation ® ES enterprise drives to help surveillance systems meet capacity needs. Pipeline HD drives support low camera counts and power requirements and can be found in capacities up to 2TB. Surveillance users who demand high camera counts and centralized storage may benefit from Constellation ES drives. With capacities up to 4TB, these enterprise-class drives ensure performance and reliability for centralized storage. The surveillance industry continues to grow at astounding rates, as do its storage demands. As hard drive manufacturers develop technologies to maximize data capacity, surveillance systems will continue to provide security around the world. Undoubtedly, storage will remain a critical element of these surveillance solutions. For more information, please visit http://www.seagate.com/internal-hard-drives/ consumer-electronics/sv35/?cmpid=ctc-_-AS-Oct12.
“Changing Digital Storage Requirements for Clouds and Mobile Devices.” Tom Coughlin, Forbes.com, June 17, 2011. In-Depth Analysis Video Surveillance: Analog and IP Cameras, DVRs, NVRs, Analytics, Semiconductor and Technology, In-Stat, January 2011. 3 “The World Market for CCTV and Video Surveillance Equipment—2011 Edition.” IMS Research, 2011. 4 “The Advantages of Megapixel.” Supercircuits, Inc., 2012. 5 “Purpose-Built Hard Drives for Digital Video Surveillance.” Seagate Technology LLC, 2012. 1 2
22
DEC 2012
www.asmag.com
22 95
24-26 April, 2013 Taipei Nangang Exhibition Center, Taiwan
From Components, Products to Applications, Discover Every Aspect of HD Surveillance Is it right for me? IP Megapixel or HD SDI?
How to integrate IP and HD SDI? What is HD SDI?
How to choose the right solution?
Can it meet my budget plan? Is there any hidden agenda/cost?
How to upgrade current system with HD SDI products?
World’s grand showcase of HD surveillance! • 500+ HD manufacturers • 2000+ kinds of HD new launches • In-depth technology and application talks • Latest and diversified solutions
HD Surveillance
IP Megapixel
Seminar:
Cloud Computing
Technology
Product Contest:
2013 IP Camera/ NVR Excellence Award
Product
Special Section:
HD SDI
Seminar:
Over 100-meter transmission
Value-added Designs
Product Demo:
HD SDI Camera/ DVR Live Demo
Application
Like us
The Integration of IP Surveillance, Access Control, and Others
Search us
Email us
Product Contest:
2013 960H Camera/DVR Excellence Award
Special Section:
Vehicle Security Gallery
Forum:
Forum:
Forum:
More Options
Seminar:
VSaaS & Home Security Gallery 2013 2012
960H
Real-life Case Stories of HD SDI Surveillance
Phone us
Management Software Forum for VMS and IVS
Contact us: lois.lee@newera.messefrankfurt.com; +886-2-2659 9080 Ext. 358
Zoom in on HD-SDI at Secutech !
Awareness of HD-SDI has been growing since its inception in 2009. Market penetration, however, has been less than stellar, due to component/system availability, pricing structure and deliverability issues. Luckily, a number of dedicated chipset and solution providers have been working tirelessly to offer more affordable packages that address compatibility, transmission, storage and display challenges. One of the vertical segments that would particularly benefit from this technology is financial/banking, which has extensive proprietary analog infrastructure and above-average HD requirements. As such, Secutech will host the world’s largest HD-SDI pavilion in April 24-26 2013, featuring the industry’s first live demo of HD-SDI solutions in a simulated bank environment. Take a sneak peek at what’s on offer at this exciting event now!
SJ MICROTECH-SJD210B83NDT SJ M icrote ch’s presen ts the new HD -SDI camer a, SJD210 B83NDT, featuri ng high quality 1,100 TV lines progressive scan. Empowered by 1/3” 2.2 megapixel CMOS sensor, SJD210B83NDT provides full HD quality @1080p and 720p. Auto WDR and DSS (Digital Slow Shutter) function allow the camera to achieve great result in low light. The advanced 3D DNR technology make sure good quality in a lower lighting level, with minimum illumination of color 1.0Lus (DSS off). SJD210 B83ND T comes with variou s WB mode (auto, one pushing and manual), resolving color problems and ensure whites comes out white. Various digital features — includ ing motion detect ion, mirror, flip, D-zoom , privacy masking, shading and others — meet monitoring requirements. Equipped with 2.8~12mm TDN DC auto iris lens, SJD210B83NDT is also weatherproof (IP-66).
