a&s International Jan. 2013 (Trial Version)

Page 1


Jan 2013

Vertical Market

Fuse Physical & IT Security to End Power Thirst 78

Over the past couple of years, there have been a lot of buzz and concern over the security of critical infrastructures, particularly power grids. Recent serious high profile incidents and attacks have proved the relative ease and ability of physical- and cyber-attacks — both of which have the potential to cause the catastrophic failure of important utility services.

Viewpoint

Special Feature

34 M&A and Investment Trends in the

Security Industry 38 What's Driving 2013? 42 2013 - Never a Dull Moment 46 Key Product Trends in Video Surveillance

70 ALPR/LPR Attracts

Commercial Adoption

Proven to be effective in various applications, automatic license plate recognition (ALPR/LPR) is a fast growing technology. Back in 2008, the global ALPR/LPR market was estimated at US$119 million, according to IMS Research. By the end of 2012, the industry has expanded to $350.4 million, a 6.9 percent growth from 2011.

14 22

JAN 2013

www.asmag.com

22


More on iPad.

Jan 2013

Product Exploration Download “a&s Magazine” app now.

Beyond Visitor Management:

Comprehensive Access Control Security can be very video-dependent. However, having access control management integrated with surveillance, intrusion alerts and logical access as an ultimate security management platform (SMP) enables a wider range of possibilities.

58 Integrating Physical and Logical Security Creates Opportunities

50

Industry Report

Business Talk

88 Asian Manufacturers Reevaluate and

92 How to Save Your Business From Doom

Restructure

No one wants to run a doomed business. But how do companies stay competitive? Value analysis is all about adjusting strategy to remain relevant.

14 18 20 20

16 22

JAN 2013

www.asmag.com

22

Contents Editor’s Note Corporate News Market Observer

30 102 104 107

Products of the Month Show Calendar New Products Companies in This Issue


EDITOR'S NOTE a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies

New Opportunities

developments in CCTV, Digital Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home Automation and other fields relevant to electronic security.

Looking back at 2012, the tone was somber as people around the globe were shocked and saddened by the Dec. 14 Sandy Hook Elementary shooting where 20 young children and two adults died. The tragedy initiated numerous discussions regarding gun control and exposed the poor security measures currently in use on school grounds. As a member of the security industry, I personally offer my condolences to the brave adults and innocent children who passed. Let us not allow their lives to be lost in vain, for their precious sacrifice serves as a wakeup call on the importance of security to society as a whole. Let this be the point where we start to take more initiatives to crime prevention to secure the people we love and the things that we care about. Stepping into 2013, there are still exciting happenings in the industry to look forward to. One of these activities that we have observed is the broader application of security devices; security equipment is no longer used for merely preventing crimes or providing forensic records. These days, developers have become well aware of the value of the massive amount of data ebbed from video cameras and access control and alarm systems. After decoding, the data can be translated into useful information related to customer/user behavior. Through analysis of the information, one might be pleasantly surprised by the valuable secrets that might be uncovered, and that is why the industry turned to new video analytic technologies to unlock big data. In this issue's "Products of the Month," we selected software, which has adopted a new technology that synchronizes historical events and objects after additional tracking and analyzing. This innovation will allow users to get the most out of their big data. In relation to the IT industry, General Electric recently announced a plan to develop its data analytic intelligence in the coming years. In a fashion similar to what IBM and Oracle are doing, GE plans to monitor roughly 250,000 machines that they had previously installed. By analyzing the data, GE expects to find the perfect formula for managing energy consumption and business operations more effectively. If GE can successfully interpret their big data, the company estimates that it could save millions or even billions of dollars in fuel consumption and improved system efficacy over the next 10 years. With many experts commenting that 2013 might lack major security technological breakthroughs, GE’s future plans might provide our industry with some worthy new ideas and concepts. Finally, I hope that one day, in the not so distant future, surveillance cameras in every corner of the world will be used to record humanity’s happy and precious times. Happy Year 2013!

