A&S #A133 FEB.2017

Page 1


CONTENTS

a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.

MARKET DYNAMICS

Investments Growth

Drive Security in Cambodia, Myanmar and Laos

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher Editorial

P.22

General Press Jill Lai Alf Chang William Pao Lisa Hsu Emily Lin Ryan Liu Prasanth Aby Thomas

Editor-in-Chief Senior Consultant Reporter Reporter Editor Reporter Reporter

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com ryan.liu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com

Art Design

Gaven Lee Executive Designer gaven.lee@newera.messefrankfurt.com Mao Chang Senior Designer mao.chang@newera.messefrankfurt.com Tzu-Yin Chien Designer tzuyin.chien@newera.messefrankfurt.com Circulation

Michelle Shih Officer

michelle.shih@newera.messefrankfurt.com

Corporate Management

Collins Yuan Group Manager collins.yuan@newera.messefrankfurt.com Thomas Pin Account Manager thomas.pin@newera.messefrankfurt.com

asmag.com

Chihung Lee Manager 10101101010111010 10101010101010110101011101010101010101010110101011101010101 0101 01010110 010101010101101010111010101

Peggy Wu Veronica Chen Jason Cheng Crystal Chen

10101010101 1010111010101

010101011010101110101001

0101010101011010101110101010101

Trade Fair Manager Group Manager Project Manager Assisant Project Manager

10101011101010101010101010110101011101010101010 1010101101010111010101010101010101101010111010101010101010101 1 01010111010101010101010101101010111010101010101010101 101010111010101010101010101101010111010101010101010101101010111010101010 101010101101010111010101010101010101101010111010101010101 10101101010111010 10101010101010110101011101010101010101010110101011101010101 101010101010101101010111010101 0101[Headquarters] 01010101010110101011101010101010101010110101011101010101010 010101010101101010111010101 01010110 Israel Gogol Manager 10101011 01010111010101010101010101101010111010101010101010101101010 10110101011101010 0101010101011010101110101010101 Audrey Fang Officer 11101010101010101010110101011101010101010101010110101011101 01 01010101010 10101011101010101010101010110101011101010101010 101011010101110101 1010101101010111010101010101010101101010111010101010101010101 01010101010 01010101010101011010 1 [Branches & Representatives] 10 01010111010101010101010101101010111010101010101010101 11101010101010101010110101011101010101010101010110101011101 101010111010101010101010101101010111010101010101010101101010111010101010 Carolina Pattuelli Europe (Italy) 010101 101010101101010111010101010101010101101010111010101010101 10101101010111010 10101010101010110101011101010101010101010110101011101010101 Evris Consolos Europe (U.K.) 0101011 0101 1101010 10101101010111010 101010101010101101010111010101 01010110 010101010101101010111010101 Adis Hodzic Southeast Europe 101010101010110101011101010 10101010101010110101011101010101010101010110101011101010101 01010101010110101011101010101010101010110101011101010101010 1010101010101101010111010101010101010101 0101 10101011 0101010101011010101110101010101 10110101011101010 Manish Gandhi India 101 0101011001010111010101010101010101101010111010101010101010101101010 010101010101101010111010101 01 0101110101010101010 101011010101110101010101010101011 11101010101010101010110101011101010101010101010110101011101 10101011101010101010101010110101011101010101010 Iris Lai Taiwan 010101110101010 0101010101011010101110101010101 10110101011101010 01010101010 1010101101010111010101010101010101101010111010101010101010101 01 1 101011010101110101 Cliff Kang China 10101011101010101010101010110101011101010101010 1010101010110101011101010101010101010110101 0111010101010101010101101010 01010101010 01010101010101011010 0101011101010 1010101010101101010111010101010101010101 11101010101010101010110101011101010101010 10101011010101110101 10101011010101110101010101010101011 01010101010101101010111010101010101010101 101010111010101010101010101101010111 010101010101010101101010111010101010 10 Y. C. Suh Korea 1 010101110101010101010101 11101010101010101010110101011101010101010101010110101011101 101010101101010111010101010101010101101010111010101010101 01010111010101010101010101101010111010101010101010101 010101 Takashi Komori Japan 101010111010101010101010101101010111010101010101010101101010111010101010 1010101011010101110 10101010101010101101010111010101010101010101101010111010101 101010101101010111010101010101010101101010111010101010101 0101011 101010101010101101010111010101 Nguyen Thu Ha Vietnam 0101 010111010101010101010101101010111010 1101010 01010101010110101011101010101010101010110101011101010101010 101010 10101011 101010101010110101011101010 Ekaterina Shapovalova Russia 1010101011010101 101010101010101101010111010101 10101010101101 1010101010101101010111010101010101010101 01010111010101010101010101101010111010101010101010101101010 01010101010110101011101010101010101010110101011101010101010 010111010101010 101 11101010101010101010110101011101010101010101010110101011101 Mariusz Kucharski Poland 101010101101010111010101010101010101101010 10101011 01011 10101010101010101011010101110101010101010101011 01010101010 01010111010101010101010101101010111010101010101010101101010 1110101010101 010101110101010 101011010101110101 11101010101010101010110101011101010101010101010110101011101 01010101101 01010101010 01010101010101011010 01011101010101010101010110101011101010101010101010110101011 01010101010 1010101010110101011101010101010101010110101 0111010101010101010101101010 10 1010101010101010101101010111010101010101 101011010101110101 11101010101010101010110101011101010101010 10101011010101110101010101010101011 11101010101010101010110101011101010101010101010110101011101 01010110101 01010101010 01110101010101010101011010101110101010101010 01010101010101011010 010101110101010101010101 010101 10101101010111010101010101010101101010111010101 10 11101010101010101010110101011101010101010101010110101011101 01 1010101011010101110 0101011 010101 10101010101010101101010111010101010101010101101010111010101 1101010 101110101010101010101011010101110101 0101 010111010101010101010101101010111010 101010101010110101011101010 01010101010101101010111010101010101010101101010111010101010 0101011 101010 1010101010101101010111010101010101010101 101010101101010111010 1101010 1010101011010101 10101010101101 101 101010101010110101011101010 010111010101010 0101110101010101010101011010101110101010101010101011 1010101010101101010111010101010101010101 101010101101010111010101010101010101101010 010101110101010 101 1110101010101 010111010101010110101011101010101010101010110101 10101010101010101011010101110101010101010101011 01010101101 0111010101010101010101101010 010101110101010 01011101010101010101010110101011101010101010101010110101011 11101010101010101010110101011101010101010 10101011010101110101010101010101011 1010101010101010101101010111010101010101 010101110101010101010101 1010101010110101011101010101010101010110101 0111010101010101010101101010 0101011010101110101010101010101011010101110101010101010 11101010101010101010110101011101010101010 01110101010101010101011010101110101 10101011010101110101010101010101011 10101101010111010101010101010101101010111010101 1010101011010101110 01010101010101101010111010101010101010101101010111010101010 010101110101010101010101 01 10101010101010101101010111010101010101010101101010111010101 101010101101010111010101010101 0101 010111010101010101010101101010111010 01010101010101011010101110101010101 1010101011010101110 101110101010101010101011010101110101 101010 010101011010 10101010101010101101010111010101010101010101101010111010101 10111010101010101010101101010111010101010101010101101010111010101010101010101 10 01010101010101101010111010101010101010101101010111010101010 1010101011010101 10101010101101 1 0101 010111010101010101010101101010111010 101010101101010111010 010111010101010 101010 101010101101010111010101010101010101101010 1010101011010101 10101010101101 1110101010101 010111010101010 01010101101 101010101101010111010101010101010101101010 01011101010101010101010110101011101010101010101010110101011 1110101010101 1010101010101010101101010111010101010101 01010101101 0101011010101110101010101010101011010101110101010101010 01011101010101010101010110101011101010101010101010110101011 10101101010111010101010101010101101010111010101 1010101010101010101101010111010101010101 01110101010101010101011010101110101 01 01010110101 01110101010101010101011010101110101010101010 01010101010101101010111010101010101010101101010111010101010 10101101010111010101010101010101101010111010101 101010101101010111010101010101 101110101010101010101011010101110101 01 01010101010101011010101110101010101 01010101010101101010111010101010101010101101010111010101010 0101010110101011101010101010101010110101011101010101010101010110101011101010101010101010110 101010101101010111010 101110101010101010101011010101110101 1 01010101010101101010111010101010101010101101010111010101010 101010101101010111010

Asia is becoming the new land of opportunities with many of the countries experi0 1010110101011101010101010101010110 encing significant growth. Myanmar, Cambodia and Laos are part1010111010101010101010101101010111 of this growth as 010 1010111010101 01010 each country is experiencing an increase in investments.

chihung.lee@newera.messefrankfurt.com

Secutech

peggy.wu@newera.messefrankfurt.com veronica.chen@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com crystal.chen@newera.messefrankfurt.com

International Advertising

10101010101

israel.gogol@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

10110101011101

01010101 011

0 1010110101011101010101010101010110

1010111010101010101010101101010111 10101010101010101011010101 010 1010111010101 1010111010101 01010 01010 10110101011101

10101010101 10101010101 PRODUCT EXPLORATION

01101010111 01010101 0 01010101 011

0 1010110101011101010101010101010110 1010111010101010101010101101010111 0 010 1010110101011101010101010101010110 01010101101 10101010101010101011010101 1010111010101010101010101101010111 110101010 010

IP-Based PA and Intercom to Conquer 01101010111 01010101 01010101 010 0 011 01010101 10 101010110 Security 01010110101011 ............................48 011 101010101