Booth No. : L908 andy@sjmicrotech.co.kr
Ronix-RWS-AFZ39SP-IR Roni x, the fron tier com pany in vide o tech nolo gy, is a mem ber of HD CC T V ALLIANCE. The company introduced its latest HD-SDI camera, RWS-AFZ39SP-IR, providing advanced megapixel resolution with auto focus zoom capability. The camera achieves high quality picture and its advanced color reproducibility deserves attention. Standing out from othe rs, the new HD-S DI came ra equipped with patented FOCUS setting Aid, Day & Night simulation, supporting NEEDLE FOCU S, and make s sure error free focu s adjustment. Moreover, Ronix’s developed its own Optic Transmission Repeater, allowing transmission distance of 10km.
Booth No. : M709 ronix@ronix-inc.com
Register now at www.secutech.com or Secutech APP!
24-26 April, 2013 Taipei Nangang Exhibition Center, Taiwan
Zoom in on HD-SDI at Secutech ! AVICO AVIR-HDX3VAHD Avico's new HD-SD I camera , AVIR-H DX3VA HD, features full HD resolution with 3-times optical zoom lens, day and night (ICR) function. AVIR-HDX3VAHD also features wide dynamic range and digital noise reduction (2D+3D) technology, making sure quality image in changing light condition. Moreover, digital Slow Shutter(DSS), and High Light Compensation(HLC) function help camera to work under intense light and reverse bright spots in the picture. Privacy mask and defog function prevent sabotage and enable the clear vision. On screen display and intellig ent motion detecti on help increas e user experience. VISCA, Pelco-D, Pelco-P protocols are also available to suit installation needs.
Booth No. : L908 avico@avico.co.kr
HDPRO HD-MP138VTL pixel HDPRO launched a new series of HD-SDI Mega ra. Came IR roof Dome and true Day & Night Weather-P ras, We are proud to bring you our latest HD-SDI came onic Panas ch featured here.This model integrates 1/3-in HDProgressive Scan color sensors which offer 1080P dual as well quality pictures at 30frames per second, as and output. Users will see vivid HD-quality images receive great performance. noise Our cameras also boast defogging functions, no s ution thanks to their DNR features and high resol l HDwith their 64 times digital zoom. The new mode True MP138VTL incorporates 2.8 to 10mm DC AI VF. s day and night with ICR and 28pcs IR LEDs allow Full . camera deliver uncompromised image at night We OSD operation improves user friendliness as well. our are confident your customers will be satisfied with ns. products’ powerful performance and unique desig
Booth No. : N709 sales1@hdprocctv.com
Register now at www.secutech.com or Secutech APP!
MICRODIGITAL MDC-H6290VTD-32 U
MDC-H6290VTD-32U is 2.1 Mega Pixe l UTC (Up The Coa x) HD- SDI Cam era. The differen ce com pare d to normal HD-SDI Camera is that a user can control focus, focal length and OSD through a single coax cable by a remote controller for the ease of setup whenever it’s needed. MDC-H6290VTD-32U provides a crys tal clear picture quality with powerful features such as True Day & Night, Dual Video Output (HD-SDI & CVBS) , WDR, BLC and ACE as well. Microdigital has launched various types of UTC HDSDI Camera already.
Booth No. : L663 randy@microdigital.co.kr
Sicam SCL-H159L camera Sicam launched a series of HD-SDI Cameras with Panasonic 2.1 Mega CMOS and Eynix DSP, with a full line-up of HD-SDI cameras including IR bullet, IR dome, Miniature, Box camera and many others. Sicam’s HD-SDI Camera consists of High-End and Cost-Effective features to suit customers’ needs and budget. Manufacturing process and R&D are undertaken in house. function. Sicam's SCL-H159L is special designed by stability and enhanced Day & Night due to using junction box. Above all, IR Distance is available for Max. 100M and it is very easy installation 1mm to f=5~50mm and it has a For customer needs, The many kinds of lens is avilable for using from f=2.8~1 various option such as Heter and Fan built-in.