Jill Lai

jill.lai@newera.messefrankfurt.com

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shih General Manager Editorial General Press Jill Lai Editor in Chief Alf Chang Senior Consultant Reporter Tevin Wang Alyssa Fann Reporter Christina Phillips Reporter Christine Chien Coordinator

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com tevin.wang@newera.messefrankfurt.com alyssa.fann@newera.messefrankfurt.com christina.phillips@newera.messefrankfurt.com christine.chien@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Circulation & Subscription

Collins Yuan Michelle Shih

Group Manager Coordinator

collins.yuan@newera.messefrankfurt.com michelle.shih@newera.messefrankfurt.com

Corporate Management

Juihui Lin Thomas Pin Chihung Lee

Assistant to Managing Director Account Manager IT Manager

juihui.lin@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

asmag.com

Hayden Hsu Jerry Wu

Web Editor in Chief hayden.hsu@newera.messefrankfurt.com Assistant Sales Manager jerry.wu@newera.messefrankfurt.com

Secutech & Events (Overseas)

Sandra Chen Tina Chang

Project Manager Assistant Manager

sandra.chen@newera.messefrankfurt.com tina.chang@newera.messefrankfurt.com

Secutech & Events (Domestic)

Veronica Chen Group Manager

veronica.chen@newera.messefrankfurt.com

International Advertising [Headquarters]

Joanne Wu Kay Yang Audrey Fang Helen Chen Jessica Lee

Assistant Sales Manager joanne.wu@newera.messefrankfurt.com Operation Officer kay.yang@newera.messefrankfurt.com Coordinator audrey.fang@newera.messefrankfurt.com Coordinator helen.chen@newera.messefrankfurt.com Assistant jessica.lee@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Cemre Ilkan Evris Consolos Muris Hadzic Manish Gandhi Tim Shen Y. C. Suh Takashi Komori Nguyen Thu Ha

USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam

bobbie@globetrottermedia.com produzione@ethosmedia.it cemre.ilkan@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz tim@asmag.com.cn ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com

Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s Taiwan, a&s International, a&s Asia (above published in English) a&s China, a&s Installer, and a&s Solution (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2013 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

18 22

JAN 2013

www.asmag.com

22


Product Exploration

Beyond Visitor Management:

Comprehensive Access Control Security can be very video-dependent. However, having access control management integrated with surveillance, intrusion alerts and logical access as an ultimate security management platform (SMP) enables a wider range of possibilities. In this article, a&s explores some of the most demanding market segments where integrated access control, security solutions and enterprise resources benefit all stakeholders. By Tevin Wang

50 22

JAN 2013

www.asmag.com

22


T

he demand for access control is not arbitrarily measured by the quantity of doors. According to Harry Mai, Assistant VP at Hundure, the scale of a project is measured by a variety of variables, as each one is highly customized. “Usually the biggest indicators of scale for a system are the number of readers, the number of locations, the complexity of multilayered security

and how many subsystems need to be integrated.” Access control industry is very customization-driven. “The scale of a project is not only measured in the number of doors to be secured, but also the level of integration and customization required. A project with a small to medium number of doors may have additional requirements such as integrations

22

JAN 2013

or customization that will make it a much larger scale project,” said Oonagh Fearon, Marketing Communications Manager at CEM Systems (A Tyco International Company). “Similarly, a project with a large number of doors to secure can be a relatively small scale project if there are no additional requirements or additions to the access control system.”

www.asmag.com

22 51


Product Exploration

such as email, CRM and HR systems. Low total cost of ownership is another customer demand, said Holger Maier, Product Manager Security Systems of Bosch Security Systems. Key Features

▲ Access control plays a primary role in security, especially for time and attendance.

The difference between small o r m e d iu m pro jects and large projects is how the system is used. “When looking at small, and even medium-sized implementations, the vast majority are being utilized forensically, specifically running reports on information after the fact and searching for video,” said Eric Joseph, Solutions Engineering Manager at S2 Security. “In large implementations, the user is usually monitoring the system in real time, and reacting accordingly to situations as they arise. The advanced integrations used by different system users are usually dictated by their vertical market. For example, it is very typical for college and university clients to integrate their access control and security management system with a student management system. For health care clients, infant abduction and patient wandering integrations are very common. And in the federal government space, integrating with government watch lists is usually required.”

