a&s International May 2013 (Trial Version)

Page 1


May 2013

Product Exploration

Fisheye Cameras Do More with Less for

44

Wide-Area Surveillance Fisheye cameras have been around for years, but real-life adoption seems to be limited. Two reasons for slow uptake were a limited number of fisheye offerings plus a limited amount of VMS integration.

52 Understand How to Deploy Fisheye Cameras

Viewpoint

Case Study

34 Mind the Gap: The Impact of a

Value-Added Biometrics Create Better Services and Data Management 74

Diverging IP Market 36 What to Look for in Buying HD-SDI Products 38 Major Conglomerates Fall Behind in Product Sales?

The use of biometrics for authentication has gained momentum, as it reliably verifies identities. New solutions offer customizable features for security personnel to quickly adapt to various applications.

Editor’s Note

18 Will the Boston Marathon Bombing

Create the Next Boom in Security?

14 22

MAY 2013

www.asmag.com

22


May 2013

Vertical Market

Getting the Most Out of Black Gold 64

With crude oil being an expensive commodity that holds the position of a key factor in each and every economy of the world, it is clear that oil rigs and refineries must be protected from threats. However, ensuring safe operations and efficiency can be just as crucial.

68 Constructing an Integrated Security

System for Refineries

Company Spotlight

Special Feature

92 AxxonSoft Celebrates Tenth

Anniversary and Product Launch at IFSEC 2013 and Secutech 2013

Key Components Drive High Definition Surveillance

Readers’ Column

94 What Readers Say About Us?

The security industry is experiencing a rapid transition to networked products, switching from traditional analog products to digital network products. Needless to say, key components in video surveillance products drive the revolution of technology.

84

14 20 20 30

16 22

MAY 2013

www.asmag.com

22

Contents 96 Show Calendar Corporate News 98 New Products Market Observer 103 Companies in This Issue Products of the Month


EDITOR'S NOTE a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators

Will the Boston Marathon Bombing Create the Next Boom in Security? The Boston Marathon bombing in April was undoubtedly a successful story of using surveillance cameras to effectively assist crime investigation. This terrorist attack also later provoked many invaluable discussions on the security issue in countries worldwide. In Germany, we see some debates over the increase of public surveillance since privacy is usually the top consideration. However, in the U.K., where the most surveillance cameras are deployed in major metropolitan areas, market researchers still could not provide evidence to prove any strong correlation between the number of surveillance cameras and crime detection rates. "If CCTV had a direct relationship on crime rates, London would be the safest city in the world," says Nick Pickles, Director of Big Brother Watch in the BBC News. If we went back to the history of the security industry in the past 10 to 15 years, it can be concluded that the biggest drivers are still the major terrorist attacks around the world. The 9/11 event in 2001 ignited the first boom of the security industry. Next, in the aftermath of the tragic events at Sandy Hook Elementary School in December, 2012, K-12 schools across the U.S. are reassessing their security plans and considering upgrades of current security equipment. Many suppliers we interviewed at ISC West last month also confirmed the increasing demand from educational institutes in the U.S. for the following two years. Therefore, will the Boston Marathon bombing motivate the next boom of government spending toward city surveillance in the U.S. and also other major targeted countries for terrorists? According to the recent results from the Gallup Poll in the U.S., more than half of Americans consider another terror attack in the coming weeks. The report also shows Americans' confidence in the US government's ability to protect its citizens from terrorism declined to 70 percent, from 75 percent in 2011. Together with the previous observation, we can predict that US government spending will most likely pick up in the following years after the Boston Marathon bombing and “an increase in spending for video surveillance equipment could likely drive sales to exceed the already high expectations predicted for the global market,” also echoed IMS Research (an IHS company). Last, we also cannot ignore the influence of the Boston Marathon bombing towards security at sports events. A sports event that attracts national or international attention is more likely to become a "soft target" for terrorism. The bombing showed sports events now are major targets for violence against athletes and also fans. We can expect more high-profiled security measures and technologies for later international sports events as well.

Jill Lai

jill.lai@newera.messefrankfurt.com

and other product purchasers on product sources and identifies developments in CCTV, Digital Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home Automation and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shih General Manager Editorial General Press Jill Lai Editor in Chief Alf Chang Senior Consultant Reporter Tevin Wang Alyssa Fann Reporter Christine Chien Reporter Jessie Lin Coordinator

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com tevin.wang@newera.messefrankfurt.com alyssa.fann@newera.messefrankfurt.com christine.chien@newera.messefrankfurt.com jessie.lin@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Circulation & Subscription

Collins Yuan Michelle Shih

Group Manager Coordinator

collins.yuan@newera.messefrankfurt.com michelle.shih@newera.messefrankfurt.com

Corporate Management

Juihui Lin Thomas Pin Chihung Lee

Assistant to Managing Director Account Manager IT Manager

juihui.lin@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

asmag.com

Hayden Hsu Jerry Wu

Web Editor in Chief hayden.hsu@newera.messefrankfurt.com Assistant Sales Manager jerry.wu@newera.messefrankfurt.com

Secutech & Events (Overseas)

Sandra Chen Tina Chang

Project Manager sandra.chen@newera.messefrankfurt.com Assistant Project Manager tina.chang@newera.messefrankfurt.com

Secutech & Events (Domestic)

Veronica Chen Group Manager

veronica.chen@newera.messefrankfurt.com

International Advertising [Headquarters]

Kay Yang Audrey Fang Helen Chen Jessica Lee

Operation Officer Coordinator Coordinator Assistant

kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com helen.chen@newera.messefrankfurt.com jessica.lee@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Cemre Ilkan Evris Consolos Muris Hadzic Manish Gandhi Tim Shen Y. C. Suh Takashi Komori Nguyen Thu Ha

USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam

bobbie@globetrottermedia.com produzione@ethosmedia.it cemre.ilkan@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz tim@asmag.com.cn ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2013 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

18 22

MAY 2013

www.asmag.com

22


Corporate News Auckland Airport Chooses CEM Systems for Security Solution CEM Systems, part of Tyco Security Products, has been awarded the contract to secure Auckland Airport, New Zealand. ADT New Zealand was selected as the integrator in the project and will help install a security system at the airport’s domestic and international terminals. The security system will utilize CEM’s visual imaging and pass production system to allow security personnel to produce passes and access rights for staff and visitors. The airport will also use a visitor management system which will enable system users to request and manage temporary cardholders via a standard web browser.