Dear Mr. Welcome to Smart Hotel. The temperature in your room has been set to your preferred 26ºC. You have a voice message left from five minutes ago. For your 19:00 dinner reservation, we’ve already reserved your favorite seat. Your reference number is 0288. Finally, thanks for choosing Smart Hotel, and we wish you a pleasant stay.

produzione@ethosmedia.it evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn shapovalovey@ru-bezh.ru mariusz.kucharski@aspolska.pl

10110101011101 10110101011101

Best Regards, Smart Hotel delete

10101010101010101011010101 01010101101 10101010101010101011010101 110101010

101010

1010101010 Compared to10 video and access 11010101110101010 10101 0 1010 01101010111 control, public address and 01010101 Messe Frankfurt New Era Business Media Ltd. 110101 (PA) 0 01101010111 010101 010 Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City intercom systems often10 get01010101 less 101010110 01010101101 10101011101 0 11087, Taiwan 110101010 01010101101 attention. 101010101 Phone/886 2 8729 1099 01010110101011

101010 Fax/886 2 2747 6617 1010101010 1011010101110101010 10101 0 Website/www.newera.tw.messefrankfurt.com 1010 110101 101010110 010 Messe Frankfurt New Era Business Media Ltd., a company formed by Messe 010101 Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media 10 010 10101011101 service provider in the security industry. Our service covers magazines, 101010110 101010101 10 01010110101011 websites, events, and trade shows. The portfolio of a&s magazines includes 101010 101010101 1010101010 a&s International, a&s Asia (above published in English), a&s China, a&s 01010110101011 1011010101110101010 10101 101010 0 Intelligent System, and a&s Taiwan (above published in Chinese). a&s Adria, 1010101010 1010 1101010111010101010101 10 India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are 0 a&s 110101 1010 010101 licensed editions. 110101 10101011101 010101 110101010

February 2017 ● www.asmag.com

VERTICAL SOLUTION

P. 28

Time for Hotels to Smarten Up With IoT and Big Data Hospitality is a booming industry across the globe. Yet in the midst of this boom, competition has become more intense. 8

01110101010101010101011010101110101 01010101010101101010111010101010101010101101010111010101010 101010101101010111010101010101 01110101010101010101011010101110101 01010101010101011010101110101010101 01010101010101101010111010101010101010101101010111010101010 0101010110101011101010101010101010110101011101010101010101010110101011101010101010101010110 101010101101010111010101010101 1 01010101010101011010101110101010101 0101010110101011101010101010101010110101011101010101010101010110101011101010101010101010110 1

10101011101

For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com

Copyright© 2017 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices


EDITOR’S NOTE Finding Opportunities in Smart City Development Cities are pursuing their goal of becoming “smarter” in order to modernize their municipal development in the next five to 10 years. Through aggregating multiple data and integrating systems, the cities are able to construct a better living environment for their citizens. In a smart city, “connectivity”, “convenience,” and “mobility” are key features which draw a great deal of attention. What opportunities and benefits can security companies possibly grasp from this latest development in smart cities? In the Middle East and Asia, such as Thailand and India, cities are also planning smart cities initiatives, in which security and safety play important roles due to their particular market demand. It can be predicted that security technologies, like video surveillance, can be greatly beneficial to their smart city projects. The National League of Cities (NLC) released a white paper not long ago that also pointed out the relevance between smart city development and the security industry, “... the smart city of the future can be safer with streetlight networks that use embedded sensors to detect gunshots or flash their lights during emergencies — and the further integration of these systems will allow cities to collect information from sources such as smart water, electric and gas meters.” Based on the example presented above, I would like to suggest security companies should closely look at the latest smart city developments and work on smart solutions to grasp future opportunities.

KEEP IN TOUCH WITH...

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal

EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

EDITORIAL TEAM

February 2017 ● www.asmag.com

REPORTER WILLIAM PAO

REPORTER LISA HSU

EDITOR EMILY LIN

REPORTER RYAN LIU

REPORTER PRASANTH ABY THOMAS

In a recent smart city expo held in Taipei, solutions providers demonstrated how connected devices, including video and access control, can contribute to smart healthcare and smart transportation. Indeed, it’s exciting to see Asia being part of the security-IoT convergence trend.

The need for security has boosted the awareness of choosing the right products for various verticals. In healthcare, we are starting to see hospitals placing more emphasis not only on patient health, but also the safety of visitors and staff.

The security industry is not the same as it was in years past, competition is fierce and product homogeneity is an issue. However, it is encouraging to see companies devoting more time and effort to identify the yet unaddressed needs of a vertical and create unique solutions that can address them.

The February issue is great because each article explores different verticals in the security and surveillance field including hospitality, healthcare and smart sensors. We also gained some insight on the security markets in the countries of Cambodia, Myanmar and Laos.

The security industry is becoming increasingly complex with new technologies entering the market, manufacturers competing on price and customers demanding more for less. With this issue, we bring to you extensive coverage of several topics that warrant discussion.

10


PRODUCTS OF THE MONTH Innovative Home Security Devices at CES 2017 Editor’s Note: CES 2017 at Las Vegas, U.S., showcased some of the latest and most advanced products from a variety of suppliers. This year, much of the focus for security devices has been placed on the personal home sector. Some of the products at the show combine different features into one cohesive device such as a camera with facial/object and motion sensors or a light bulb with a hidden camera for discreet surveillance. A range of security products offer users the ability to keep watch on their properties from anywhere with a smartphone. Cybersecurity has also received much attention with hardware and software functionalities that prevent cyberthreats to all connected devices in the house.

Fortress UTM

Fortress has developed a software stack and hardware solution that allows consumers to deploy several enterprise security technologies in the home. The Fortress unified threat management (UTM) appliance provides detection and prevention of intrusions, blocking bad connections, stopping viruses and ransomware, and inspecting everything on the network in one device.

Key Features: • Cybersecurity technology for inside the home • Secures Internet of Things (IoT) devices • Intrusion detection and prevention/firewall/anti-virus • Enterprise-grade security for the home • 4-port gigabit router with dual band Wi-Fi radio • 7” touch screen for easy setup and configuration

Supplier: Fortress Cyber Security URL: http://fortresscs.com/

Yubico YubiKey 4C The YubiKey 4C is the world’s first multi-protocol USB-C authentication device. Based on the existing YubiKey 4, it supports multiple protocols including Yubico OTP, OATH and FIDO Universal 2nd Factor (U2F). The YubiKey 4C provides secure access to a variety of applications including Google and Dropbox. Key Features: • USB Type-C • Secures static passwords • Secures access to multiple applications

• Works on Microsoft Windows, Mac, Linux and other major browsers • Keychain design

Supplier: Yubico URL: https://www.yubico.com/ February 2017 ● www.asmag.com

Cognitive Systems Aura

Protect the home and privacy with Aura, a thoughtful security solution. A simple two-piece system that plugs directly into the wall to monitor motion by detecting ripples in wireless signals. Paired with a mobile application, Aura gives users control of their home security — anytime, anywhere.

12

Key Features: • Motion detection • Auto arm and disarm • Manages access to home security systems without providing codes • Views activity in the house and knows who is present and movement patterns within seconds • Notification will be sent to the smart phone if unexpected movement is detected

Supplier: Cognitive Systems URL: https://www.aurahome.com/


Mu Design Ulo Camera

An owl-shaped home surveillance camera from Mu Design, Ulo offers an interactive device to monitor the house. The eyes on the camera will react depending on the action being performed. Live video can be watched through a secure webpage. Ulo only stores a few minutes of video locally and nothing is sent over a distant third party server. Key Features: • Eyes on the camera are customizable though a webpage • Alert Mode is activated once the connected smartphone leaves the Wi-Fi network • Live video streams directly to a secure webpage • Snapshots can be captured and sent to a secure webpage, dropbox account or to the user’s email • Battery lasts for one week on Alert Mode, while with eye expression it needs to be charged every two days • A set of adhesive neodymium magnet allows the camera to be attached on every surface

Symantec Norton Core Router

Core uses advanced machine learning and Symantec’s global intelligence network to defend the home Wi-Fi — and every device connected to it — against malware, viruses, hackers and much more. With a 4 x 4 MU-MIMO foundation and ultrafast 802.11ac Wi-Fi, Core is designed to achieve maximum throughput speeds of 2.5 Gbps. Core monitors data from the entire connected home, identifies security issues, and sums it all up in a single, powerful number. Key Features: • Built-in dual core processor at 1.7 GHz and more memory and flash storage than typical routers, to ensure optimal performance for Wi-Fi and security features • Dual band support for optimal connection. Core simultaneously transmits at 2.4 GHz and 5 GHz

Supplier: Mu Design URL: http://mu-design.lu/

• Twice the throughput of Wave-1 11ac technology which supports speeds up to 2.5 Gbps • Core’s beamforming antenna tower focuses Wi-Fi directly to devices in the distant corners of the home • Smartphone app enables control of the network

Supplier: Symantec URL: https://us.norton.com/

Bell & Wyson Wi-Fi LED Bulb

The low energy (11W) Wi-Fi LED bulb by Bell & Wyson features a built-in Wi-Fi communication module, camera, TF slot and 2-way microphone. A free app for iOS/ Android allows for alerts to be sent to the user’s smartphone when movement is detected. Live images taken by the camera can be viewed directly on the smartphone. Key Features: • Built-in camera and microphone • Night vision camera • Motion detection • Remotely manageable via free iOS/Android app • Allows recordings to be stored on a Micro SD card • Timer functions to program lighting cycles