Small projects Verticals

Small projects tend to be single

52 22

JAN 2013

buildings such as small and mediumsized enterprises (SME), residential apartment complexes, retail outlets and primary schools. Integrated Subsystems

With the access control system at the core, SMP can include subsystems such as time and attendance and HR, logical access, intercoms, car park, elevator control, intrusion alarms, visitor management, and surveillance. Common Demands from End Users

Ease of installation and usage are needed for smaller projects. High value to cost ratio is another important factor, said John Davies, MD of TDSi. Web-based software is an important prerequisite as well, as customers access the majority of their other business systems through the Internet,

www.asmag.com

22

Access control plays a primary role in security, especially for time and attendance. Video surveillance integration is another hot feature. “When using a fully integrated access control and video system, video can easily be searched by selecting the cardholder and searching for all instances of video containing that cardholder,” Joseph said. “Using sophisticated metadata tagging, this information is readily available in a fully integrated systems.” Easily obtainable security

Harry Mai, Assistant VP, Hundure

Eric Joseph, Solutions Engineering Manager, S2 Security

Holger Maier, Product Manager Security Systems, Bosch Security Systems

Ajay Jain, President and CEO, Quantum Secure


Product Exploration

management information is crucial, specifically access control and video information. “Most of these types of users are not very familiar with security management systems, so making a system easy to understand is paramount,” Joseph said. Events such as a door forced open can be attached to the associated video for quick playback, while images and associated audio from cameras are recorded and stored, said Steven Lewis, Senior Product Manager of Tyco Security Products Benefits

A solution that integrates access c o n t ro l a n d v i d e o i n a s i n g l e application provides the benefits of operational efficiency and simplicity. Such integration removes the need for multiple servers as well as the need for separate management applications. Delays occurring as a result of paper- or email-based interactions between the IT and physical security teams are eliminated, said Ajay Jain, President and CEO of

Medium projects tend to include several buildings on a single campus, site or complex. Quantum Secure. Human errors are minimized and the manual effort for assigning condition-based access is automated.

visitor management, surveillance, cashless payment, library, and mass notification.

Medium projects

Users

Verticals

Medium projects tend to include several buildings on a single campus, site or complex. They can be K-12 school districts, municipal governments, libraries, museums, cultural centers, factories and small hospitals, data centers, and banks. Integrated Subsystems

A midsize project includes several systems: time and attendance/HR, logical access, intercoms, car park, elevator control, intrusion alarms,

▲ The focus of the management is information from a variety of different sources all tied into a single application.

54 22

JAN 2013

www.asmag.com

22

Common Demands from End

A midsize project has higher security requirements than small projects do. Both look for ease of installation and usage. However, midsize applications need integrated access control that is customization-friendly, has system interoperability and scalability, and provides high security that is futureproof yet cost-efficient. The system interoperability needs to cover basic building automation. Key Features

Access control is just as important as in small-scale projects. The major difference is putting multiple applications on a single card. “When the operators sit down at their workstation, they are able to view access control, intrusion and video information through a single user interface,” Joseph said. "When an event in any of the systems occurs, it is immediately brought to the operator’s attention. At this point, they can click on the event to pull up the corresponding video as needed, or acknowledge the event quickly and easily. The focus of the management is information from a variety of different sources all tied into a single application, ideally providing a central repository for running reports on all of the stored data.”


Product Exploration

Benefits

Operation efficiency, enhanced s e c u r i t y a n d c o n v e n i e n c e a re benefits. A comprehensive platform should reduce the cost of physical security operations by offloading the process of access requisition to end users, while increasing end user satisfaction with physical security services by providing visibility into the status of their requests, Jain said.

Large projects Verticals

Large projects cover a significant area and have the highest security needs. Several types of projects include federal government; utility companies; oil and gas; airports; transportation; critical infrastructure; universities; and large multinational corporations such as health care or finance with multiple sites.

More on iPad.