CEM’s time and attendance module will also be installed, and a failover system will also be deployed to create a system with a high level of redundancy. In the event that the main server fails, the failover server will immediately take over until the main server is restored. In addition, the use of CEM’s portable card readers was key to the security upgrade at Auckland Airport. These readers enable on-site airport security staff to validate cards at remote sites or areas with no main power supply. The cards can also be used as mobile devices for random checks in emergency evacuations.

NFC-Enabled Devices to Boost in 2014

Checkpoint Intends to Sell Off Video and Intrusion Business

The number of NFC-enabled devices in use will exceed 500 million in 2014, according to ABI Research’s recent report. ABI calculated that a minimum of 285 million mobile and consumer electronics devices will ship in 2013 as OEMs continue to drive the market for NFC while mobile operators struggle to gain control and bring their services to market. Mobile manufacturers moved ahead with NFC in 2012 whilst mobile network operators were still largely focused on payments, where they have struggled to deliver tangible services. This has allowed predominantly Android OEMs to seize the initiative Higher NFC Phone as they have delivered new shipments in 2014 ser vices and features for connecting devices, sharing data and content, picking up information, and utilizing tags. Companies such as Blackberry and Samsung have developed and implemented clear strategies around NFC. Th e y a re d i f fe re nt i at i n g themselves as they look to generate new service-based revenue streams utilizing NFC. Other brands, such as LG and Sony, are taking a different NFC-enabled devices is path as they horizontally looking to exceed 500 integrate NFC across their million in 2014 broad product portfolios. Source: ABI Research

20 22

MAY 2013

www.asmag.com

Checkpoint Systems announced the company’s intention to sell its US and Canadian video and intrusion business, CheckView. Following an extensive review of Checkpoint’s portfolio in 2012, the company board determined that CheckView will better serve its customers as an independent, entrepreneurial, and more focused organization. Checkpoint will continue to pursue its redefined strategy to provide solutions that improve merchandise availability in retail stores. This planned divestiture is expected to enable focused attention and investment in both the CheckView business and Checkpoint’s core businesses. Checkpoint is committed to support CheckView throughout the sale process and the CheckView team is committed to ensure an orderly transition with full continuity of service to customers.

22


Corporate News IKEA in Spain Deploys Smart POS IKEA, the Swedish manufacturer of furniture and home products, deployed an intelligent POS surveillance system based on AxxonSoft's platform for its store in Murcia, Spain. A total of 32 cameras including both network and analog cameras were installed at the entrances, cash register, and checkout areas. The system was implemented by WAF Digital Structures and local installer Prosegur. An integrated security system to combine smart store surveillance with monitoring of cash register areas, as well as to track and prevent fraud attempts, was installed. Special attention was paid to entrances and nearby spaces, as well as to cash register areas. A total

of 12 analog cameras and four IP cameras made by Brickcom were installed at the store. Among these were 1.3-megapixel dome network cameras with digital and optical zoom. The checkout area was equipped with 12 cameras, while entrances were equipped with four. The integration also features alerts in case of repeated/unauthorized use of gift cards, which was a key requirement for a store like IKEA that regularly holds promotions and sales. The system includes two servers and a POS intellect module; three remote operators can use the system simultaneously.

44.2%

Market for Computer Vision $918 millionSolar Powered Radar and Processors Used in Automotive Video Surveillance Solution to Reach US$151M in 2013 Completes Trial in Abu Dhabi

Employee theft

million Automotive applications such as lane departure$377 warning and self-parking will be among the major growth drivers this year in Shoplifting and the market for embedded vision, an area of technology concerned ganized retail crime $35.4 million with enabling machines to “see� and interpret data from computer vision software. Revenue in 2013 for special-purpose computer vision processors used in under-the-hood automotive applications is forecasted to reach US$151 million, up from $137 million last year and from $126 million in 2011, according to the Worldwide Comprehensive Processors 2012 Report from IMS Research (an IHS company). Expansion will continue during Automotive Computer the years ahead Vision Processor Expects at rates ranging Strong Growth from 6 to 9 percent, confirming the solid and The revenue is builidngs prospects in store for expected to hit US$187 embedded vision, gs million by 2016 one of the fastesten growing trends in technology. By 2016, revenue is expected to amount to $187 million, equivalent to a six-year compound annual growth rate of 8.2 percent. Source: IMS Research

Millio

25.8%

2011

22

MAY 2013

2014

2009 Navtech Radar, the designer and manufacturer of commercialUS$364.4 millimeter wave intelligent radar solutions for outdoor commercial applications, has completed a proof of concept trail with their 1.6 Billion 2016 US$ Abu Dhabi-based integration partner Alliance Security, a division of Abu Dhabi-based alliance traffic systems, for a fully integrated radar and video surevillance site surveillance solution entirely run by solar energy. The millimeter surveillance radar system is ideal when integrated with the latest video surveillance and solar panel t e c h n o l o g y. T h e complete solution is specifically designed to enable full site surveillance in some of the most remote a n d c h a l l e n gi n g locations as the radar has a low power consumption that draws only 18-20 watts and is able to withstand at up to 65-degree Celsius.