Supplier: Bell & Wyson

URL: http://www.bell-and-wyson.com/en/

Ring Floodlight Cam

Protect the home with motion-activated security cameras with built-in floodlights, a siren alarm and two-way audio, so users can see, hear and speak to anyone on their properties from anywhere. With object and facial detection, Floodlight Cam has the most advanced motion sensors in home security. Its 270° field of view will let users detect motion around corners and monitor all the blind spots. The camera sends instant alerts to the smartphone, tablet or PC whenever it detects motion. Key Features: • Crystal-clear HD video • Two ultra-bright LED floodlights • 110-decibel siren alarm

Supplier: Ring

• Dual sensors with object and facial detection • Ultra wide-angle motion sensors • Customizable motion zones and scheduling

URL: https://ring.com/ 13


Dahua Elevates Commuter Safety With Public Bus Solution February 2017 ● www.asmag.com

Public buses, being a major part of public transportation systems, are the lifeblood of cities, fulfilling an important role in sustaining populous cities in Asia. Factors such as increased threats to safety and operational inefficiency, however, are straining the capabilities of bus service operators to optimally manage their fleets and ensure the safety of their passengers. Dahua Technology offers a public bus solution designed to address the unique requirements of this industry. BY Emily Lin

14

O

ver the past few years, Dahua Technology has established a strong reputation for itself as a video surveillance solutions provider. Through its many channel partners in Asia and abroad, it is involved in a wide variety of projects ranging from the financial sector to safe cities. Drawing from its experience, Dahua was able to identify early on a need for comprehensive security applications in the public transportation sector, particularly for city bus operations. “The need for better security, management and the need to increase revenue are behind the rise in demand in this sector,” said LiQuan Fu, President of Dahua Technology. “Customers are facing challenges from multiple fronts: from the increasing number of terrorist attacks specifically targeted at public transportation systems to bus traffic accidents that arise from driver fatigue, mobile phone use while driving, speeding and other dangerous driving behavior.”


▲Dahua’s public bus solution is positioned to offer public transport operators an effective system that can not only enhance passenger safety, but also improve fleet management and overall operational efficiency.

AT THE HEART OF ANY PUBLIC BUS TRANSPORT SYSTEM LIES THE NEED FOR REAL-TIME TRACKING OF THE BUS FLEET TO IMPROVE OPERATIONAL EFFICIENCY AND PROVIDE PASSENGER INFORMATION IN A BID TO BOOST CONFIDENCE IN THE SYSTEM.

LiQuan Fu, President, Dahua Technology

Rapid population growth and urbanization have hit public transport systems around the world hard, making it increasingly hard for operators to keep up with demands while still ensuring the safety of the commuters that use their services daily. Although subways are an integral part of mitigating this issue, construction takes a long time, maybe even five to six years, and the costs are higher. On the other hand, by focusing on public buses and creating solutions that fit their specific requirements, Dahua believes it can open up more opportunities and projects for systems integrators and clients in both the short and the long term. Dahua’s public bus solutions have already been widely deployed in several big cities in China such as Beijing and Shanghai as well as overseas in both government and private projects for bus companies in places like Mexico, Russia and Turkey. Now, the company intends to build on this strength and promote this further in Asia. Dahua sees a lot of opportunities for this application in the region, especially in Southeast Asia, where governments are starting to invest heavily in public transportation, especially buses, as a means to link cities, ease traffic congestion and reduce pollution. According to Fu, the economic value of implementing this type of intelligent public bus solution is highly evident for both drivers and bus companies alike. Likewise, as technology continues to advance, equipment costs go down and ease-of-use increases, which will make the application of these technologies even more feasible and commonplace in the transport industry. With a number of successful cases in Thailand, where they completed an project that deployed more than 2000 Dahua mobile DVRs for a Bangkok tourist bus company, and Indonesia thus far under its belt, the company is positive that the result can be replicated in other countries and related fields as well, creating more profit and added value for its customers. The public bus solution is positioned to offer public transport operators an effective system that can not only enhance passenger safety, but also improve fleet management and overall operational efficiency.

Built-in Features to enhance Passenger saFety As bus ridership is reaching an all-time high, the number of crimes

15


NEWS FEATURE a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.

Norwegian Minister Introduces Zwipe-Hitachi High-Tech Partnership to Major Japanese Companies Biometric technology company Zwipe was introduced this week to major card manufacturers and companies working in Fintech by Monica Mæland, the Norwegian Minister of Trade at a seminar organized and hosted by Zwipe’s partner in Japan, Hitachi High-Technologies. BY Zwipe

T

he purpose of the visit by the Minister was to meet with Japanese and Norwegian businesses working together in Japan seeking to strengthen the strong cooperation between the two nations. With an emphasis on innovation, especially in Fintech, the Norwegian government has expressed a strong interest to support companies like Zwipe. The cooperation between Hitachi High-Technologies and Zwipe was formalized with the outlook to collaborate on both technical and business development objectives. The Japanese market for both e-money and payment cards is fast growing as the people’s preference to use cash is shifting towards more secure and convenient alternatives. As much as 40 percent of all transactions

APPLICATION CASES

32.6 million February 2017 ● www.asmag.com

Thailand received a record 32.6 million foreign visitors in 2016. Source: Tourism Authority of Thailand

18

are currently made with cash, according to the Japanese Fintech Association. In parallel with this shift the Japanese payment industry is recognizing the importance of adopting open world standards, targeting the Tokyo Olympics in 2020 as the critical deadline for changes. This activity is supported by the Ministry of Economy, Trade and Industry (METI). Additionally, biometric access control is seeing significant

interest in the Japanese market, with many biometric alternatives already being adopted. “At Hitachi we believe in collaborative creation and that is why we have partnered with Zwipe. The solutions offered by Zwipe in regards to payment, access control and ID provide complimentary offerings to our already strong and innovative solutions mix” said Ichiro Matsuba, General Manager of

EDUCATION

BOSCH FIRE ALARM SECURES SCHOOL IN THAILAND St. Andrews International School Bangkok, a world-class school for ages 2 to 18, is part of Nord Anglia Education, a global network of over 43 schools in 15 countries. Protecting the safety of the children and faculty is definitely the number one priority. One way to ensure the safety of the children is through a school fire alarm system, to ensure that the entire school population will be alerted in the event of a fire emergency. After assessing the requirements and site, T.S.R. Telecom System — Bosch Security Systems Certified Partner — proposed the fire alarm solution using the FPA 5000 Modular Fire Alarm system with customized specifications for each area. The complete system is operated via a touch screen. The user-friendly interface adapts to the existing situation in a way that is simple, clear and intuitive. There is no special dongle required for programming to set up the system.


"The cooperation between Hitachi High-Technologies and Zwipe was formalized with the outlook to collaborate on both technical and business development objectives." Electronic Components and Materials for Hitachi adding, “we have already deployed Zwipe Access solutions in the market here in Japan and we have seen significant interest for both Zwipe payment and ID solutions.” Zwipe was represented at the seminar by their SVP of Sales and Marketing, Einar Boije, who held an hour-long presentation to potential customers, representing major card manufacturers and companies working in Fintech. The presentation focused on familiarizing the attendees with Zwipe’s offerings as well as detailing Zwipe’s go-to-market strategy in Japan.

LEGIC’S Open Technology Platform Attracts Interest in Asia LEGIC is pleased to welcome three leading Asian companies in its ID Network: Matrix Research from Hong Kong as well as Queclink Wireless Solutions and Shanghai Linstru Intelligent Technology, both from Shanghai. BY LEGIC

Matrix Research Matrix Research is a trusted leader in solutions and product development for secure identity solutions in the access control industry. Providing high secure readers (card plus finger print or card plus palm), they are recognized for robust quality and innovative designs. They focus on creating customer value and becoming the supplier of choice for physical and logical access control and credential products and services. Queclink Wireless Solutions Queclink Wireless Solutions is a leading supplier of M2M devices and solutions. Queclink’s mission is to provide the most technological advanced and reliable products and solutions for the Internet of Things. They offer products for automotive tracking, fleet management, tracking and tracing, lone worker safety, mobile health care, remote monitoring and control of any assets, and wireless alarms to cover most popular applications via the internet.

INDUSTRIAL

SONY IP NETWORK CAMERAS MAINTAIN SECURITY FOR CHINESE STEEL PRODUCER C h i n a ’s s e c o n d b i g g e s t s t e e l manufacturer Ansteel Group is the secondlargest steel producer in the People’s Republic of China. The sheer size of Anstee’s principal site in Anshan presents some major security challenges. Workshops and manufacturing plants are scattered across a wide area that resembles an industrialized city, criss-crossed by a dense network of

Shanghai Linstru Intelligent Technology Shanghai Linstru focuses on security, access, control of product design, sales and production. They provide professional customized services and support for customers and partners. Innovative designs and ideas, a wide range of styles for customers to choose and a flexible use of the latest technology, this is what the company stands for.

roads. To address the wide spectrum of security issues facing the plant, Ansteel G ro u p Au to m a t i o n i m p l e m e n te d a large-scale video security system. Standardizing on Sony Full HD network

cameras has allowed the company to achieve reliable round-the-clock surveillance at over 450 separate locations across the complex. The cameras are installed at factory gates, road junctions, store rooms, fences and other strategic locations. T h e m o v e t o a n a l l - S o ny v i d e o security solution has paid big dividends for Ansteel. There’s been a significant decrease in accidents and theft, with the company passing video evidence of unlawful activities to Public Security Bureau investigators.