Integrated Subsystems

Subsystems include but are not limited to the following: time and attendance and HR; logical access; intercom; car park; elevator control; intrusion alarm; visitor management; surveillance; cashless payment; library; mass notification; Active Directory (AD) and Lightweight Directory Access Protocol (LDAP); real-time location systems; asset management; additional building management system and vertical market-specific system. Common Demands from End Users

End users need scalable systems that can grow as their organization grows, as well as systems that can be easily managed as it grows. Ease of customization, management and integration of business and

ONVIF to Add Access Control Specifications in 2013 Submitted by Dr. Michael Luetzeler, Siemens Building Technologies, Member of ONVIF Steering Committee The ability to integrate surveillance with access control is no longer considered a luxury in the market, but a necessary step to providing a comprehensive picture of security operations to an end customer. Using products that conform to interoperability specifications such as ONVIF, those integrations are simplified with the use of a common interface. ONVIF’s pending release of its specification to include access control functions such as door monitoring and control will govern interoperability between access control and video surveillance systems, as well as between individual components of an access control system. The release is planned for 2013. Physical access control systems integrated with network video devices would use the specification to position a PTZ dome camera for recording a person’s entry after a card swipe at a particular door, or activating network video recording on an invalid card swipe. By providing a common language, an access control standard will allow a system that enables IP door controllers from a variety of different manufacturers to browse devices, creating a list of types of readers and connections, and subscribe to card reader and door controller events. The same standard would also be used for device discovering and management, and controlling the outputs of the system, such as opening and locking doors, enabling or disabling access points, or switching networked field devices on and off.

56 22

JAN 2013

www.asmag.com

22

Download “a&s Magazine” app now.

building systems are priorities for large projects. “When dealing with a large system user, many have multiple sites and their primary goal is to have all sites act autonomously, without a single point of failure,” Joseph said. “Open to third-party systems, highly customizable, reliable and robust 24/7/365 operation are common demands as well,” Maier said. Key Features

The focus of the management platform is visibility into each of the sites and locations displayed on a single application. Another priority is the overall security of the building and maximum utilization of the card, said Wei Jin Lee, Sales Director for ASEAN, HID Global. Bosch's solution includes alarm management with many clients and bidirectional interfaces to third-party systems like supervisory control and data acquisition, enterprise resource planning systems and physical security information management. Benefits

The benefits of a single solution connecting multiple sites include e n h a n c e d s e c u r i t y, c e n t r a l management, data tracking and backup. Other advantages include multiple applications on a single card, cost and manpower reduction, operation efficiency and the avoidance of single point of failure. “SMP also eliminates the manual effort involved in collecting and reporting on compliance-related data,” Jain said.


Product Exploration

Integrating Physical and Logical Security Creates Opportunities Access control management not only integrates with surveillance and intrusion systems, but is ready to embrace logical access as well. We examine top application requirements for the integration of physical and logical access, how they are integrated, potential integration challenges, selection criteria, and future development. By Tevin Wang

T

he number of devices connected to the Internet passed the 5 billion milestone in 2010 and is expected to reach 22 billion by 2020, according to IMS Research (an IHS company). This reflects the explosion of personal devices such as smartphones and tablet computers, and includes all sensors, cameras and devices used in security that are now IP-enabled. With the proliferation of IP convergence, this has a dramatic impact on physical security and IT departments in terms of network design, bandwidth optimization, and most important of all, the safety and security of an organization. Physical security has matured in network capability. More cameras are IP-based; card readers use IP networks instead of a proprietary network; and access lists, policies and procedures are stored and generated by computers. The connectivity of IP speeds the migration of legacy sensors and appliances to networks, highlighting the importance of physical and logical security integration. “As long as organizations treat

58 22

JAN 2013

▲ Combining physical and logical security processes simplify management of the security infrastructure and increase visibility to user resources.

their physical and cyber domains as separate, there is little hope of securing either one,” said Scott Borg, Director of the US Cyber Consequences Unit. "The convergence of cyber and physical security has already occurred at the technical level. It is long overdue at the organizational level."