2016

www.asmag.com

Analog

2014

IP

22


Corporate News Day Spa Improves Customer Experience with IP IQinVision, the provider of HD megapixel IP cameras, announced that the Woodhouse Day Spa in Indiana, U.S., has deployed its megapixel cameras at their facility to enhance guests’ security and overall quality experience. Homeland Technology Group is the integrator for this project. Working with Homeland Technology Group, the spa owners decided to remove the exisiting analog system and upgrade to IP video surveillance. Now, the Woodhouse Day Spa has 34 megapixel cameras deployed in various public areas, such as at the check-in and check-out

Gemalto Selected to Implement Ghana’s Visa and Border Management System Gemalto, the digital security solution provider, has been appointed as prime contractor and turnkey supplier to provide Ghana Immigration Services (GIS) with a highly secure electronic visa and border management solution. This initiative is part of the eGhana project, an ambitious plan with backing from the World Bank to create a modern IT infrastructure that can support the country’s sustainable development plans in the years ahead. Gemalto acts as prime contractor and will take responsibility for integrating the advanced visa and border management solution, including change in management, transitional training, and maintenance services. The company will deploy border management systems at Ghana’s main ports of arrival and will implement a fully computerized system for processing and issuing visa and permit applications, with the collaboration of Avalon Biometrics. The project also covers the set up of an online portal service for visa application and the implementation of electronic gates at Accra’s Kotoka International Airport for rapid, convenient, automated border control of arrivals and departures.

24 22

MAY 2013

counters, in the retail shop and laundry room, and outside the front entrance of the 10,000square foot facility (no cameras are installed in any treatment rooms). Video from the cameras is managed by Exacq Mobile video management software. The system is utilized 90 percent of the time for live monitoring and the rest for incident review. The security upgrade allows staff to monitor video at the check-in and check-out desks, as well as the employee break room; the spa manager can keep tabs on activities from a 52-inch monitor in the office.

Norwegian Mountain Resort Turns to Wireless Locks The 369 roomed Park Inn Trysil Mountain Resort in Norway recently deployed 471 electromechanical locks and 32 wall-mounted RFID readers supplied by Vingcard Elsafe to cover its 33,000-square meters facility. The inn, which is part of the Rezidor Hotel Group, Skistar and Peab, reopened on December 19, 2011 in the Norwegian ski resort of Trysil. Vingcard Elsafe, an Assa Abloy company, was commissioned to develop an access control solution to make it easier for technicians and reception staff to manage the doors, while providing guests with increased security and flexibility. Moreover, the newly developed software by Vingcard Elsafe's R&D department enables Skidata guests to use their lift pass to open the door of their hotel room at the resort and other participating facilities.

Dutch Brewery Deploys Comprehensive Security Management Established since 1718, Bavaria is one of the second oldest family-owned businesses in the Netherlands. The brewery employs about 1,000 employees both domestically and abroad, and exports 65 percent of its products to more than 120 countries. The company, which produces more than six million hectolitres of beer annually, needed a new security management system as its old security system faced retirement. The company replaced its aging security management system with Nedap's security management platform. The project included the installation of card readers, IP cameras, intercom, and visitor registration, all integrated with the security management platform. The system was implemented by Dutch system integrator Imtech. A decisive factor in deploying the security management platform is due to its open standards and technology. It also combines features including access control, IP video management, and intercom in a security controller. The platform's scalability is future-proof and can meet the growing needs of Bavaria.

www.asmag.com

22


Corporate News

More on Tablets.

UK Council Capitalizes on Wireless Surveillance Great Yarmouth Borough Council in Norfolk, U.K., is pioneering a video surveillance approach set to transform wiring expenses into a revenue stream that supports local business and helps residents get connected. By teaming up with The Cloud, the British Sky Broadcasting Group's public access WiFi provider, the council converted its 60-camera analog surveillance system ran on a leased fiber network into a wireless system. The idea was put forward and implemented by Quadrant Security Group, a Synectics company and the council's long-standing video surveillance integration partner. By implementing its own wireless video surveillance system, moving

Ghana Airports Operator Keeps All Hands on Servers Ghana Airports Company Limited (GACL) recently deployed FingerTec fingerprint readers to provide a higher level of security for the company server room. The system was implemented as part of GACL's plans of not only becoming a provider of world-class airport facilities and services, but also to meet the needs of their valued customers and stakeholders’ expectations. The system was implemented after the airport operator consulted with an authorized FingerTec distributor, Telecomputer Network Systems. After consultation sessions between the two companies, Telecomputer acknowledged GACL's needs for a higher security level in its server room while not necessarily overlooking the verification logs, even though they were not currently keen on using time management functions. With this fact established, GACL was presented the fingerprint reader, which comes with bundled time attendance management software. With the software provided, it was possible for them to easily view any transaction records and configure the terminal's functions.

26 22

MAY 2013

away from leasing a fiber network, Download “a&s Magazine” app now. and teaming up with The Cloud, the council is on track to make the system cost neutral and eventually generate revenue for the town. Under the new partnership agreement, The Cloud provides free WiFi across the town center. This enables the local population to go online, browse emails and social networks, and also use streaming services from their mobile device. Once the initial outlay for the system is covered, the income generated will help fund for local services.

Eyelock Partners with Capco to Better Cater to Banks EyeLock announced a partnership with Capco, a global business and technology consultancy dedicated to the financial services industry, to implement iris authentication security solutions across the financial services sector. Capco recently launched its secure banking and capital markets practice. The goal of this practice is to increase security for financial institutions by implementing EyeLock's iris authentication technology as the cornerstone of the practice. Eyelock's solutions include cost-out physical security strategies such as keyless branch conversion. Additionally, solutions are aimed at increasing logical security for customerfacing applications, online and mobile systems, such as ATM access, account opening, check clearing, wire transfers, and mobile banking, among others. EyeLock estimates that by implementing this technology, tier one banks will be able to eliminate annual recurring costs of approximately US$45 million over the course of the first two years by using keyless bank entry for employees and vendors alone.