19


Cam

First 8 months of 2016 FDI in r

Myanmar

Total approved amoun

The con

Investments February 2017 â—? www.asmag.com

Growth

Drive Security in Cambodia, Myanmar and Laos

Asia is becoming the new land of opportunities with many of the countries experiencing significant growth. Myanmar, Cambodia and Laos are part of this growth as each country is experiencing an increase in investments. An increase in infrastructure developments and private investment is becoming the new trend for these countries. The security market is also aligning with the said growth as international companies, SIs and distributors are seeing rising demand for their services in the market. BY Ryan Liu

22


mbodia700% real estate increased over

since 2015. Source: realestate.com.kh

nt of investment from 2015-2016 was US

$9.5 million.

Source: Directorate of Investment and Company Administration (DICA)

Laos258.5 km

nstruction of Laos-China railway will require

n the last couple years, Southeast Asia has seen steady economic growth. According to a report from the Asian Development Bank (ADB), growth forecast for the region remained at 4.5 percent for 2016 and 4.6 percent for 2017. Figures taken from the ADB report also shows Cambodias GDP was last forecasted to be 7 percent in 2016 and 7.1 percent for 2017. Hydro-power projects and other investments in Laos helped contribute to the country’s GDP, which was said to be at 6.9 percent in 2016 and 7 percent in 2017. On the other hand, Myanmars GDP was forecasted to be at 8.4 percent with an anticipated drop to 8.3 percent in 2017, owing to intense floodings in the summer of 2016 that affected millions of people in the country. The security market in the region has started to gain some traction as many new construction projects rely on local distributors and systems integrators (SIs) to implement effective security systems. However, recent changes in other countries, such as the new presidency in the United States, may influence future investment toward these countries. “Business investment in infrastructure will drive the need for security and this is taking place; however, 2016 saw a lot of uncertainty that may affect or delay planned developments as all the countries are dependent on foreign investment to varying degrees,” said Eric Lee, Business Development Manager at FLIR Systems.

. of bridges and tunnels

Source: Railway Gazette

Competition aligns with growth Competition is expected as the security industry continues to grow. SIs, such as V-SAFE, believe that is important to focus on company strengths. Kuy Channeth, Project Sales Manager at V-SAFE, said they approach each project with a design that is unique to the customers needs. Sovan Hok, Technical and Business Director at NKTECH Cambodia, also sees strong competition in the security industry, but have been able to overcome the challenges. He suggested that, “Trust building and customer service are one of the keys to be successful in this industry. We would suggest the new and emerging SIs and distributors to focus on the quality of the product and service.”

outlook The economy of each country appears to be heading toward more growth. Many factors are helping to boost the growth, such as the increase in tourism and foreign investment in a var iet y of sec tors. As development continues, the future appears to be bright in these regions.

Eric Lee, Business Development Manager, FLIR Systems

23


Dear Mr. Welcome to Smart Hotel. The temperature in your room has been set to your preferred 26ºC. You have a voice message left from five minutes ago. For your 19:00 dinner reservation, we’ve already reserved your favorite seat. Your reference number is 0288. Finally, thanks for choosing Smart Hotel, and we wish you a pleasant stay. Best Regards, Smart Hotel delete

February 2017 â—? www.asmag.com

Hospitality is a booming industry across the globe. Yet in the midst of this boom, competition has become more intense. More and more hoteliers therefore turn to technology to boost operational efficiency and retain customers. This is where the Internet of Things and big data can help. BY William Pao

28


101101010111010101010101

01010101010

010101 10101101010111010101 011 10101110101010101010 1010101010101010101101010 010 1010111010101

0101011101010101010101010110 1110101010101010101011010101110101010101010101011 10101011101010101010101010110101011101010101010 010101 1010101011010101110101010101010101 10101010101010110101011101010101010101

10101010 101010101 Time for Hotels to Smarten Up With

101011 01010110 010101 10101010101011010 1010101010101011010101110101010101010101011 0101010101011010101110101010101010 101010101010110101011101010101 0101010101011010101110101010101 010101100101011101010101010101010110101011 01010101010 0101110101010101010 10101101010111010101010 1110101010101010101011010101110101 10101011101010101010101010 010101 0101010101011010101110101010101 1010101101010111010101010101010101101010

010 01010 1010101110101010101010101011010 1010101010110101011101010101010101010110101 01010101010 101101010111 0101011101010 01010101101010 10101011010101110101 1010101101010111010101010 010101010110101011101 1010111010101

01101010 01010 01 1010110101011101010101 0 1010111010101010101010 010

IoT Big Data 10101

01110101010

1010101110 010101010101010 010101110101010101010101 1110101010101010101011010101110101 10101010110101011101010101010101010110 0101011101010101010101010110101011101 010101 10101011101010101010101010110101011101010101010101010110 101010101 1010101010101010110101011101010101010101010110101 101010101101010111010101010101010101101010 101010101 0101 01011101010101010101010110 01010101010110101011101010101010101010 10 1010101011010101 10101010101010 1010 101010101010110 01010111010101010101010101101010111010 0101010101011010101110101010101010101011010 01011 11101010101010101010110101011101010101 10101010110101011101010101010101 010111010101010101010101101 0101011101010101010101010110101011101010101 111 1110101010101010101011010101110101010101010 0 01010101010 0101110101010101010101011010101110101010101010101 10101010101101010111010101010101010 101010101010101010110101011101 10 11101010101010101010110101011101010101010 1010101101 11101010101010101010110101011101010101 01010110101 01010101010 0111010101010101010101101010111010 0101 010101110101010101010101 010101 1010110101011101010101010101010110101 1110101010101010101011010101110101010101010 0 010101 1010101010101010110101011101010101 10111010101010101010101101 0101 01011101010 101010 0101010101010110101011101010101010101010110101011 1010101010101101010 101010101101010111010 1010101011010101 10101010101 0101110101010101010101011010101 101010101010110101011101 10101010110101011

AND

11101010101010101010110101011101010101010 0101 10101010101010101101010111

ospitality has been thriving over the past few years. A recent survey by Scotiabank, for example, indicated that European hotels saw a 7.1 percent increase in revenue per available room (RevPAR) and 1.5 percent increase in occupancy rates in 2015 compared to 2014, and that up to May 2016, US RevPAR went up 3 percent compared to the same period in the previous year. Another report by PriceWaterhouseCooper, meanwhile, noted that most respondents recorded double-digit RevPAR in 2015 and forecasted the growth would continue in 2016 and 2017.

OppOrtunities and threats While the growth in hospitality brings opportunities to hotel operators across the globe, they are faced with threats as well. With existing hotels in place and new ones springing up, operators find it more and more difficult to compete and retain customers, who are faced with more choices. Patrick Lim, Director of Group Sales and Marketing at Singaporebased Ademco Security Group, used his own country as an example. “Singapore is both an exciting and very competitive market for hotel operators. Whether for business or tourism, hotel operators enjoyed some of

1010110101011101010101010 01010101101 10101010101010101 1010111010101010101010101 110101010 010

10110101011101 10110101011101 011

010 101010 0101 1010101010101010101 10 01010101101 0 1010101010101010101101 1010101 110 010101101010 1010 10101010 1011010101110101010101 10 0110 0 110101

Tourism Cited as Major Driver for 01011 1010101010101010101101010111010 Growth in Hospitality 101010101011010101110101010101010101011

0101110101010101010101011010101110 10101011010101

11101010101010101010110101011101010101010

The booming hospitality industry could not have been possible 101010101010101 010101110101010101010101 without tourism. “Tourism is one of the major driving forces 1010101010110101011101010101010101010110101 01 0111010101010101010 behind the growth of the hospitality industry across the globe 11101010101010101010110101011101010101010 0111010101010101010101101 1010101101010111010 — especially in the United States and in the 1010110101011101010101 U.K.,” said Scott 0101010101010110101011101010101010101010110101011 010101110101010101010101 Brothers, VP of Global 10101010101010101101010111010101010101 Business Development at Oncam. 101010101101010111010101010101 0101 Steve Dunn, CEO and Co-Founder of LEAPIN Digital010111010101010 Keys, 0101010101010101101010111 101 echoed those remarks. “Europe is the world-leading tourism10111010101 010101011010 1010101010101010110101011101010101010101010 1011101010101010101010110101011101010101010101010110101011101010 destination with over 51 percent of international tourist arrivals 0101010101010110101011101010101010 1010101011010101 01011101010101010101 generating 4500101 billion euro worth of revenues. The growth in 101010101101010111010 tourism has significantly contributed to the European economic 101010101101010111010 recovery and the tourist industry directly provides over 9 million 1010101011010101 jobs,” he said. According to Scotiabank, the terrorist attacks in France and 10101010110101011101010101 01011101010101010101010110101011101010 Belgium did have an effect on local hotel performance in 2015 1010101010101010101 and early 2016, but only temporarily, as the European Cup 01 01110101010101010101011 soccer tournament in France last summer had likely reversed the 0101110101010101010101011010101110101010101 trend in occupancy rates and revenue. 10101101010111010101010101 101010101010101010110101 Tourism contributed hugely to China’s hospitality as well. 0111010101 01 0111010101010101010101101010 0101010101010110101011101010101010 “Tourism is one of the biggest factors nowadays because 1010110101011101010101010101010 of economic growth and people’s willingness to spend time 10101010110101011 101110101010101 and money with their 01010101010101101010111010101010101010 family and friends. Exhibition has some 0101010101 influence but it’s located 101010101101010111010 in big cities in most cases,” said Jack 010101011010 10111010101010101010101101010111010101

0 011010 010 0 1 01010101101 10101011101 0 10 11010 010110101

101 01010110 11010101 1010 10110101011101010 110101 10 10 10101011101 1010 1010 10 010101101 1 10101 0101011010 1011010101110101010 10 01010101101

010110101

010110101

10111010101010101010 He, International Sales and Marketing Director at HDL.

0101010101010110101011101010101010101010110 101010101101010111010 29


Health Care Market Witnessing Healthy Growth

In an effort to strengthen security measures to ensure the safety of patients, visitors and staff, health care facilities are upping their security game with improved technologies and solutions. BY Eifeh Strom, Freelancer

February 2017 ● www.asmag.com

he health care industry is one that crosses all borders, big and small, all over the world. The scope of these systems, however, can vary drastically from place to place. From a security standpoint, much like the availability of health care, the level of security used in health care facilities across the globe also varies immensely. Theft and loss are major issues health care facilities are dealing with. To mitigate such occurrences, they must increase security measures, while at the same time adhere to regulations and stay within budgets, all while maintaining an open, welcoming atmosphere. However, preventing theft of high-value equipment, medications and even babies is driving the growth of RFID in the health care market, which is expected to reach over US$3.9 billion over the next seven years, growing at a CAGR of 24.7 percent from 2015 to 2022, according to a report by Grand View Research. Theft, however, only plays one small part when considering the security needs of a health care facility. With markets around the world witnessing growth in the health care sector, security measures are also increasingly needed to secure, protect and help facilities properly adjust to the changing requirements that come with expansion.