Requirements

Identity management requires modifying identity in both the physical and virtual worlds.

www.asmag.com

22

“Synchronization of an identity between the access control management system and the logical system, whether that be Active Directory, LDAP or some other system, the connection of these two identities is the most important aspect of the integration of physical and logical security,” said Eric Joseph, Solutions Engineering Manager, S2 Security. “The ability to limit a user’s ability to log on to a system based on their access control activity, such as activating their IT


Product Exploration

user privileges only once the access control system can confirm they are in the facility, and then removing their IT privileges once they have left the facility.” Utilization of a single credential for both physical access into a facility as well as logical access at a workstation is usually requested, said Steven Lewis, Senior Product Manager at Tyco Security Products. Integration with other business systems such HR systems, student enrollment systems or network printers are common as well. “For instance, the addition of access card readers on network printers allows the user-requested print job to be accessed and printed when physically at the printer. This prevents wasteful use of ink and paper, which also eliminates unauthorized viewing of any documents.”

Physical and Logical Synchronization

Combining physical and logical security processes simplify management of the security infrastructure and increases visibility to user resources. This makes it easier to detect and prevent security incidents, and provides a platform to manage the response and recovery after an incident occurs.

The integration should deliver complete, multilayered and versatile authentication. It should also provide broad support for authentication devices and methods. The goal is better prevention of malicious denial of service attacks, improved and more streamlined incident management when breaches occur, and more efficient risk management, said John Davies, MD of TDSi. The system should use an open standard platform that integrates with existing computing environments such as Windows, Linux and Mac for desktop authentication. “When enterprises need to upgrade their system, they should be able to simply download firmware updates or deploy field-upgradable solutions,” said Wei Jin Lee, Sales Director of ASEAN, HID Global. “Another important consideration is for organizations to future-proof their investments for deploying converged physical and logical access control on mobile platforms. The ability to securely embed a digital credential into NFC-enabled smartphones for permission-based access control makes smartphones an ideal platform for carrying multiple types of physical and logical access credentials.”

Benefits

The true benefit to the end user is the increased level of security. “By automating the integration between the physical and logical systems, identities are automatically deactivated upon termination of an employee, removing any chance of someone forgetting to remove or deprovision an identity,” Joseph said. “Additionally, it reduces the opportunity for logical accounts to be hacked by only allowing them to be accessed by valid cardholders in the facility.” Lowering total cost of ownership and increasing return on investment are obvious benefits. “The end user saves time and money because they are only managing one system and using one credential for both systems, rather than two separate credentials,” said Kim Rahfaldt, Public Relations Manager of AMAG Technology. A c c e s s c o n t ro l c o n v e r g e n c e enhances security by enabling a single smart card to support multiple authentication methods. “For instance, physical access credentials can be reused for logical access including strong desktop authentication,” Lee said. "Additionally, converged access solutions help organizations enforce consistent policies, and they foster the use of consolidated audit logs throughout the enterprise."

Manageability and Selection Criteria

Steven Lewis, Senior Product Manager, Tyco Security Products

60 22

JAN 2013

John Davies, MD, TDSi

Wei Jin Lee, Sales Director, ASEAN, HID Global

www.asmag.com

22

Network stability and bandwidth will influence system performance, especially if there is video surveillance involved. “One of the biggest network challenges we face is educating the IT department on the effect of a security management


Product Exploration

software system on the network,” Joseph said. “When initial conversations are started, the IT department can be very standoffish about having additional systems and information riding on their network, and potentially slowing it down. Once we are able to explain the minimum impact access control events have on the network, this becomes alleviated. Additionally, with video recording being done at individual sites or on the edge, and streamed back to security operations centers as needed, video bandwidth can be managed in a much easier way.” The deployment does not stop at the IT department. “The management of access control systems regularly include several departments within an organization such as HR, IT, building management, parking services, food services and of course security management,” Lewis said. “It is imperative that the management t e a m s w i t h i n t h e s e t e a m s a re aligned with consistent policies and procedures to ensure the performance of the platform is not affected.” Another challenge of traditional s y s t e m s i s s o f t w a re u p d a t e s . Microsoft regularly provides service

packs and other updates to the Windows operating system for maintenance purposes. “This leads to increased responsibilities for the IT department,” Joseph said. “As we are able to provide alternatives to Windows-based systems, we are easily able to avoid these challenges and reduce the strain on IT departments.” A c c e s s c o n t ro l m a n a g e m e n t systems have long life spans of t y p i c a l l y m o re t h a n 1 0 y e a r s , meaning there is more to think about than the initial cost. One of the most important considerations when purchasing and installing the system is total cost of ownership. For total cost of ownership, four key points should be taken into account: cost of acquisition, cost of installation, cost of operation, and cost of maintenance. Cost of acquisition means the procurement of the actual components, usually the easiest aspect to quantify and usually a place where some people stop the evaluation. “Next is the cost of installation. This cost can be greatly affected by not only the integrator that is installing the system, but also

▲ As long as organizations treat their physical and cyber domains as separate, there is little hope of securing either one.

