A&S #I213 Sep.2016

Page 1

A051607 INTERNATIONAL-213 cover.indd 3

2016/9/20 上午11:51


CONTENTS

September 2016 www.asmag.com

VERTICAL SOLUTION

Metro and Rail Increasingly Driven by Data P. 46

P. 32 P. 64

SMART TECHNOLOGY

FINDING FACES TO INCREASE PUBLIC SAFETY

[MATCH]

FILES Name: Alejandro Estevez Age: 37 Ethnicity: Hispanic Gender: Male Residence: London, UK

*****

LAST MATCH

PRODUCTS OF THE MONTH

IoT Increases Connected Devices, but Cyber Threat Arises............................. 18 VIEWPOINT

Video Surveillance Trends Escalate Need for Storage Infrastructure....... 20 INDUSTRY REPORT

Smart Search Gains Eminence in a More Dangerous World...................... 46

MATCH98% The Logic of Integrating Physical and Logical Access Control...................... 64 SMAHOME

Voice Recognition, Smart Lighting to Remain Key Drivers for Smart Homes. ............................................................ 70

Women in the Security Industry......... 50 SEP 2016 ● www.asmag.com

What Will Drive More IT Companies into Security?........................................ 54

10

P. 40

INTEGRATED SYSTEM

BUSINESS TALK

Contents....................................................10 Editor’s Note.............................................12 Application Cases. ..................................14

CURRENT MATCH

News Feature...........................................24 Show Preview..........................................72 Companies in This Issue........................73

IOT

The Smart Factory Revolution is Here

P. 58

New Products...........................................74 Show Calendar. .......................................78


a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄

Global Business Landscape Changing While Security Industry Converges

SEP 2016 ● www.asmag.com

his August and September, major political and sports events forecast the changing global circumstances in the future. Changes are also being seen in the overall trends of the security industry. Vanderbilt Industries continued its second technological acquisition in security. Axis Communications finally acquired Canon’s marketing and sales force in North America and EMEA. First, in the macro-socioeconomic side, faced with different economic challenges, many developed countries have started to opt for protectionism – such as Brexit and the appeal of Donald Trump, which have made strong impact on globalization and free trade. The 2016 G20 Hangzhou Summit, held from September 4-5 in China, tried to build up a new code for globalization in the future. Right after the G20 Summit, the ASEAN Summit was held in Laos. According to CNN, this year’s theme was ‘Turning vision into reality for a dynamic ASEAN community,’ “where leaders are expected to talk about important issues currently facing the

Southeast Asian region. Topics such as South China Sea disputes, counterterrorism, trade and human rights are likely to top the agenda.” Early August, we also had the 2016 Rio Olympics held in Brazil. However, only around 80 percent of the tickets were sold, which is considerably lower than in London four years ago, even though they were sold at half the price. The 2016 Rio Paralympics is even worse, with 12 percent of tickets being sold. It tells us that a major international sports event may not always help boost the national economic growth. The Brazilian economy and its security market are still experiencing hardships. The global socio-economic status looks gloomy in the near future. While the developed countries tend to take a conservative attitude in global issues and business, the future outlook of developing countries might not be that promising like in the past. These might also tell why multinationals experience bigger growth challenges right now. We can also expect more mergers and acquisitions and corporate alliances in the security industry.

John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

General Press Jill Lai Editor-in-Chief Alf Chang Senior Consultant William Pao Reporter Lisa Hsu Reporter Prasanth Aby Thomas Reporter Emily Lin Editor

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Tzu-Yin Chien

Executive Designer Designer Designer

Circulation

Michelle Shih

Officer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com tzuyin.chien@newera.messefrankfurt.com

michelle.shih@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

asmag.com

Willy Wang

Manager

willy.wang@newera.messefrankfurt.com

Secutech

Peggy Wu Veronica Chen Jason Cheng Crystal Chen

Trade Fair Manager peggy.wu@newera.messefrankfurt.com Group Manager veronica.chen@newera.messefrankfurt.com Project Manager jason.cheng@newera.messefrankfurt.com Assisant Project Manager crystal.chen@newera.messefrankfurt.com

International Advertising

[Headquarters]

Israel Gogol Audrey Fang

Manager Officer

israel.gogol@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro U.S.A./Canada Carolina Pattuelli Europe (Italy) Osman Kanatli Europe (Turkey) Evris Consolos Europe (U.K.) Adis Hodzic Southeast Europe Manish Gandhi India Iris Lai Taiwan Cliff Kang China Y. C. Suh Korea Takashi Komori Japan Nguyen Thu Ha Vietnam Nikolaeva Olga Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn nikolaevaoe@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

jill.lai@newera.messefrankfurt.com

12

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices


APPLICATION CASES a&s PRESENTS SNAPSHOTS OF SECURITY CASES FROM ACROSS THE GLOBE TO PROVIDE UP-TO-DATE INFORMATION ON HOW PRODUCTS AND SOLUTIONS ARE BEING EMPLOYED IN DIFFERENT INDUSTRIES.