Trends and Challenges The challenges facing hospital security are complicated, ranging from workplace violence to wandering patients and abduction of infants, “Patients and visitors must feel welcomed and comfortable, yet safe and well protected,” said Sheila Loy, Director of Healthcare Solutions for Identity and Access Management in North America for HID Global. This means balancing security measures so that they are visible enough for

36

patients and visitors to feel safe, but invisible enough for the environment to remain welcoming. The open environment nature of hospitals is problematic from a security standpoint — hospitals are designed to be public spaces and cannot simply be locked down. As such, security measures must be able to recognize the different types of persons within the hospital, limiting access to certain areas while keeping other areas easily accessible. This presents logistical challenges since health care facilities, particularly hospitals, are often large and spread out over a wide area. What this means for the security solution is the locks may need to integrate with fire detection, video surveillance and other systems. However, not all of these users are created equal, explained Thomas Schulz, Marketing and Communications Director of EMEA at ASSA ABLOY. “Medical staff, cleaners,


patients and their visitors, and countless temporary and contract workers all need access tailored to their specific and very different needs,” he said. “Labs with a steady flow of visitors and contractors are safer if access is managed with time-limited keys that can be revoked or revalidated when required.” Chad Parris, President of Security Risk Management Consultants, noted that “the synthetization process of security programs and more importantly the differing disparate technologies create significant challenges to security managers and directors’ intent on creating standard platforms across the enterprise.” The result is a daunting, expensive and long-term challenge for those seeking to unify systems such as video and particularly access control, where organizations want to create a “one-card” solution for all facilities. Yet, one-card solutions are now in demand. This opportunity to “do more with the card” was highlighted by Loy. “Hospitals can offer physicians, nurses and staff one card for accessing the emergency room and pharmac y, and for visual ID verification, time -andattendance logging, payroll transactions, and cafeteria purchases. This simplifies life for cardholders while John Davies, MD, TDSi centralizing and streamlining management.”

growTh drivers by region What drives health care growth differs by region — this also goes for security growth. “ The market for electronic health care security continues to grow in markets around the world, with different areas of concern in different regions,” said Steve Elder, Senior Marketing Manager of Stanley Healthcare. Growth drivers in developed countries with advanced health care facilities might be more related to upgrades and retrofits, whereas regions where health care is less advanced might see newer installs and different requirements.

Steve Elder, Senior Marketing Manager, Stanley Healthcare

Sheila Loy, Director of Healthcare Solutions, Identity and Access Management, North America, HID Global

Eliminating Paper With e-Prescribing Manual, paper-based prescribing of medications is not only inconvenient for physicians but it is also annoying for the patient, increasing wait times at pharmacies. Furthermore, paper-based prescriptions prevent physicians from issuing patients prescriptions via telemedicine sessions, which is ironic considering that these sessions provide otherwise efficient and real-time care delivery. There is also the added cost of expensive paper and secure record storage. This is why manual systems are being replaced. In the U.S., Drug Enforcement Agency (DEA)-compliant and government-certified electronic prescriptions of controlled substances (EPCS) are also replacing manual systems to enhance processes and the patient experience. These solutions allow physicians to send prescriptions at any time, from any place, and families to make a single trip to their local pharmacy, explained Sheila Loy, Director of Healthcare Solutions for Identity and Access Management in North America for HID Global. “These solutions can be integrated with hospitals’ electronic health records (EHR) systems. They are simple to use and provide options for prescribing physicians who often travel and work at different locations or conduct telemedicine sessions, and they are cost-effective and easy to support from an IT perspective,” she said. HID Global’s solution for EPCS enables hospitals to attach a digital certificate of identity authentication to a FIPS 140.2 certified credential, using IdenTrust as the certificate authority for each authorized prescriber. “The HID Global credentials also include one-time password (OTP) functionality that allows EPCS authentication using an OTP, without the need of a desktop reader. With HID integration to Epic EHR, either the digital certificate or the OTP (with PIN) can be accepted within the EPCS module for two-factor authentication. This provides the convenience for the prescribing physician to choose the authentication mode that best fit his or her workflow in a given scenario,” she added.

37


Keeping Health Care Facilities Accessible and Secure

The need for better, more secure access control in health care facilities is growing to protect against thefts and other threats; however, facilities must remain open and welcoming, while still maintaining strict access control rules. BY Eifeh Strom, Freelancer

ccess control in health care facilities often presents complex challenges. There are many different types of people entering and exiting, all requiring different levels of access. In order to maintain an open, welcoming environment that is still secure and easily accessible to the appropriate persons, an effective access control solution is crucial. To do this, health care facilities such as hospitals seek security systems that balance access control with other systems. “It may be wireless electronic solutions that provide specific and individual protection without affecting others; general access control and video solutions; or even advanced solutions like biometric readers to control access to highly sensitive locations like laboratories,” said Steve Elder, Senior Marketing Manager at Stanley Healthcare. In order to choose the best access control system, each individual facility’s requirements must be taken into account.

Different types of Access

February 2017 ● www.asmag.com

Health care facilities entail many different types of establishments, including hospitals, clinics and laboratories. John Davies, MD of TDSi, sees “little difference according to the type of the facility” when it comes to access control. Instead, Davies noted how “the ability to have open protocol integration across multiple sites is becoming more the norm.” IP-based physical access control systems are also attractive for health care facilities, according to Sheila Loy, Director of Healthcare Solutions for Identity and Access Management in North America for HID Global. “Customers look towards networked access control solutions that simplify infrastructure enhancements and modifications since IP-based solutions can provide a single, integrated system for combining security, Chad Parris, President, access control, video surveillance and incident response, Security Risk Management Consultants perimeter detection, and alarm monitoring systems,” she said. Loy further advised that hospitals could explore taking advantage of their current access control infrastructure to add new capabilities. This would allow them to “leverage their existing credential investment to seamlessly add logical access control for network log-on, and achieve a fully interoperable, multi-layered security solution across company networks, systems and facilities.”

Wireless Locks When taking into consideration the challenges of health care facilities, such as wandering patients, infant abduction

40

Thomas Schulz, Marketing and Communications Director, EMEA, ASSA ABLOY

and unauthorized access, certain types of access control systems may be better suited. “An access control system with wired doors and programmable RFID smartcards can solve many of these problems. But conventional wisdom says access control is expensive and cannot be installed everywhere, due to the need for extensive cabling,” said Thomas Schulz, Marketing and Communications Director for EMEA at ASSA ABLOY. Wireless access control systems can overcome the need for extensive cabling and is seeing higher adoption in health care facilities. “Wireless locks are the most affordable way to extend access control throughout a site, greatly enhancing security for a small outlay,”


Schulz explained. “What’s more, it doesn’t require you to rip up the current security system and start again … Wireless locks are cost-effective to run, too.” In the past, the concept of securing a hospital wireless seemed unfeasible, but that is not the case anymore. ASSA ABLOY, in partnership with Nedap, fitted 700 doors in a new building of Hospital Maria Middelares in Belgium with its Aperio offline locks connected to a Nedap access control system. “ The deployment is 100-percent wireless, maintaining design aesthetics in the new build,” Schulz said. “Staff now open doors and access secure areas with a single smartcard using MIFARE RFID technology.”

BuDgeting for Access control Since access control is part of a security budget, how much a facility spends is

based on individual need — there is no one formula. “Implementing access control systems as well as any security technology needs to consider several considerations such as the nature of the operations, location, size and the reasonably foreseeable risk to be protected against,” said Chad Parris, President of Security Risk Management Consultants. With that said, Parris noted that “most health care organizations utilize electronic access control systems on perimeter doors such as main entrances, employee entrances, receiving dock, maintenance rooms, specialty clinic entrances, emergency departments, and many others as a standard and a high priority as part of the overall building security system.” Parris added, “Access control systems on these doors allow the organization to automate some doors through time of day schedules for public access yet maintain secure access at other back of house doors. Interior doors leading into security sensitive areas such as pharmacies, labor and delivery, critical care, and behavior health units are typically seen as higher priorities as well.”

integrAting Access control Integrating disparate systems has become a general goal of most facilities, not just in health care. Why manage several different systems if you can integrate them and manage them together? This is in fact the reason why integration and systems that are easy to integrate are now a norm. While integrating video surveillance with other systems is generally where people start, integrating access control is also a priority. “Access control systems are often seen as the glue or enabler to integrate other physical security systems,” Davies said. However, Parris advised that the word “integration” means different things to different individuals, and “a clear and concise concept of operations should be defined to assure the client understands not only how the system will function, but also how they must respond, manage and monitor the systems.” “For example, if there is an integration between the access control system and video system, does the live view of the camera simply display on the monitor upon alarm event or is there also the ability to tag that video for future retrieval? These are two very different functions that can be deemed as an integration,” Parris explained. As such, understanding the integration taking place is vital to its success. “Implementing an integration can also come with many pitfalls if an organization does not fully understand what it takes to properly care and feed for it. Also, understanding that the integration of systems requires that versions of each platform be in lock-step with each other and that the upgrade of any of these systems needs to be fully vetted to assure compliance and that the integration is not broke,” Parris added. Integration of these new capabilities into older, legacy systems can be challenging. “Over time administrators may want to integrate access control with visitor management, or add video surveillance and other technologies,” said Loy. “This can be difficult to accomplish with legacy systems, which are vulnerable to security threats and can’t easily be upgraded to new features and capabilities. In contrast, the latest physical access control system architectures are based on dynamic technologies, making it significantly easier and less expensive to upgrade them.”