62 22

JAN 2013

www.asmag.com

22

the specific system being installed,” Joseph said. “Traditional systems that run on a client/server architecture inherently require more time to install as software has to be manually installed on the server as well as on each and every individual client workstation. When looking at some more advanced systems, such as browser-based security management systems, this is not the case. There is no application software to load onto individual client workstations as it all accessed via a Web browser, and the requirement to install software on a server is removed when utilizing a preconfigured appliance.” Cost of maintenance should b e co n s i d e re d. A c ce s s c o n t ro l management system has a very long life span, which can be three times the life of a video management system. “With that in mind, the cost of upgrading and maintaining becomes an enormous consideration,” Joseph said. “When looking at upgrading a browser security management system, all that required is upgrading the head-end, opposed to upgrading the head-end and then going out to each and every client workstation to upgrade them as well. The benefit of running an appliance as the head-end is that the upgrades are done quickly and easily with a single upgrade file, oppose to having to upgrade the operating system, the database and the application, like a traditional Windows-based server.” Full service availability such as training, pre-sales, after-sales, service maintenance agreements should be considered as well, said Holger Maier, Product Manager Security Systems at Bosch Security Systems. “[Other factors include] openness to other vendor’s hardware, zero downtime, reliability and robustness.”


Product Exploration

Challenges and Future

Regulation and standardization will make convergence a reality. For now, proprietary systems make true integration difficult. “Currently the access control industry isn’t as tightly regulated to the degree that the intruder and fire industries are. In Europe, the existing EN 50133 standard has been around for a while but isn’t used by everyone because the technology has moved

on so rapidly,” Davies said. “There is, however, a new IEC standard which started development about 18 months ago and is currently out for parallel voting. As is usual with a lot of standards when in development, there are some good points and some contentious points. It is refreshing though to see a new standard being developed at the global level and what is encouraging is the speed at which this standard has evolved.”

Socomec chooses HID Global Solutions Socomec is an innovative leading French manufacturing group, specializing in secure low voltage power supplies for industrial and service sectors. With a US$484 million turnover in 2009, Socomec employs 2,600 people globally, where nearly half of the staff works in the Strasbourg headquarters in France. As a leader, Socomec always puts innovation, quality and security at the forefront to ensure a secure environment for its employees. In 2009, Socomec wanted to find a solution to provide its production staff secure and convenient access to a PC while ensuring low maintenance for the IT department. “There are several people working in this factory who did not have access to PCs since their work is focused on the production line,” says Daniel Wendling, IT Manager Socomec. By not having access to the company’s intranet, the production staff was not aware of the internal communications distributed by the management team and the fact that they were not located in the main building, where all administrative functions are, was leading to the issue of isolated staff. Additionally, the worker’s union suggested that all staff members should have access to PCs, not only to gain access to relevant internal information, but also to have access to the Internet during their breaks at work. As a first attempt, Socomec provided its employees with a few shared PCs within the factory’s facility. The IT team created a few generic shared accounts but the challenge was the secure management of all the workstations with multiple users’ passwords. It became a big administration problem for the IT department and definitely was not a viable solution. “We needed a system that was sustainable, cost-effective and easy to use, so that users could log on to their own accounts easily and securely and my team could maintain their accounts with minimum time and effort,” Wendling explained. ISLOG, a proactive customer of HID Global, who recommended that Socomec deployed HID on the Desktop solution to leverage its physical access control installed five years ago, is a French company specializing in RFID tools and information security operating across Europe. The installation of HID on the Desktop, consisting of the existing HID Prox cards, OMNIKEY 5325 CL USB Prox contactless desktop readers and naviGO credential management software, was carried out last December, 2009. Moerel reaffirmed that there was a full agreement between Socomec’s Security Manager and the IT department during this process. “The installation in the

64 22

JAN 2013

The challenge of educating system integrators about IT know-how affects access control. “[We found it hard] to find and certify good sales partners or system integrators in all parts of the world to handle the combination of many different domains, from access control over surveillance to fire and building management plus IT and network knowledge,” Maier said.