Italian Incinerator Kisses Military Presence Goodbye with IP The incinerator at Acerra is a waste-to-energy plant built in 2009 in the province of Naples, Italy. The plant has received widespread attention from the media, partly due to the presence of the Italian army brought in to monitor the site due to protests and demonstrations against the plant’s construction. In order to bring an end to military surveillance of this area, Partenope Ambiente, the waste management company for the plant, chose to deploy an IP-based video surveillance system. I.R.T.E.T. is the system integrator for the project. A total of 28 fixed HD network cameras and six PTZ domes were installed at choke points, such as pedestrian walkways and vehicle routes, allowing for strategic, timely monitoring of activity. The fixed HD network camera was chosen with regard to identification, color reproduction, and high transmission speed. The model uses H.264 compression standard, and offers motion detection and audio tampering alarms. The domes come with wide-angle 35x zoom, and a function that enables the cameras to be rotated and tilted to 20 degrees above the horizon, which is especially useful for monitoring uneven ground. Replacing human eyes with cameras, the deployment of the video surveillance system puts an end to military supervision and alleviates media attention.

www.asmag.com

22


Products of the month

StarDot Digital TV Security Cameras Using digital television standards instead of IP, StarDot’s multi-channel long distance coaxial cameras (MCLDC) utilize ordinary RG59 or RG6 cabling allowing up to 16 cameras to run on the same cable for a distance of 1,000 feet. Similar to how digital content is delivered to household television, camera images were compressed in H.264 format and transmitted through the television “channels” inside the cable. A receiver box transmits the streams to a NVR via the familiar IP network. Digital television tuner cards can also be integrated into the NVR, eliminating the IP bottlenecks. The integration process is very much like that used with analog cameras, except that MCLDC streams are available in high megapixel ranges and has zero compression issue. The transmission method is also more reliable. The data is Key Features carried on as many as 1,700 slower • Up to 16 cameras on a single 1000 feet cable run, and up to 3000 feet with one camera pathways per camera stream, with full data • Easy to replace in existing analog installations duplication and Reed Solomon error correction. This technology is fully compliant with European digital television • Self-healing network benefits provided standards and will work with a whole range of existing • No IT professional for maintenance needed equipment. • High resolution and cost less to build StarDot’s technology includes 80 billion operations-perSupplier second color processing with exotic features such as smart • StarDot Technologies sharpen with full 30 degree resolution edge detection on URL each pixel, and one clock per sample dual compressors. This • www.stardot-tech.com new technology was recently featured at ISC West 2013.

HID Global FARGO HDP8500LE Industrial Laser Engraver

Key Features

• Tactile surface relief

The FARGO HDP8500LE Industrial Card Laser Engraver from HID Global allows seamless • Customizable microtext integration of ID card printing, encoding, laser, engraving, and laminating into one • Multiple/changeable laser image machine, enabling increased credential and organizational security in a single pass. • Sub-surface image Leveraging the highly versatile laser engraving technology in card identity systems, the • Dye-sublimation printing solution introduces laser-engraved high security features onto ID cards and delivers a Supplier highly secure method of monochrome card personalization that etches features into • HID Global the card body itself for tamper-proof and highly durable personalization. Moreover, URL the technology creates multiple security attributes, including surface relief for tactile • www.hidglobal.com authentication, detailed microtext which defies duplication caused by standard desktop printers, and lenticular personalization for distinctive multiple laser images and changeable laser images. Attempts to alter engraved information will result in visible card damage. The HDP8500LE is recognized by the governmentto-citizen ID market for its superior tamper-evident personalization and its interoperability with the HDP8500 printer/encoder, enabling full-color and laser-engraved personalization of polycarbonate cards that are commonly required in extended-life government identity credentials. 30 22

MAY 2013

www.asmag.com

22


VIEWPOINT

Major Security Conglomerates Fall Behind in Product Sales?

Major conglomerates in the security industry appear to have cooled down their acquisition activity, decreasing the flow of product innovation and market share. At the same time, smaller specialist product manufacturers are altering the structure of the physical security industry through the forces of the Internet, innovation, and open standards. The security products business is now characterized by intense competition, but it is still possible for the major conglomerates to leverage their size and global reach in a market strategy that is to their advantage. Submitted By Memoori Business Intelligence

T

he message from the market seems clear; major conglomerates in the security business have given up on their long standing strategy of growth through acquisition. With the exception of Tyco, none of them has made a significant acquisition since 2010. In the five years prior to that they were all active in acquiring businesses both large and small, increasing their geographic scope and updating their technology. Instead the market now faces what Martin Gren from Axis Communications calls, “consolidation by starvation.” Axis fully expects that in 10 years time, the top ten companies in the world will own about 90 percent of the total video surveillance product market. This statement does not suggest that the major conglomerates will be excluded from the top 10, but they would have to either commit more resources to R&D or acquire some leading edge technology companies.