AccessiBle Access

Source: ASSA ABLOY

Clearly a thorough, integrated access control system is a crucial part of any health care facility security solution. Beyond monitoring entrances and exits, access control systems have hidden complexities that require careful consideration. Furthermore, compliance with regulations and a focus on delivering an excellent patient experience, which includes patient, visitor and staff safety, will continue to drive the access control market in health care.

41


Sensing the Sensational

Benefits of Sensors by Lisa Hsu

The need for sensors is increasing dramatically, especially with the ongoing boom of the Internet of Things (IoT) and the innovations of sensing technology. The popularity of fusing sensors with security systems for better protection and operational efficiency comes to light, but there are challenges ahead. February 2017 â—? www.asmag.com

he growing popularit y of the Internet of Things (IoT ), along with more developed technology and lower cost of sensors, has boosted the use of sensors. Based on figures from a repor t by

42

bccResearch, the global market for sensors reached US$101.9 billion in 2015. This market is estimated to reach $190.6 billion by 2021, with a CAGR of 11 percent for the period of 2016 to 2021. The image and chemical sensors segment is estimated

to increase from $28.4 billion in 2016 to $51.2 billion by 2021, with a CAGR of 12.8 percent, while the biosensor and fingerprint sensor segment is estimated to reach $23.9 billion in 2016 and $44.5 billion by 2020, with a CAGR of 13.2 percent.


There are several types of sensors that are usually used for security. Just to name a few, they include: passive infrared (PIR), microwave, ultrasonic, tomographic motion detection, sensors integrated in video cameras and dual technology. They are typically used for perimeter security or any indoor/outdoor environment intrusion detection, such as fence detection, buried cable detection, alarm monitoring and control. Now, the use of sensors has expanded past perimeter security, intrusion detection and can be seen in various applications, for instance, access control and many others, even beyond security. “Larger multi-site organizations are increasingly using full integrated security management systems which pull all aspects of security together in one user interface. Sensors have always been part of that — either at the perimeter or at every door — but we are now seeing a new generation and that will grow faster with the Internet of Things,” said David Ella, VP of Product Marketing at AMAG Technology. Moreover, the realization that sensors can transmit valuable data has become more widespread, boosting the implementation of sensors in the security market. “A simple example of this is in retail, where a device that was historically utilized for access control is now the launch point for the introduction of marketing materials via a mobile device or beacon, a guide for consumer navigation, or in the case of a repeat customer or loyalty program member, a series of routines or predefined actions that the consumer prefers,” explained Rob Martens, Futurist and VP of Strategy and Partnerships at Allegion. On the other hand, another type of sensor that has become very popular over the past few years are sensors integrated into surveillance cameras — video analytics. The possibilities of these sensors are endless, as they are controlled by algorithms designed for the user’s multiple requirements. However, instead of focusing on the various ways video

analytics or image sensors are used for, in this article we will explore the different ways sensing technologies are deployed and how they benefit the traditional security system.

Benefits of ComBining sensors in a seCurity system Traditionally, only one technology was used to protect or monitor a certain area most of the time — surveillance cameras. However, this often created false alarms or blind spots. “Camera technology with video content analysis (VCA) does people counting and barrier perimeter detection for indoor environments. But if you get into an outdoor environment, sometimes cameras are affected by light. Even a thermal camera can be impacted by ambient temperature and movement of air,” said Jacques Vaarre, MD at Optex Europe. “A single sensor could start to allow false positives, and adding a comple-

mentary system can allow the false positives to be double checked and alerts and alarms stopped before being sent out,” said Douglas Bellin, Senior Manager of Industrial Markets at Cisco Systems. “Take for example a gauge is telling you one thing, but there is only one way to verify this — which is by physically seeing what is happening in that area. The video stream could be looking at the gauge and allow remote viewing, but also allow the same video stream to allow sight verification of the environment around the area.” Now, the benefits of fusing technology together in an integrated system, creating an extra layer of security and verified responses have gradually come to light. In the same sense, sensors have also made its way to benefit users for multiple purposes. Some examples in the following discussion will further elaborate on the convergence of multiple technologies.

Gunshot Detection

The increasing number of gun shooting incidents, especially in the U.S., has driven the need for gunshot detection systems.

Driven by gun shooting and terrorist attacks, audio sensors have gained popularity, especially in the U.S. According to the Gun Violence Archive (GVA), a corporation that supplies an online archive of gun violence incidents in America — at the time of writing (only six days into 2017), 187 deaths were

43


hen talking about security systems people tend to focus more on video surveillance or access control. Yet, video only provides the visual of what’s going on. In the event of emergency, providing a live communication channel to instruct people in distress or allow them to talk back to the control center is also critical. That’s where PA and intercom systems come in. “CCTV allows you to see what is going on. Access control allows you to block or

allow entry. But often, PA and intercom are forgotten,” said Piet De Vriendt, Commercial Product Manager for Building Security and Public Safety at Zenitel. “You need PA and intercom to run your school. You need PA and intercom to evacuate an office building. As soon as a certain amount of people are gathered in a single place it is almost impossible to inform and direct them without technology. Now imagine there is a crisis going on, it gets even harder. PA and intercom are an absolute necessity. People rely on you, the chief

of security, to assist and direct them if they need help during an emergency.”

Migration to iP For a long time, PA and intercom systems have been based on analog, which has become quite inadequate in fulfilling users’ more complex demands. As a result, like their video and access control counterparts, PA and intercom are more and more migrating towards IP, which allows many benefits that traditional analog systems otherwise do not bring.

IP-Base d PA and Interc om to

Conquer Secur ity Compared to vi deo and access control, public a and intercom sy ddress (PA) stems often get less attention. N their roles in pro evertheless, tecting lives and securing physic equally importa al premises are nt. More and m ore, we see PA a migrating to IP, nd intercom making integra tion with video and access contr ol easier than eve r. BY William Pao

February 2017 ● www.asmag.com

PA Components and Requirements

A basic PA system requires a main controller, which is the key to run the entire system, as well as loudspeakers for sound output. Other accessories may include flash alarming, telephones, TV controllers and audio/video matrix, and MP3 player can also be integrated on special requests. Since PA and intercom systems are deployed in some of the most critical environments such as on trains, where vibration and vandalism can be an issue, or in outdoor areas where weather conditions can be extreme, the devices must be industrial or hardened to withstand such conditions.“There are lots of cases in which industrial-grade products are required. In most cases, PA

48

and intercom systems are installed in a public space where lots of people can find them easily and lots of people can touch them easily. Then these products could be treated by unexpected ways. The ‘robustness’ is needed,” said Ryosuke Okamoto, Product Manager at TOA. “When these systems are installed on trains, buses or similar critical areas, the industrial grade is not enough due to the strong vibrations and high temperatures usually present in such installations; the compliance to the EN 50151 rules for railway applications is usually necessary,” said Filippo Gambino, CEO of Ermes Elettronica.


Integration One of the benefits is the ability to integrate the PA and intercom to other security systems. “The functions and the ability of extension of traditional digital PA systems is limited. The compatibility with other newly innovated equipment is poor as well,” said Jerry Hung, VP of BXB Electronics. “However, with an IP-based PA system, other equipment can be easily integrated with it. IP-based PA system is already there, and we believe it would be more common.” Integrating PA and intercom into video, or having them work side-by-side under a higher-level platform such as PSIM, can greatly enhance the users’ situational awareness, giving them the ability to see as well as scare intruders away.

“Horn speakers allow our operators to immediately intervene when video analytics alerts us of trespassing at customer sites,” says Lars Kämpe, Business Development Manager at Securitas. “Normally, a trespasser will flee the scene when notified of his detection. This saves cost for our customers due to reduced damages and unnecessary callouts.”

Ease of Installation Another benefit of IP is allowing ease of deployment. Specifically, most IP-based PA and intercom equipment are now equipped with PoE, and this spares the installer the need and labor to install extra power cables. “IP-based intercom systems are clearly the future of the technology. By using PoE, networks and cables can be run to the closest building instead of running expensive POTS lines back

to a telco closet,” said Bruce Czerwinski, General Sales Manager of Aiphone. “This also allows the units to integrate with other systems such as video surveillance and smartphone apps using geo-locating technology.” “With Power over Ethernet the unit gets power and connection over a single network cable, just like a network video camera does. This means you do not need an external power supply or any additional equipment,” said Håkan Hansson, Product Manager at Axis

49


SMAhome

Toward The Unhackable home — addressing SecUrity in The ConneCTed home By Bill Curtis, Secretary,Thread Group and Lead Strategist, Internet of Things, ARM, and Robert Cragie, Senior Principal Engineer, ARM (Originally published in a&s SMAhome issue 16)

One of the overarching benefits of the Internet of Things is the ability to make life easier with smarter — and more connected — homes and businesses. However, as devices in the home connect to the Internet, they — and our homes — become vulnerable to hackers. With Parks Associates predicting more than 50 million connected homes by 2020, it’s time for developers and retailers alike to make protecting customer data a top priority. We’ve identified six best practices for ensuring the home is fully secured.