Submitted by HID Global

workstations and the compatibility with the existing cards was carried out smoothly and quickly. Now each employee has access to workstations with their own personal card and a simple four digit PIN number.” HID on the Desktop has led to significant additional cost savings and time reductions on some manual administrative tasks such as the online access of pay slips via the intranet. Employees can now also have access to the company’s regular internal communications and the global directory. This possibility for online access has facilitated a more agile and effective flow of communication within the organization. “More importantly for us, our production employees feel more integrated and part of the team, which is a big improvement in staff motivation,” stated Wendling. HID on the Desktop has also reduced the management of the workstations in a more organized and secure manner. “It has dramatically reduced the number of queries to the IT helpdesk team. Now my team can remotely track any anomaly, which allows a more organized and easy management,” explained Wendling. Socomec is a great example of convergence and multiple usage of cards. Not only has the company deployed the physical and logical access control, but Socomec employees also use their ID cards for other applications, such as time and attendance management at their production sites and cashless payment at the staff restaurant. The convergence of physical and logical access and other applications, and the easy deployment of extending the existing card population have helped Socomec implement cost-effective and time-saving procedures, allowing an improved and more secure working environment.

www.asmag.com

22


*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 55 95 15 CARD INSIDE FRONT COVER, 1 3 BARN DOOR, 13 63 57 8 41 69 9 7 BACK COVER 73 35 67 FRONT COVER, 6 25 77 112 48, 49 75 INSIDE BACK COVER 5 59 4 19 77 65 107 81 81 31 75 12 23 53 45 21 2

ADVERTISER ACTIONTOP ELECTRONICS (SHENZHEN) CO., LTD ADVANCE VISION ELECTRONICS CO., LTD. AXIS COMMUNICATIONS AB AXXONSOFT LTD. CNB TECHNOLOGY INC. COMART SYSTEM CO., LTD. DAHUA TECHNOLOGY CO., LTD. DEEPLET TECHNOLOGY CORP. DONGYANG UNITECH CO., LTD. DYNACOLOR INC. FUHO TECHNOLOGY CO., LTD. FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. GKB SECURITY CORPORATION HDPRO CO., LTD. HIKVISION DIGITAL TECHNOLOGY CO. LTD. INDIGO VISION ITXSECURITY CO,. LTD. KYODENSHA TECHNOLOGIES (M) SDN BHD MERIT LI-LIN ENT CO., LTD. MICRODIGITAL INC. MINRRAY INDUSTRY CO., LTD. MINTRON ENTERPRISE CO., LTD. NEXTCHIP CO., LTD. OB TELECOM ELECTRONICS CO., LTD. PANASONIC SYSTEM NETWORKS CO., LTD. PINETRON CO., LTD. POWERTECH ELECTRONICS CO., LTD. SAM MYUNG SEEEYES CO., LTD. SHENZHEN COMMANDER TECHNOLOGY CO., LTD SHENZHEN HUANGHE DIGITAL TECHNOLOGY CO., LTD SHENZHEN LESHI VIDEO TECHNOLOGY CO., LTD. SHENZHEN SAFER SCIENCE AND TECHNOLOGY CO., LTD. SHENZHEN WENSHENG MOUDL PRODUCTS CO., LTD. SJ MICROTECH CO., LTD. SUPERIOR ELECTRONICS CORP. T.O.M. TECHNOLOGY INC. TAMRON CO., LTD. THREE BRAIN TECHNOLOGY TRUEN CO., LTD. VIVOTEK INC. WEBGATE INC.