REASONS BEHIND THE DECLINE IN M&A

As the major conglomerates have turned off the acquisition tap, the flow of innovative products has declined and with it, market share has been lost. So why are they doing it? • They don’t think it is the right time to buy as the exit values of companies will fall? Trading conditions in the last three years have been difficult and margins have tightened. However, many medium and small specialist companies have grown rapidly and demand for their products is running annually well into double figures. Such companies can only be bought for a premium and buying unproven

38 22

MAY 2013

www.asmag.com

technology at low exit values is not the answer. • Difficulty in raising the required cash? This cannot be the reason as the conglomerates are cash rich and have access to plentiful supplies of low interest finance. • They see better opportunities to invest in other areas of their business? This is a strong possibility for companies such as Honeywell, Schneider Electric (Pelco), Siemens, UTC, Panasonic, and Samsung etc. Some are strong in energy conservation, smart grid, and aerospace, where they have made significant investments over the last three years. While conglomerates are turning away from growth through M&A, a “new economy” is now taking hold and nullifying a major advantage of these large companies — size. As venture capitalist Paul Graham put it in his statement, “It turns out that the rule ‘large and disciplined organizations win’ should be appended with ‘at games that change slowly.’”

“NEW ECONOMY” CHANGES INDUSTRY STRUCTURE

There are three main reasons why we expect the “new economy” to change the structure of the physical security industry. 1. The strong brand and channel infrastructure of the conglomerates which gave reach and efficiencies in marketing across the globe can now be achieved by small companies through the Internet at a low cost. 2. The pace of innovation is speeding up, not slowing down. Edge-based storage and advances in analytics

22


VIEWPOINT are creating more and more applications for IP video. 3. O pen standards are starting to take a hold and eventually the best of breed will be de rigueur. This will open up competition even further and will reduce entry barriers for smaller companies. Real competition will then kill off weaker companies and consolidation will come about through open market forces. We have, for the last three years, argued the case that a new model for the products business has kicked in with new innovative solutions that provide more than just better security. This has been achieved through advances in technology and by taking time out to focus on what customers need. Pretty basic, you would think, but moving to IP networking products has allowed security to integrate with the business enterprise, deliver true synergy, and win market share. The fact that products become more important in the “new economy” is not the reason why security conglomerates will be forced into decline. The reason why some are falling behind is that they are not matching the relative new starts in bringing new innovative products to market, and for some reason have abandoned their normal product strategy of acquiring a regular flow of new companies with such products. The second reason is that some are not clearly separating their product business from their systems business, and this causes confusion in the supply chain. System integrators are not keen to buy products from the major conglomerates who appears to be in competition with their systems operation, particularly when they believe that internal pricing will likely put them at a disadvantage. They need to be satisfied that there is no cross communications between the two operations. Whatever the reason, many are finding the security products business tough, but they are achieving more success in the system and integration business where size and scale is a basic requirement. It would seem that they feel more comfortable here. So the question is will they focus more on total solutions systems business that integrates security with their other activities in building controls, fire detection and lighting controls, and sell off their products business. We think that this is a strategy that could well be under review by some companies, but there are other possibilities.

40 22

MAY 2013

www.asmag.com

▲ Allan McHale, Director, Memoori Business Intelligence

Leveraging Size and Global Reach

The major conglomerates have a strong advantage when it comes to leveraging size and global reach in some of the fastest growing BRIC markets and some have had a presence there for many years. Analog systems still take the largest share of the video surveillance business in all these markets. In China, the biggest market by far, partly contributing to the dominance of analog systems may be that it is difficult to make the breakthrough with IP systems until the distribution chain strengthens. Local manufacturers who have entered late in the race are now moving ahead with this technology, but are still way behind western products. Some 15 years ago, fire detection systems in China moved almost overnight to analog addressable systems that cost double the price and no local manufacturers could supply them. Imported products flooded in and the local system installers quickly learned how to install them. Although moving from analog to IP requires more skills, it will happen and when it does, it will come quickly. Price is no longer king in western markets but cost of ownership made up of many factors is; this will also apply to China as IP takes hold and offers many different and improved solutions. Does this now leave the door wide open for the conglomerates and other specialist manufacturers of IP products to make the breakthrough with IP systems? We will watch with interest to see if this becomes a strategy that bears fruit. For more information on the physical security market including market sizing, structure, technology and investment visit the report page — http://www.memoori. com/portfolio/the-physical-security-business-in-2012/

22


Product Exploration

Fisheye Cameras Do More with Less for

Wide-Area

44 22

MAY 2013

www.asmag.com

22


Fisheye cameras have been around for years, but real-life adoption seems to be limited. Two reasons for the slow uptake were a limited number of fisheye offerings plus a limited amount of VMS integration. Things are changing as more camera manufacturers and management software providers pay more attention to fisheye optics and its benefits. We share the latest information on fisheye camera developments, advantages, and tips for selection and installation.

Surveillance By Tevin Wang

22

MAY 2013

www.asmag.com

22 45


Product Exploration

Fisheye? Panoramic?

Panoramic and hemispheric lenses have been used by photographers for decades. Nowadays, one can literally shoot images with panoramic or fisheye effects with smartphones. Still, what is common in the consumer electronics industry may be exotic in security. The panoramic camera offers both the 180-degree and 360-degree panoramic view using a single fisheye lens or several normal lenses. “For a panoramic camera using several lenses, the panoramic image is produced by stitching the images shot by each of the lenses,” said Osborne Fang, Marketing Manager at Brickcom. “On the other hand, the fisheye camera provides the panoramic image with a single lens. Due to the extremely wide viewing angle of the fisheye lens, the image is distorted and dewarping technology is needed to turn the image into a normal one, readable to the human eye. Hence, dewarping is one of the keys to the final image quality of the fisheye camera.” Petra Bennermark, Product Manager at Axis Communications, added, “A panoramic camera refers to either a camera that is mounted on a wall and gives a 180-degree view from the wall or a ceiling-mounted

Osborne Fang, Marketing Manager, Brickcom

46 22

MAY 2013

▲PTZ cameras require manual control and might therefore be pointing to the wrong place at the wrong time.

camera that gives a 360-degree view of the area below the ceiling. A camera with a 180-degree fisheye l e n s c o n st i t u t e s o n e t e ch n i c a l solution to such a camera. So I would say that a fisheye camera is a subset of panoramic cameras.” One way to envision a 180-degree view is to imagine standing in the center of an alley with your back against a wall. “Cameras mounted where your head is would be able to see the whole alley including both ends and the wall that your head is against,” said Ellen Cargill, Director of Product Development for Scallop Imaging (a division of Tenebraex).