Network-wide keys

February 2017 ● www.asmag.com

Secure communication is a hallmark of an intelligently designed connected home. The use of symmetric key cryptography, based on a network-wide key, ensures comprehensive protection through integrity protection and payload encryption applied to each message.To prevent man-in-themiddle (MITM) attacks, integrity protection works by appending a small amount of data called an “integrity check tag” to each message. The tag can then be verified to prove that the message did, in fact, originate from where it said it did, and that it was not tampered with in transit. In addition, payload encryption scrambles the contents of the potentially private or sensitive payload to ensure it cannot be read by an attacker. Advanced Encryption Standard (AES) CCM provides both of these features, and should be used on all packets at the network layer to provide a strong base level of protection.

key AgreemeNt Any time a new device is added to the network, it must be securely granted the network-wide key to process messages as

54

described above. A Password Authenticated Key Exchange (PAKE) makes use of a relatively low-strength secret (i.e., a password) in conjunction with high-strength asymmetric cryptography to generate a high-strength shared secret. When a new device is granted the network-wide key, it uses the high-strength shared secret to encrypt the message containing the key.

AutheNticAtioN & AuthorizAtioN Authentication is another important step in the setup process. This is achieved when a user inputs a new device’s password into an authenticating device, typically a smartphone. The password can be printed on the new device itself as part of a QR code, which can be easily scanned by the smartphone. The PAKE will only be successful if the password put into the smartphone matches the new device’s password, which assures users that the device they just commissioned is the same device they scanned on their smartphones. The new device is authorized to join the home network by virtue of being given the network-wide key.

mAiNteNANce Using a sequence counter to periodically change the key used to secure messages ensures that, even in the unlikely event that an attacker obtains the key, only a limited window of messages can be processed. It isn’t necessary to change the network-wide key often, but there must be a means to update it. As a best practice, the key could be updated any time a device is sold or disposed of.

ApplicAtioN lAyer protectioN Building a secure networking layer provides an important foundation for building secure connected devices, but it is also vital that the application layer provides additional security. Using common security building blocks, such as the Constrained Application Protocol (CoAP) transfer protocol and DTLS security allows for efficient implementation of secure application layer code.

protocols When it comes to security, it’s not necessary for device makers to “re-invent the wheel.” Instead, they can build on well-established standardized protocols, such as the TLS protocol, which is used to secure internet transactions today, and the J-PAKE protocol, which is currently being standardized and includes a security proof undertaken by respected cryptographers. It is safe to say we have entered an age where we need to worry less about the cost of security enhancements and more about the cost of not having it. By leveraging proven security mechanisms along with networking protocols, we can significantly enhance the security of connected devices in the home.


Top QuesTions To Ask When Looking for An IoT PlaTform By Yuping Tseng, VP, Product Development, ThroughTek (Originally published in a&s SMAhome issue 16)

You and your colleagues are sold on the Internet of Things (IoT). At this point, you are looking to start integrating smart solutions (like IP-enabled cameras and smart sensors) into your business to boost productivity and drive profits. Now ... where should you start? The first thing you’ll want to consider — and this is very important — is how you will manage your connected endpoints as they proliferate across your enterprise. Keep in mind that a typical IoT ecosystem will have many different brands, protocols and data sources, and can be very overwhelming from a managerial perspective. It’s for this reason why many businesses are now choosing to streamline the IoT management process with the help of an IoT platform, i.e., a cloud-based hub that will grant complete visibility into and control over your entire connected environment. You won’t have any trouble finding competitive platforms to assess, as the market for IoT platforms is booming. It will continue growing — adding various features and support functions along the way — at a compound annual growth rate of 33 percent from 2015 to 2021, when it will produce an annual revenue of US$1.6 billion. Selecting the right platform for your business is crucial for a successful IoT deployment. Below is a short list of questions to help you get started:

Is It scalable and flexIble? It’s important to partner with an IoT platform provider that can adapt to changes as they occur in your environment. This will allow for continued support as your business model evolves. Remember that an IoT platform should never add complexity to your operation. Rather, it should ease the migration process as you add new features, tools and capabilities without requiring an infrastructure reconfiguration. As your ecosystem grows, a best-in-class platform will be able to scale and smoothly handle vast amounts of devices and data streams.

How compatIble Is It? You shouldn’t have any trouble integrating the platform into your backend system. Be wary of platforms that only work with proprietary technologies or ecosystems. Besides enabling interoperability between devices, the platform should also enable communication between applications and external systems. For this to happen, program languages and code sets need to be compatible as do the platforms you are using. You may want to make use of application program interfaces (API), which will allow you to interact and share data with other firms.

Is tHere a partnersHIp track? To be successful in the IoT, an enterprise must build a strong and extensive partner ecosystem. Partners provide crucial support for tasks required during the product and channel development process, as well as add value to applications and services. Companies with strong and extensive partnerships can leverage each other’s resources, ultimately creating greater value in IoT markets.

wHat kInd of securIty features does It offer? Your enterprise should take adequate steps to develop strong security measures and procedures. Each connected endpoint that you add is a direct gateway into your network that could be exploited by an unauthorized intruder. Make sure that the IoT platform you choose provides multiple security safeguards, including user authentication technologies and the ability to set firm access controls. The platform should also provide end-to-end encryption to protect data as it flows across the network.

can It turn data Into actIonable InsIgHt?

Selecting the right platform for your business is crucial for a successful IoT deployment.

The real value in collecting data lies in the insights that can be derived from it. Ultra-fast data rates and low latency connectivity have led to drastic improvements in data processing and querying. Your IoT platform should therefore be able to mine data and provide real-time feedback so that you can use it to drive action (instead of letting it sit in a backend server).

55


Home8 Indoor Outdoor Security System Features:

• S elf-monitored – no need to pay high monthly fees for professional monitoring • Video verification – can confirm a break-in or other event via video • Multiple applications – safety, security, video, fire and more • Cloud-based platform – extremely secure • One-touch-to-responder calling – one push of a button on your phone to contact authorities • Easy to install

■Home8/U.S. ■Email: sales@home8alarm.com

Hanwha Techwin PNM-9020V 7.3 MP Multi-sensor 180˚ Panoramic Camera

Arecont Vision MicroDome Duo AV4655DN-08 Dome IP Camera Features:

• M ax. 7.3-MP (4096 x 1800) resolution • Built-in 3.6 mm fixed lens • H.265/H.264: max. 30fps at all resolutions; MJPEG: max. 15fps at all resolutions • H.265, H.264, MJPEG codec supported; multiple streaming • Motion detection, hand over to PTZ, tampering, defocus detection, digital auto tracking, heatmap • SD/SDHC/SDXC (128 GB) memory slot, PoE+/12V DC

• S NAPstream (Smart Noise Adaptation and Processing) reduces bandwidth without impacting image quality • True day/night functionality with mechanical IR cut filter • CorridorView allows 90° image rotation for better coverage in hallways and corridors • Dual encoder H.264/MJPEG • Remote focus module • All-in-one H.264 total power over ethernet (PoE) solution

■Hanwha Techwin Europe/U.K. ■Email: help.cctv@hanwha.com

■Arecont Vision/U.S. ■Email: support@arecontvision.com

Features:

EOC IX8060 Thermal Camera Features:

• E fficient and powerful thermal imaging – inexpensive thermal IP camera and specialized S/W, real-time thermal video imaging for live temperature monitoring • Effective multi-channel thermal monitoring – provides effective multi-channel thermal monitoring with specialized VMS S/W (max. 120 channel monitoring) • Useful additional functions of specialized S/W – provides handy multi-channel thermal monitoring with features such as max. temperature, 3-step alarms, voice warnings, etc.