MAJOR ITEM SURVEILLANCE IP SOLUTION NETWORK VIDEO SOLUTIONS VIDEO SURVEILLANCE CCTV DVR SURVEILLANCE DVR CCTV IP CAMERA / NVR CAMERA/DVR DOME COVER CAMERA / DVR / IP CAMERA CCTV DVR SURVEILLANCE CAMERA CAMERA IP CAMERA / NVR CAMERA / IP CAMERA / HD-SDI CAMERA / DVR SPEED DOME / CAMERA CAMERA CHIP FIBER OPTIC TRANSCEIVER DIGITAL SURVEILLANCE DVR CCTV DVR SURVEILLANCE CASING SURVEILLANCE SURVEILLANCE SURVEILLANCE CASING CCTV CCTV / ACCESS CONTROL / SENSORS DVR CAMERA CCTV CAMERA IP CAMERA/ SOFTWARE/VIDEO SERVER DVR

COUNTRY CHINA TAIWAN SWEDEN RUSSIA KOREA KOREA CHINA TAIWAN KOREA TAIWAN TAIWAN CHINA TAIWAN KOREA CHINA KOREA MALAYSIA TAIWAN KOREA CHINA TAIWAN KOREA CHINA JAPAN KOREA KOREA KOREA KOREA CHINA CHINA CHINA CHINA CHINA KOREA TAIWAN KOREA JAPAN KOREA KOREA TAIWAN KOREA

E-MAIL sales@actiontop.com info@amegia.com contact-sap@axis.com info@axxsonsoft.com korea@cnbtec.com sales@comartsystem.com overseas@dahuatech.com sales@deeplet.com.tw sales@d-max.co.kr info@dynacolor.com.tw exp_sales@fuho.com.tw sales@fjsmt.com sales@gkbsecurity.com sales@hdprocctv.com overseasbusiness@hikvision.com sales@indigovision.com sales@itxsecurity.com enquiry@elock2u.net sales@meritlilin.com sales@microdigital.co.kr minrray@mingricctv.com service@mintron.com.tw sales@nextchip.com overseas@obtelecom.com --sales@pinetron.com powercctv@powert.net contact@rifatron.com overseas@sscctv.com sjw@yjdcase.com sales@histream.cn vip@lsvt.com.cn overseas@safer.com.cn cai@szwensheng.com sales@sjmicrotech.co.kr info@superior-elec.com export@tomtech.co.kr newbiz@tamron.co.jp younglee@tbtcctv.com sales@truen.co.kr sales@vivotek.com support@webgateinc.com

MAJOR ITEM ACCESS CONTROL FINGERPRINT RFID MODULE / LOCK / READER HOME NETWORKING FINGERPRINT LOCK BIOMETRIC, ATTENDANCE

COUNTRY CHINA MALAYSIA TAIWAN KOREA KOREA CHINA CHINA

E-MAIL anson@ansoncorp.com info@fingertec.com promag@gigatms.com.tw sales.ezon@samsung.com sales@supremainc.com yli@yli.cn sales@zkteco.com

ADVERTISER ATSUMI ELECTRIC CO., LTD. TYCO FIRE &SECURITY

MAJOR ITEM ALARM ALARM

COUNTRY JAPAN CANADA

E-MAIL international@atsumi.co.jp emeasales@tycoint.com

ADVERTISER HT INC. SCENE ELECTRONICS (HK) CO., LTD SEAGATE TECHNOLOGY LLC SONY CORPORATION SEMICONDUCTOR GROUP TRIPLE DOMAIN VISION CO.,LTD

MAJOR ITEM SEMICONDUCTOR ILLUMINATOR STORAGE SEMICONDUCTOR IVA(INTELLIGENT VIDEO ANALYTICS)

COUNTRY KOREA CHINA SIGNAPORE JAPAN TAIWAN

E-MAIL sjkang@ht-ics.com sales@led-scene.com sales@seagate.com

UNITED KINGDOM

ACCESS CONTROL PAGE NO. 37 39 43 11 17 61 10

ADVERTISER ANSON (SHENZHEN) TECHNOLOGY CO., LTD FINGERTEC WORLDWIDE SDN BHD GIGA-TMS INC. SAMSUNG SNS CO., LTD. SUPREMA INC. YLI ELECTRIC LOCK CO.,LTD ZKTECO INC.

INTRUSION ALARM PAGE NO. 67 33

OTHER PAGE NO. 27 69 32 28, 29 47

tonytan@tdv.com.tw

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.