Pluses and trade-offs

It is important that users understand what they get and what

Petra Bennermark, Product Manager, Axis Communications

they do not get from fisheye cameras. Fixed cameras, however mounted, cover narrow fields of view and multiple cameras are required to give adequate coverage of wide areas. PTZ cameras, on the other hand, require manual control and are therefore most often pointing to the wrong place at the wrong time. “A fisheye camera mounted on a wall or on the ceiling in the center of a room or area can cover a vast area with no blind spots, no moving parts, and no manual control required,” said David Myers, CTO at AMG Systems. “While not totally replacing fixed and PTZ cameras, fisheye cameras provide total coverage and reduce both the number of cameras required and the infrastructure required. The ability to follow a subject on a single

Greg Alcorn, Director of Global Sales, Oncam Grandeye

www.asmag.com

22

Steve Ma, Executive VP, Vivotek


Product Exploration

Understand How to Deploy Fisheye Cameras Fisheye cameras provide views from all angles, but must be set up properly to be effective. In this article, we take a closer look at suitable applications, what to expect, and installation tips. By Tevin Wang

F

isheye cameras are all about seeing everything in a scene more efficiently and effectively than with multiple cameras. A 3 6 0 - d e g re e s o l u t i o n e n h a n c e s situational awareness. This can sometimes be difficult as fixed or PTZ cameras have blind spots. The environment in which they are deployed may also make surveillance difficult. Fisheye cameras are also economical as they reduce licensing costs by requiring only one license instead of multiple cameras and licenses to cover the same area. By expanding horizontally, fisheye cameras allow security managers to cover an entire scene in a logical way without gaps or missing areas of coverage. “Previous solutions have involved installing cameras in strategic locations, supplemented by additional cameras with PTZ

David Myers, CTO, AMG Systems

52 22

MAY 2013

functionality,” said Alf Chang, Senior Consultant at a&s . “Now there are other options that allow the user to effectively reduce the number of blind spots in their field of interest and to achieve total situational awareness.” Below are what users can expect from fisheye cameras: • A huge field-of-view, hence total coverage with no blind spots • Unbroken surveillance on a single camera, no camera switching required • Massively reduced camera counts when covering large areas • The ability to go back and pan-tiltzoom around the scene during playback, which is impossible with traditional PTZ cameras Indeed, installing a single camera offering a 360-degree view provides greater situational awareness than a single camera normally provides.

Beesha Lin, Sales & Marketing Director, Airlive

Claire Huang, Product Marketing Specialist, Dynacolor

www.asmag.com

22

However, fisheye cameras are not a cure-all for fixed or PTZ cameras in every scenario, as the loss of detail plus pixel density drops are still their Achilles’ heel. “Depending on camera mounting height and distance from the subjects, what the user may not get from the 360 camera could be face recognition shots or car number plates. In these cases, the use of an additional fixed camera may be required, usually at an entrance or exit,” said David Myers, CTO at AMG Systems.

Verticals

Commercial: Retail and ATMs

Fisheye cameras are a great fit for retail stores, with wide-angle viewing for nondetailed monitoring and a more cost-effective solution, said Beesha Lin, Sales & Marketing Director at Airlive. Greg Alcorn, Director of Global Sales at Oncam Grandeye agreed. “More than 10,000 retail stores are currently using Oncam Grandeye technology, making it one of our most successful verticals. Customers are using our technology for two main reasons. Firstly, for situational awareness because 360-degree technology provides end users with coverage that has no blind spots and retrospectively analyzes a scene with speed and accuracy that no


Vertical Market

Constructing an Integrated Security System for Refineries a&s looks into the details and basic infrastructure of an integrated security system for refineries. According to different site requirements, the level of integration is also varied. The integration of access control, video surveillance, intrusion alarm, perimeter solution, fire and saftey, and refinery process control is standard in oil and gas industry. BY The a&s Editorial Team

O

il and gas plants are turning work with to integrate our security later retrieval and analysis, and even to industrial IT-enabling management platform with multiple as evidence for use by any necessary technologies to provide third-party systems including fire authorities,” added Simonetto. integrated power and automation and gas systems.” In addition, such a The overall objective for existing as solutions with open interconnectivity system can also be designed to guide well as new sites remain unchanged to enhance safety, profitability, and safety and security teams through, — maintain operations and avoid improve resources recovery. The for example, evacuation procedures unscheduled shutdowns. “The cost level of integration varies according while also overriding security pass of a shutdown is many times the to site requirements. For example, requirements for nearest exits. “All cost of preventing one, especially high risk, mission-critical locations the systems’ processes and actions through safety equipment failure or — vulnerable to even the slightest can be simultaneously viewed false signals. Over complication often change in temperature, or gas on screen and recorded for introduces opportunities for faults exposure — require more detailed Jan Johansson, Senior Director monitoring. “An integrated of Business Development, system can be programmed to APAC, Tyco detect temperature change, gas, smoke etc. to the smallest degree and immediately alert on site or remote surveillance teams with high definition coverage of the area in question should fluctuations be detected,” said Amedeo Simonetto, Amedeo Simonetto, Business Development Manager at Business Development Synectics. “It has become a standard Manager, Synectics approach with most of the sites we

68 22

MAY 2013

www.asmag.com

22


It has become a standard approach with most of the sites we work with to integrate our security management platform with multiple third-party systems including fire and gas systems.

and mistakes,” pointed out Johansson. He also adds, “Companies are still interested in solutions that provide remote diagnostics capabilities, and monitoring of safety equipment to minimize people visiting production sites for inspections.”