HOSPITALITY

ASSA ABLOY ENABLES MOBILE ACCESS IN CANADIAN HOTEL The Victoria Inn Hotel and Convention Center, a Winnipeg, Canada-based property offering 260 newly renovated guestrooms, has enhanced its security access and self check-in capabilities with the implementation of Assa Abloy’s Hospitality Mobile Access. This advanced new feature allows the property to adapt to the hospitality industry’s rocketing demand for faster, mobile device-compatible self-service options. Operating with Seos technology, Assa Abloy’s Hospitality Mobile Access works with a hotel’s property management system to allocate guestrooms and generate digital keys that are encrypted and securely delivered to the guest’s smartphones. The smartphone, in turn, places the key in a secure key vault

within the hotel’s mobile app. When presented to the appropriate lock, the app transmits the encrypted key via a secure-communication channel via Bluetooth, thus ensuring that only authorized users are able to receive digital key information and gain access. VingCard Signature RFID door locks likewise offer security with powerful

anti-cloning features that prevent unauthorized keycard duplication or guestroom access. Coupled with the Visionline security access software, the staff can also remotely monitor and control who has access to which areas and when, leveraging the ability to cancel suspect keycards before a breach in security occurs or worsens.

RETAIL

VIVOTEK ENHANCES PEOPLE COUNTING IN COLOMBIAN MALL

SEP 2016 ● www.asmag.com

The San Nicolás shopping mall in Antioquia, Colombia, has upgraded from its manual people counting procedure into a more effective IP-based VIVOTEK system. Traditionally, people counting at shopping malls is done manually, a responsibility assigned to security personnel or guards. However, they have other tasks to take care of, which prevents full reliability and

14

effectiveness of the process. This project had two stages of implementation. The first was establishing the infrastructure: the wiring, pipes, switches and the communication elements. The second phase focused on the installation of the cameras. It was also necessary to hold another week of testing to compare the results with manual counting and recordings.

The solution was installed in the six pedestrian entrances of the mall. Six units of VIVOTEK’s stereo network camera were installed — linked intelligently together by VIVOTEK’s professional video management software, VAST. The cameras were ideally mounted at a height of 3.6 meters and at a distance from the entrance of approximately five meters. When camera performance parameters were met, the percentage of accuracy of the system was found to be around 95 percent.

HOSPITALITY

DAHUA PROVIDES WIRELESS SECURITY FOR BAHRAIN RESORT

Dahua Technology applied innovative wireless solutions to provide extensive surveillance coverage for the Durrat Al Bahrain luxury artificial island chain. As the area drew increasing numbers of tourists, the resort owner needed a high-security solution that would cover all main areas. Since it is an island chain, traditional wired or simple wireless transmission methods would not suffice to support live video feeds over the large remote area. Dahua employed a solution entailing the use of 5.2GHz WLAN AP wireless HD camera products, including network speed dome, mini PTZ dome and HD ultra-smart network pinhole cameras. Additionally, connections for the 2-megapixel full HD network IR bullet cameras used were enclosed in waterproof junction boxes. Long-range 5.8GHz wireless video transmission devices as well as high-speed preview and playback digital video recorders (DVR) were also integrated into this solution. Multiple types of cameras now cover the island chain, sending feeds through long-range wireless transmitters to multiple HD DVRs. Because the recorders are more centralized and less devices and components are required, the entire system was able to be implemented at a lower cost.


IOT INCREASES CONNECTED DEVICES, BUT CYBER THREAT ARISES

Editor’s Note: The Internet of Things (IoT) has improved ease of connecting devices, but cyber threats are growing along with it. Today, physical security manufacturers are developing ways to secure enterprises by minimizing the threat of cyberattacks.

BOSCH BUILDING INTEGRATION SYSTEM (BIS) SOFTWARE VERSION 4.2

B

osch Building Integration System (BIS) software version 4.2 offers seamless integration with the Bosch digital public address and emergency sound/ mass notification system Praesideo, as well as enhanced cyber protection. Especially well-suited for mission or business critical applications such as government facilities, data management companies and critical infrastructure, BIS 4.2 also pushes ahead of security standards to improve cyber protection in access control and alarm management systems. New OSDP (Open Supervised Device Protocol) v2 Secure Channel controller-reader encryption is combined with established client-server and card-reader encryption to create continuous data security throughout each step of the access control process.