Booth No. : L819 kdlee@sicam.co.kr
SHOW CALENDAR
WORLD SECURITY EXHIBITION DIRECTORY November 2012 – June 2013
• Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. • Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx .
URL: www.expoprotection.com
IFSEC India Date: 2012/11/1-11/3 Venue: India Expo Centre, Greater Noida, India Tel: +91-11-2376-5553 Email: pankaj.jain@ubm.com URL: www.ifsecindia.com
Sicurezza 2012 Date: 2012/11/7-11/9 Venue: Fiera Milano (Rho), Milan, Italy Tel: +39-02-4997-6255 Fax: +39-02-4997-6252 Email: areatecnica1@fieramilano.it URL: www.sicurezza.it/en
Security Asia-International Exhibition 2012 Date: 2012/11/7-11/9 Venue: Singapore Expo, Hall 2, Singapore Tel: +65-6285-3088 Email: derick@globale2c.com.sg URL: www.saeshow.com
MEFSEC 2012 Date: 2012/12/1-12/4 Venue: Cairo International Convention Center, Cairo, Egypt Tel: +202-2735-5837 Fax: +202-2735-8801 Email: egytec@egytec.com URL: http://www.mefsec-middleeast.com
Security China 2012 Date: 2012/12/3-12/6 Venue: China International Exhibition Center (New Center), Beijing, China Tel: +86-10-5192-0615 Fax: +86-10-5192-0049 Email: international@bizcspia.com URL: www.securitychina.com.cn
Expoprotection Date: 2012/12/4-12/7 Venue: Paris Porte de Versailles, Paris, France Tel: +33-4756-5045 Email: patricia.jacquot@reedexpo.fr
102 22
DEC 2012
Security Show 2013
IFSEC & OSH Arabia 2012 Date: 2012/12/9-12/11 Venue: Riyadh International Conference and Exhibition Centre (RICEC), Riyadh, Saudi Arabia Tel: +44-20-7921-8069 Email: charlie.cracknell@ubm.com URL: www.ifsecarabia.com
Date: 2013/3/5-3/8 Venue: Tokyo Big Sight, Tokyo, Japan Tel: +81-3-3512-5670 Fax: +81-3-3512-5680 Email: tradefairs2012@smj.co.jp URL: www.shopbiz.jp/en/ss
ISC West 2013
Intersec 2013 Date: 2013/1/15-1/17 Venue: Dubai International Convention and Exhibition Centre, Dubai, UAE Tel: +971-4-389-4500 Fax: +971-4-358-5511 Email: intersec@uae.messefrankfurt.com URL: www.intersecexpo.com
Security and Safety Technologies 2013 Date: 2013/2/12-2/15 Venue: Crocus Expo, Moscow, Russia Tel: +7-647-0402 Fax: +7-221-0862 Email: inshakova@groteck.ru URL: www.eng.tbforum.ru
Safe Secure Pakistan Date: 2013/2/26-2/28 Venue: Karachi Expo Centre, Islamabad, Pakistan Tel: +92-21-111-734-266 Fax: +92-21-324-10723 Email: info@safesecurepakistan.com URL: www.safesecurepakistan.com
Secutech India Date: 2013/2/28-3/2 Venue: MMRDA Grounds, Bandra Kurla Complex, Mumbai, India Tel: +886-2-2659-9080 ext. 770 Fax: +886-2-2659-9069 Email: stid@newera.messefrankfurt.com URL: www.secutechindia.co.in
www.asmag.com
Date: 2013/4/10-4/12 Venue: Sands Convention Center, Las Vegas, NV, U.S. Tel: +1-203-840-5602 Fax: +1-203-840-9965 Email: inquiry@isc.reedexpo.com URL: www.iscwest.com
Secutech International 2013 Date: 2013/4/24-4/26 Venue: Taipei World Trade Center Nangang Exhibition Hall, Taipei, Taiwan Tel: +886-2-2659-9080 ext. 777 Email: veronica.chen@newera. messefrankfurt.com URL: www.secutech.com