“With our security management platform, integration with process control systems is achieved for data (alarms/transactional data) using OPC/MODBUS industry standard, a communication protocol which enables two-way communication

Fire and safety devices can be integrated with video surveillance to enhance site safety.

22

MAY 2013

between the process control system and synergy, and for video via ActiveX or SDK,” shared Simonetto. Examples of typical configurations that are applied: • S torage of recorded footage at different frame rates and resolutions to fit the various processes, whilst streamlining information transmitted and stored. • E vents and alarms are stored, including associated recorded video, which can be accessed through the Process Control system when an alarm occurs. • Process Control alarms can be linked to live video, as well as recorded pre-alarm video, which can be played and displayed at the same time. • A ny number of cameras can be controlled by the Process Control system — with live and recorded video footage displayed simultaneously.

www.asmag.com

22 69


Special Feature

Key Components Drive

High Definition Surveillance

The security industry is experiencing a rapid transition to networked products, switching from traditional analog products to digital network products. Needless to say, key components in video surveillance products drive the revolution of technology. Just as we are entering a new era, so are the products of high-definition (HD), networked video surveillance. Manufacturers and end users are increasingly searching for products that can record better, provide clearer images, offer a wider view, enable smoother flow, and so on. With the overwhelming amount of such requests, it is only a matter of time until key components will witness a transformation in technology and application. In this feature, a&s explores updates for various key components. By Alf Chang, a&s Consultant

84 22

MAY 2013

www.asmag.com

22


B

efore delving deeper into key components, it is important to first understand the industry's supply chain and product technologies related to it. The following analysis is shown in Figure 1: • K ey Components Supply: This section of the chain is mainly composed of sensors, DSP/ISP, and optical lenses. Most manufacturers do not make their own components and source them from Japanese or Korean chip-makers such as Sony, Sharp, Panasonic, and Nextchip. • D evice Manufacturing: Most of the manufacturers focus on finished products, including

Image Sensors

There are two common solutions used by surveillance cameras to capture images. The first solution features a SoC bundled with CCD or CMOS sensor and an image signal processor (ISP), which provides the greatest cost benefits. Image results from this solution depend mainly on the features of the integrated ISP from chipset manufacturers, such as the 3A’s (further details later) or wide dynamic range (WDR). The

those who manufacture, produce, and assemble video surveillance products. • S ales Channels: Most security vendors in this section sell their products through dealers and distributors, but system integrators, builders, and contractors are used as one of the main sales channels as well. Figure 2 depicts the core technology of key components used in both the front and back end.

HD Developments

In 2012, HD surveillance products exploded into the market and quickly became the center of the main advantage of this solution lies in its flexibility, so the solution can be customized according to the application by controlling the frame rates or how the images are captured. The second most commonly used solution incorporates a front-end camera module, typically from Pixim, Hitachi, or Sony, to act as the image capturing device. The module is used in combination with either an application-specific integrated circuit (ASIC) or digital signal processor

spotlight. HD demand accelerated the migration to IP video. Seeing its potential, several vendors entered this field, which in turn, greatly expanded the product market. Not long after, the market became saturated with HD products, such as HD IP solutions from SoC suppliers like HiSilicon, Texas Instruments, Nextchip, and Intersil. With so many options available, choosing the right HD IP solution became the primary concern. Though the market is teeming with various solutions, most conform to two basic architectures — image sensors and DSP/ISP processors.

(DSP) to perform video encoding, transmission, and compression. In comparison, this solution is much more costly, as it uses a professional camera module to provide better raw images. Therefore, the performance of the network cameras are largely based on the integrated compression and transmission module, such as the ability to maintain a clear image in real-time even after compression. Manufacturers also take into consideration the following require-

Figure 1

Supply Chain and Related Technologies Sensor Image Processing Chip Optical Lens CCD Sony, NEC, Toshiba, Sharp

è

Produce, Manufacture, Assemble

Manufacturers of Video Surveillance System

CMOS

Image Capture Card

Aptina, Sony, Omnivision

Image Processor

DSP Chip

Server

TI, Philips

Surveillance Camera

SoC

è

System Design and Installation

Multinational System Integrators

è

Channel

Wholesaler/Distributor Reseller Importer/Exporter

Video Recorder

Nextchip, ST, A+ Logics, Pentamicro, Vineyard, NXP, Altera, Intersil, Ambarella, Altera, TI, Grain Media, HiSilicon Optical Lens Nikon, Ricoh, Canon, Tamron

22

MAY 2013

www.asmag.com

22 85


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 89 87 15 INSIDE FRONT COVER, 1 3 BARN DOOR, 13 81 8 60,61 77 79 97 9 7 BACK COVER 10 41 FRONT COVER,62,63 31 112 42, 43 93 INSIDE BACK COVER 5 4 93 73 91 103 33 55 82, 83 12 27 47 57 21 6 97 25 19 2