IndigoVision Enterprise NVR-AS Features:

February 2017 ● www.asmag.com

• D istributed Network Architecture (DNA) – intelligence is at the edge of the system with no reliance on a central server; provides resilience and redundancy • Firewall – a security feature that regulates incoming and outgoing network traffic to guard against potential malicious attacks on the system • JPEG2000 – a still-image compression standard that allows images to be displayed in multiple resolutions • 30fps is guaranteed at the maximum resolution using IndigoVision’s unique video processing technology • H.264 – a motion-based video compression format ■IndigoVision/U.K. ■Email: IR@indigovision.com

• S upportive network protocols for device control – provides flexible interface for easy device control with TCP/IP type network protocol. • Built-in PoE (IEEE 802.3af) allows easy and cost-effective installation; power supply is secured in case of power failures with back-up power ■EOC/Korea ■Email: sales@eoctech.net

FLIR Systems GFx320 OGI Camera Features:

• C apable of visualizing methane, propane, butane, and hundreds more hydrocarbons and volatile organic compounds (VOCs) • Independently tested and certified for use in hazardous locations • Designed with the operator’s comfort in mind, with features that allow users to maintain three points of contact during operation

■FLIR Systems/U.S. ■Email: visiblesales@flir.com

Digital Watchdog DW Witness Mobile Application Features:

• • • • • •

ontrols the recording from the app C Supports front and rear cameras Provides a “Black Box” for vehicles or personnel Video resolution: 1080p, 720p, 480p or 288p Frame rate: 30fps, 25fps, 15fps or 5fps Auto flash, flash on or off

■Digital Watchdog/U.S. ■Email: patrick@digital-watchdog.com

60

• A ppends required GPS data to images and videos, and verified to meet sensitivity standards defined in US EPA OOOOa methane rule • Rubberized optics and rugged camera housing designed specifically for tough work environments • Calibrated for temperature measurement so users can insure thermal contrast between gas compounds and the background


Lenel OnGuard 7.3 Security Management System Features:

• L enel Console app included • App support for optional OnGuard credentials module • Support for Lenel BlueDiamond Mobile, HID Mobile Access, Allegion aptiQmobile • Integrated authentication of FIPS-201 credentials on LNL-4420 • OnGuard/Prism bi-directional event exchange ■Lenel (part of UTC Climate, Controls & Security)/U.S. ■Email: orderentry@lenel.com

Vicon Valerus Video Management Software Features:

• B uilt on ONVIF standard foundation – widely adopted industry common open protocol • Single point of management and operation • Intelligently lowers bandwidth demands and increases storage capacity • Three-tier licensing levels and protection packages offer room to grow • Separate modules safeguard against risk of interruption

360 Vision Technology Eclipse HD Stainless Steel Camera Features:

• F ull 1080p high definition camera • Anti-corrosive 316L stainless steel • Onboard LED illumination – IR or IR and White Light options • Built-in wiper • Sony Starvis camera module – Ultra Low Light • 30x optical zoom

■Vicon Industries/U.S. ■Email: sales@vicon-security.com

■360 Vision Technology/U.K. ■ Email: info@360visiontechnology.com

Matrox Graphics Maevex 6100 Quad Encoder Card Features:

• • • • •

4 K/UHD and Full HD multi-channel capture, encode and stream AV-over-IP Transmission of live or recorded content to and from multiple video-on-demand platforms H.264/MPEG-4 Part 10 (AVC) RTSP, RTP and MPEG2.TS streaming support with an onboard RJ45 network connector Capable of simultaneous streaming and/or recording to shared network drives or network attached storage

■Matrox/Canada ■Email: graphics@matrox.com

AXIS Companion Dome WV Camera Features:

• W ireless communication with support for IEEE 802.11a/b/g/n • HDTV 1080p video quality and 2-MP resolution and WDR • Comes with a 64 GB AXIS Companion Card included • HDMI output for connection to monitors • Vandal- and dust-resistant ■Axis Communications/Sweden ■Email: axis-sap@axis.com

Panasonic i-PRO Extreme WJ-NX400 Network Disk Recorder Features: • • • • • •

6 4 Channels – max. 128 (H.265/264) 384 Mbps recording bandwidth Secure communication and Symantec device certificates Built-in GUI and dual HDMI outputs External storage expansion up to 270 TB Dynamic HDD power management increases HDD life

■Panasonic Security System/Japan ■Email: panasonicwebcasesf@us.panasonic.com

Tascent InSight One Iris and Face Recognition System

■Tascent/U.S. ■Email: info@tascent.com

Features:

• C aptures high quality dual iris and face images in about 2 seconds at a standoff distance of 0.5 to 1.0 meters • Customizable LCD and LED user interface is seamlessly integrated into the precision-crafted aluminum enclosure • High quality face and iris images that meet or exceed demanding ISO/ICAO standards for format and quality • Fully automated capture process supported by real-time feedback enables intuitive operation even for non-acclimated users • On-demand face capture for multiple poses • Can be integrated as a secure locked-down network appliance or point-to-point USB peripheral

61


Show Calendar

Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

WORLD SECURITY EXHIBITION DIRECTORY MARCH

PROTECT

ISC BRASIL

JUNE

• Date: 2017/04/18–04/20 • Venue: Expo Center Norte, São Paulo, Brazil • Tel: +55-11-3060-4717 • Email: atendimento@reedalcantara. com.br • URL: www.iscbrasil.com.br

IFSEC INTERNATIONAL

• Date: 2017/03/07–03/09 • Venue: Pak-China Friendship Centre, Islamabad, Pakistan • Tel: +92-21-111-734-266 • Email: info@safesecurepakistan.com • URL: www.safesecurepakistan.com

• Date: 2017/03/29–03/30 • Venue: SMX Convention Center, Manila, Philippines • Tel: +632-818-6828 • Email: leverage@leverageinternational.com • URL: www.protect.leverageinternational.com

• Date: 2017/06/20—06/22 • Venue: ExCel London, London, U.K. • Tel: +44-20-7921-8231 • Email: ifseccustomerservice@ubm. com • URL: www.ifsec.co.uk

APRIL

MAY

JULY

• Date: 2017/04/05–04/07 • Venue: Sands Expo & Convention Center, Las Vegas, U.S.A. • Tel: +1-203-840-5602 • Email: inquiry@isc.reedexpo.com • URL: www.iscwest.com

• Date: 2017/05/03–05/05 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-7966-222-505 • Email: agnius.kazlauskas@ubm.com • URL: www.ifsec-global.com/philippines/

SECUTECH INDIA

EXPOSEC

• Date: 2017/04/06–04/08 • Venue: Bombay Exhibition Center, Mumbai, India • Tel: +91-22-4286-3800 • Email: info@secutechexpo.com • URL: www.secutechindia.co.in

• Date: 2017/05/23–05/25 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: info@fieramilano.com.br • URL: www.exposec.tmp.br

SECUTECH INTERNATIONAL

SECUREX

• Date: 2017/04/12–04/14 • Venue: Nangang Exhibition Center, Taipei, Taiwan • Tel: +886-2-8729-1017 • Email: kirsten.wu@newera. messefrankfurt.com • URL: www.secutech.com

• Date: 2017/05/30–06/01 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: leighm@specialised.com • URL: www.securex.co.za

SAFE SECURE PAKISTAN

SECURITY SHOW • Date: 2017/03/07–03/10 • Venue: Tokyo Bright Sight, Tokyo, Japan • Tel: +81-3-3512-5670 • Email: tradefairs2017@smj.co.jp • URL: https://messe.nikkei.co.jp

EXPO SEGURIDAD • Date: 2017/03/14–03/16 • Venue: Centro Banamax, Mexico City • Tel: +1-203-722-7351 • Email: joliver@reedexpo.com • URL: www.exposeguridadmexico.com

MIPS • Date: 2017/03/21–03/24 • Venue: Expocentre Fairgrounds, Moscow, Russia • Tel: +7-499-750-08-28 • Email: valentina.michaelson@ite-exhibitions.com • URL: www.securika-moscow.ru

ISC WEST

IFSEC PHILIPPINES

SECURITY EXHIBITION & CONFERENCE • Date: 2017/07/26—07/28 • Venue: International Convention Centre Sydney, Darling Harbour, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au

AUGUST

SECUTECH VIETNAM • Date: 2017/08/16—08/18 • Venue: Saigon Exhibition & Convention Center (SECC), Ho Chi Minh City, Vietnam • Tel: +886-2-8729-1016 • Email: stvn@newera.messefrankfurt.com • URL: www.secutechvietnam.com

CompanieS in ThiS iSSue COVER STORY •Dahua Technology PRODUCTS OF THE MONTH • Bell & Wyson • Cognitive Systems • Fortress Cyber Security • Mu Design • Ring • Symantec • Yubico February 2017 ● www.asmag.com

SMART TECHNOLOGY • Allegion • AMAG Technology • Cisco Systems • Corporate Warders • iOmniscient • Optex Europe • PureTech Systems • Senstar • Sonitrol New England • Terma 58

MARKET DYNAMICS •FLIR Systems • GD Guardian Trading • Naung Yoe Technologies • NKTECH CAMBODIA • Robert Bosch • Vicon Industries • V-SAFE PRODUCT EXPLORATION • 2N • Aiphone • Axis Communications • BXB Electronics • Comelit • Ermes Elettronica • TOA • Zenitel VERTICAL SOLUTION • ABB • Ademco Security Group • ADP Tech

• ASSA ABLOY Hospitality • Control4 • Fujitsu • HDL • Kaba • LEAPIN Digital Keys • Mode:Green • NEC • Oncam • Savioke • WIS Holdings

nexT iSSue

SPECIAL FEATURE • ASSA ABLOY • HID Global • Security Risk Managment Consultants • Stanley Healthcare • TDSi • Zebo Asia

MARKET DYNAMICS | Singapore VERTICAL SOLUTION | Universities PRODUCT EXPLORATION | VMS SMART TECHNOLOGY | VCA


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

FRONT COVER, 3, 5

DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

2

GENETEC

SOFTWARE

CANADA

info@genetec.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

11

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

9

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

INSIDE BACK COVER

PANASONIC SYSTEM NETWORKS CO., LTD.

VIDEO SURVEILLANCE

JAPAN

-

7

SEAGATE TECHNOLOGY LLC

STORAGE

SINGAPORE

apj.sales.enquiry@seagate.com

63

SHENZHEN COMMANDER TECHNOLOGY CO., LTD.

CASING

CHINA

sjw@yjdcase.com

4

SONY ELECTRONICS ASIA PACIFIC PTE. LTD.

NETWORK MONITORING SOLUTIONS

SINGAPORE

pro.info@ap.sony.com

SURVEILLANCE STORAGE

TAIWAN

Jessica.liu@wdc.com

INSIDE FRONT COVER, 1 WESTERN DIGITAL TAIWAN CO., LTD.

OTHERS PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

31

BOANNEWS CO., LTD.

EXHIBITION

KOREA

global@seconexpo.com

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

63


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.