IFSEC International 2013 Date: 2013/5/13-5/16 Venue: National Exhibition Center, Birmingham, United Kingdom Tel: +44-20-7921-8057 Email: kristan.johnstone@ubm.com URL: www.ifsec.co.uk
EXPOSEC 2013 Date: 2013/5/14-5/16 Venue: Centro de Exposições Imigrantes, Sao Paulo, Brazil Tel: +55-11-5585-4355 Fax: +55-11-5585-4359 Email: lccipa@cipanet.com.br URL: www.exposec.tmp.br
ISSE 2013 Date: 2013/5/21-5/24 Venue: All-Russian Exhibition Center,
22
Moscow, Russia Tel: +7-495-9374081 ext. 242 Email: isse@b95.ru URL: www.isse-russia.ru
Indo Security Expo & Forum 2013 Date: 2013/5/29-5/31 Venue: Jakarta International Expo, Jakarta, Indonesia Tel: +62-21-8644756/85 Fax: +61-21-8650963 Email: info@indosecurity.com URL: www.indosecurity.com
Safety & Security Amsterdam 2013 Date: 2013/6/4-6/6 Venue: Amsterdam RAI, Amsterdam, The Netherlands Tel: +31-20- 549-1212 Fax: +31-20-549-1843 Email: ssa@rai.nl URL: www.safetysecurityamsterdam.nl
Security Canada West 2013 Date: 2012/6/12 Venue: River Rock Casino Resort, Richmond, Canada Tel: +1-905-5130622 Fax: +1-905-5130624 Email: staff@canasa.org URL: www.securitycanadaexpo.com
IFSEC South Africa 2013 Date: 2013/6/18-6/20 Venue: Gallagher Convention Center, Johannesburg, South Africa Tel: +27-11-8351565 Fax: +27-11-4961161 Email: info@gallagher.co.za URL: www.ifsecsa.com
Electronic Security Expo 2013 Date: 2013/6/24-6/28 Venue: Nashville Convention Center, Nashville, TN, U.S. Tel: +1 -508-618-4225 Email: nfranco@ae-ventures.com URL: www.esxweb.com
Expertise in security exhibitions worldwide.
International Security Expo
International Security Expo 24-26 April 2013 Taipei,Taiwan www.secutech.com
28 Feb.-2 March 2013 Mumbai,India www.secutechindia.co.in
3-5 July 2013 Bangkok,Thailand www.secutechthailand.com
8-10 August 2013 Ho Chi Minh City,Vietnam www.secutechvietnam.com
15-17 January 2013 Dubai,UAE www.intersecexpo.com
15-17 August 2012 Buenos Aires,Argentina www.intersecbuenosaires.com.ar
5 -7 June 2013 Buenos Aires,Argentina www.seguriexpo.com
Companies in This Issue Viewpoint • MEMOORI BUSINESS INTELLIGENCE
Network Management • ARONSON SECURITY GROUP
Vertical Market • ARONSON SECURITY GROUP • AVIGILON • AXIS COMMUNICATIONS • SIEMENS BUILDING SOLUTIONS
Special Feature • ABUS SECURITY-CENTER
• ADEMCO (FAR EAST) • ASP (GRUNDIG SECURITY) • AXIS COMMUNICATIONS • BOSCH SECURITY SYSTEMS • CDVI • CNL SOFTWARE • ENSEC SOLUTIONS • GENETEC • GEUTEBRUCK • HID GLOBAL • INTELLIGENT SECURITY SYSTEMS • KABA • KINTRONICS • MILESTONE SYSTEMS • NADAP SECURITY MANAGEMENT • RSI VIDEO TECHNOLOGIES
Next Issue
Product Exploration
Special Feature
Access Control Management
License Plate Recognition
Vertical Market Industrial
110 22
DEC 2012
• SAMSUNG TECHWIN • SECURITY PRODUCTS FROM SIEMENS • SIEMENS BUILDING TECHONOLOGIES • SISTEMAS INTEGRALES DE AUTOMATIZACION • SPARSH • T.M. BIER & ASSOCIATES • TRANSECURE • TYCO INTERNATIONAL • TYCO SECURITY PRODUCTS • VERINT SYSTEMS • XTRALIS • ZICOM ELECTRONIC SECURITY SOLUTIONS
www.asmag.com
22