KEY FEATURES: • Integration of Bosch and third-party systems through deployment of OPC • All relevant information in one user interface • Fully embedded access control • Full event log for forensic investigations • Scalable system that grows with user needs Supplier: Bosch Security Systems / URL: www.boschsecurity.com

VISCOUNT SYSTEMS FREEDOM ENTERPRISE ACCESS CONTROL PLATFORM

F

reedom is a new approach to access control that can easily integrate with IT infrastructure, leverage advanced cloud computing methodologies, enable virtualization and mobility, and minimize threats from cyberattacks. Freedom offers a new paradigm from both a technology and deployment model, enabling a unique opportunity to move physical access control out of the realm of “facilities” and into the enterprise IT infrastructure where it is more easily managed by IT security managers and CSOs. Viscount’s Freedom Enterprise is an open platform, web-based software solution designed to integrate identity management (IDM) and video surveillance.

KEY FEATURES: • Cyber-secure: no local panels or databases • Instantly changes privileges based on threat levels • Software installed on a nonproprietary server and can be virtually deployed across multiple servers or in the cloud • Physical and logical security applications share a common database for synchronicity • Output mapping: one card presentation can affect all doors • Virtual muster: providing safety in emergency situations Supplier: Viscount Systems / URL: www.viscount.com

GENETEC OMNICAST VMS

WURLDTECH OPSHIELD NETWORK SECURITY DETECTION AND PREVENTION

O

pShield is an operational technology (OT) cybersecurity solution that delivers visibility across complex OT networks, enforces OT policy at the protocol command level and deploys with minimal or no operational disruption. OpShield monitors and blocks malicious activity and unintended disruptions to promote OT safety and protect productivity. KEY FEATURES: • Enables safe OT connectivity to protect people, processes and equipment • Preserves valuable production uptime • Protects OT efficiently, even with limited security staff and resources • Combines the protection of an OT protocol inspection engine, threat and vulnerability signatures, and non-disruptive network segmentation • Easy-to-use graphical user interface to easily manage security policy and vulnerability signatures Supplier: Wurldtech URL: www.wurldtech.com

O

SEP 2016 ● www.asmag.com

mnicast provides users with the flexibility to grow their systems over time, ensuring that they are never locked into a proprietary solution. With fielded deployments of up to 150,000 cameras and support for an unrestricted number of workstations, its powerful architecture allows users to reliably scale with the assurance that day-to-day operations will not be disrupted. Built-in and advanced security mechanisms prevent unauthorized access and protect users’ privacy. KEY FEATURES: • Hybrid cloud service enables organizations to transfer archived video recorded on-premises to the cloud • GPU-accelerated decoding displays more cameras and reviews video with greater fluidity from a single workstation with the ability to leverage graphic cards and embedded GPU to rapidly decode high resolution videos • Highly scalable VMS to reduce on-site hardware

18

• Failover and redundancy protection against hardware failure or network interruptions • Provides real-time notification of system status and health-related events • Offers greater security of sensitive data with secured communications between clients, servers and edge devices, the ability to encrypt video in transit or at rest, and exported video Supplier: Genetec / URL: www.genetec.com


Video Surveillance Trends Escalate Need for Storage Infrastructure With the massive amounts of data being gathered each day, storage is no longer a peripheral consideration for the industry. It is vital for organizations to implement a storage architecture that can readily meet future demands. BY Wayne Arvidson, VP, Video Surveillance and Security Solutions, Quantum

SEP 2016 â—? www.asmag.com

The best approach is to implement a tiered architecture, especially one that can be tuned specifically for processing video files and viewed as a single file system. Wayne Arvidson, VP, Video Surveillance and Security Solutions, Quantum

20

mart devices are popping up everywhere such as workplaces, transit stations, restaurants, cars and even homes. In turn, these devices are creating massive amounts of data. According to recent reports, approximately three exabytes of raw storage capacity was shipped to customers in 2015 to address the growth. With the explosion of sensorenabled, network-addressable devices out there, it is no wonder storage and data analytics are such hot topics, and both are affecting not only the way we live and work, but also how we use video-based data to protect ourselves.