ADVERTISER ACTIONTOP ELECTRONICS (SHENZHEN) CO., LTD A-TEC SUBSYSTEM INC. AXIS COMMUNICATIONS AB CNB TECHNOLOGY INC. COMART SYSTEM CO., LTD. DAHUA TECHNOLOGY CO., LTD. DALLMEIER DYNACOLOR INC. EVERFOCUS ELECTRONICS CORP. FITIVISION TECHNOLOGY INC. FUHO TECHNOLOGY CO., LTD. FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. GKB SECURITY CORPORATION HDPRO CO., LTD. HIKVISION DIGITAL TECHNOLOGY CO. LTD. ICATCH INC. ITXSECURITY CO,. LTD. MERIT LILIN ENT CO., LTD. MICRO DIGITAL INC. MINTRON ENTERPRISE CO., LTD. NEXTCHIP CO., LTD. OB TELECOM ELECTRONICS CO., LTD. PANASONIC SYSTEM NETWORKS CO., LTD. PINETRON CO., LTD. RIFATRON CO., LTD. SHENZHEN COMMANDER TECHNOLOGY CO., LTD SHENZHEN HUANGHE DIGITAL TECHNOLOGY CO., LTD SHENZHEN LAUNCH DIGITAL TECHNOLOGY CO., LTD. SHENZHEN LESHI VIDEO TECHNOLOGY CO., LTD. SHENZHEN TVT DIGITAL TECHNOLOGY CO., LTD. SUN MYUNG ELECTRO-TELECOM CO., LTD. SUNELL ELECTRONICS CO., LTD. T.O.M. TECHNOLOGY INC. TAMRON CO., LTD. THEIA THREE BRAIN TECHNOLOGY TRUEN CO., LTD. TYCO SECURITY PRODUCTS UNITECHNO CORPORATION VIDEOTEC S.P.A. VIVOTEK INC. WEBGATE INC.

MAJOR ITEM SURVEILLANCE IP CAMERA / NVR NETWORK VIDEO SOLUTIONS CCTV DVR SURVEILLANCE CAMERA IP CAMERA / NVR CAMERA / DVR / IP CAMERA IP CAMERA / NVR CAMERA/DVR DOME COVER CAMERA / DVR / IP CAMERA CCTV DVR DVR CAMERA IP CAMERA / NVR CAMERA / IP CAMERA / HD-SDI CAMERA / DVR CAMERA CHIP FIBER OPTIC TRANSCEIVER DIGITAL SURVEILLANCE DVR DVR CASING SURVEILLANCE CCTV SURVEILLANCE SURVEILLANCE DVR CAMERA DVR CAMERA VIDEO SURVEILLANCE CCTV CAMERA SURVEILLANCE CAMERA IP CAMERA / SOFTWARE / VIDEOSERVER IP CAMERA/ SOFTWARE/VIDEO SERVER DVR

COUNTRY CHINA TAIWAN SWEDEN KOREA KOREA CHINA GERMANY TAIWAN TAIWAN TAIWAN TAIWAN CHINA TAIWAN KOREA CHINA TAIWAN KOREA TAIWAN KOREA TAIWAN KOREA CHINA JAPAN KOREA KOREA CHINA CHINA CHINA CHINA CHINA KOREA CHINA KOREA JAPAN USA KOREA KOREA UNITED KINGDOM TAIWAN ITALY TAIWAN KOREA

E-MAIL sales@actiontop.com sales@a-tecsubsystem.com contact-sap@axis.com korea@cnbtec.com sales@comartsystem.com overseas@dahuatech.com info@dallmeier.com info@dynacolor.com.tw marketing@everfocus.com.tw sales@fitivision.com exp_sales@fuho.com.tw sales@fjsmt.com sales@gkbsecurity.com sales@hdprocctv.com overseasbusiness@hikvision.com marketing@icatchinc.com sales@itxsecurity.com sales@meritlilin.com sales@microdigital.co.kr service@mintron.com.tw sales@nextchip.com overseas@obtelecom.com --sales@pinetron.com contact@rifatron.com sjw@yjdcase.com sales@histream.cn info@launchdigital.net vip@lsvt.com.cn overseas@tvt.net.cn sun2006@sunmyung.com sales@sunellsecurity.com export@tomtech.co.kr newbiz@tamron.co.jp info@TheiaTech.com younglee@tbtcctv.com sales@truen.co.kr emeasales@tycoint.com info@unitechno-cctv.com.tw info@videotec.com sales@vivotek.com support@webgateinc.com

MAJOR ITEM ACCESS CONTROL FINGERPRINT RFID MODULE / LOCK / READER HOME NETWORKING FINGERPRINT BIOMETRIC, ATTENDANCE

COUNTRY CHINA MALAYSIA TAIWAN KOREA KOREA CHINA

E-MAIL anson@ansoncorp.com info@fingertec.com promag@gigatms.com.tw sales.ezon@samsung.com sales@supremainc.com sales@zkteco.com

MAJOR ITEM ALARM ALARM INTRUDER DETECTION INTRUDER DETECTION

COUNTRY JAPAN KOREA KOREA ITALY

E-MAIL international@atsumi.co.jp overseas@isaso.com sensorpro@sensorpro.co.kr export@sicurit.it

ACCESS CONTROL PAGE NO. 39 23 67 11 17 49

ADVERTISER ANSON (SHENZHEN) TECHNOLOGY CO., LTD FINGERTEC WORLDWIDE SDN BHD GIGA-TMS INC. SAMSUNG SNS CO., LTD. SUPREMA INC. ZKTECO INC.

INTRUSION ALARM PAGE NO. 53 81 71 37

ADVERTISER ATSUMI ELECTRIC CO., LTD. KMT CO., LTD SENSORPRO CO., LTD. SICURIT ALARMITALIA S.P.A.

OTHER PAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL 95 ASIS INTERNATIONAL EVENT USA asis@asisonline.org 75 HT INC. SEMICONDUCTOR KOREA sjkang@ht-ics.com 51 PIXELPLUS CO., LTD SEMICONDUCTOR KOREA kahn@pixelplus.com 32 SEAGATE TECHNOLOGY LLC STORAGE SIGNAPORE sales@seagate.com SHENZHEN HOROAD ELECTRONIC TECHNOLOGY DEVELOPMENT CO., LTD PARKING METER CHINA sales@horoad.com 35 28, 29 SONY CORPORATION DSBG. SYSTEM LSI DIVISION SEMICONDUCTOR JAPAN Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.