COMPLEX SURVEILLANCE REQUIRES SPECIALIZED STORAGE INFRASTRUCTURES

THREE FACTORS DRIVING INDUSTRY TRANSITION The security and surveillance industry has undergone a steady transition in recent years, and the pace is accelerating. An industry long dominated by stationary analog cameras is embracing digital on a large scale, with high definition (HD) camera unit shipments exceeding analog cameras for the first time in 2015. High-resolution, multi-sensor panoramic cameras are fast-becoming the new normal for video surveillance, streaming more high definition images than ever before and requiring huge increases in storage capacity and performance to handle it. These new cameras produced 556 petabytes of data per day in 2015, and that is expected to steadily increase. In fact, the total RAW capacity of enterprise storage used just for video surveillance is expected to increase by 48 percent in 2016, according to predictions by IHS. By 2019, the average amount of data generated daily by new surveillance cameras is projected to reach 2.5 exabytes. In addition, retention times are also increasing. To adhere to regulatory requirements and protect against litigation, many companies and municipalities are keeping surveillance data much longer — years instead of days — and that is putting even more demand on storage infrastructures. Another factor forcing change in the industry is the ongoing maturation and expanded adoption of video analytics applications. Trends and patterns emerge as data is integrated from different inputs and analyzed over long periods of time. Analytics solutions are becoming more sophisticated, integrating video data with other systems and sensor input, and requiring data to be kept longer in order for patterns to be determined over time. As new use cases for these applications emerge, non-traditional business units are taking notice that video-based data — when integrated and correlated with data from other systems — can be used to make better business decisions. Logistics companies use video data to track cargo through ports and rail yards to improve efficiency. Retail companies use video to observe shopper behavior to make better decisions regarding product placement, store layout and advertising. Municipalities use video to analyze traffic flow, reduce congestion and increase commerce. Given the industry challenges and new uses for video-based data via enhanced analytics, storage is no longer just a peripheral consideration. It is the foundation of today’s — and tomorrow’s — security and surveillance system. As a result, storage architecture decisions need to be made carefully in order to meet the future demands.

Today’s storage infrastructure for video surveillance must be high-performing, scalable and affordable. It must provide the capability to keep video files for a long time while providing easy access and retrieval. The best approach is to implement a tiered architecture, especially one that can be tuned specifically for processing video files and viewed as a single file system. In a tiered architecture, multiple levels of storage exist. The architecture consists of a high performance disk, secondary disk, tape and cloud storage structured in tiers, enabling data sets to be stored on the most cost-effective medium based on user-defined policies. High priority, frequently-used files are stored on high performance disk, while lower priority files are stored on tape or in the cloud. Done well, the architecture provides a single file system view, and the system manages the movement of data between tiers keeping the metadata intact, allowing files to be retained economically for a long period of time and still remain accessible for analysis when needed. Whether implementing new fixed cameras, expanding existing installations or implementing new law enforcement solutions via body-worn or vehiclemounted cameras, selecting the right storage infrastructure is essential in order to build the right foundation. But regardless of which configuration is implemented, the full benefits of a tiered storage solution are available, including high-performance, scalable capacity; low-cost alternatives for long-term retention; and accessibility through a single file system interface.

Fixed Camera Environments Sometimes it seems that cameras are everywhere. Stationary cameras monitor public and commercial buildings, transit stations, ports and a host of other spaces, and more are installed every day. Camera counts can vary widely depending on

21


a&s EXPLORES TOPICS THAT ARE GENERATING INTEREST IN THE SECURITY INDUSTRY, OFFERING READERS IMPORTANT FACTS AND INFORMATION RELEVANT TO THEIR PROFESSION.

NEWS FEATURE

Iris may be More Accurate, but it's not Perfect Thanks to technology developments, biometrics iris solutions has grown to become more accurate, and able to read from further distances. Nevertheless the solution still has its shortcomings and limitations.

Customers Don't Realize the The rise of the Internet of Things has brought on the convenience of connected devices. However, one must be aware of the risks that may occur with these devices. BY The a&s Editorial Team

ith the Internet of Things (IoT) bringing in a range of devices that are interconnected, the security risks associated with them are at an all-time high. However, according to ONVIF, customers don’t really realize the level of vulnerability that they are exposed to with the advent of this new era in technology.

BY William Pao

to capture more data points from the image and FAR rates are often not measured by independent third-party governing biometrics authorities, it is widely accepted that iris recognition is considered more reliable than face recognition due to the increased data points used in iris-matching,” he said. However, notwithstanding iris’ superior identification capability, it is by no means perfect and still has its shortcomings and limitations. Specifically, it is limited by its reading range: since irises are tiny organs, reading them from a long distance becomes difficult. So the user has to stand extremely close to the reader,

“More and more, the technology has improved, now enabling a much more comfortable reading range.”

and that presents a “user interaction” challenge. “In the past, iris recognition was very invasive. Users literally needed to press their face against an iris reader for it to work,” Reed said, adding that the technology is further limited by the consumer’s perception that iris

SEP 2016 ● www.asmag.com

e ce n t l y, t h e re we re reports on iris solutions being deployed at end user entities, with owners of these entities touting the accuracy of the technology. I n f a c t , e xp e r t s d o a g re e t h a t accuracy is the hallmark of iris. During IFSEC, SRI International, a biometrics solutions provider, told us that a single iris has 250 points for identification and 500 for two, and false accept is one in 1.4 million for one and one in 1.4 trillion for both irises. L arr y Reed, CEO of ZKAccess, echoes that sentiment. “Although any biometric technology can be designed

24

recognition is somewhat invasive and can cause physical harm to ones’ eyes. “In business of course, consumer perception is reality regardless of validity, or lack thereof,” he said. More and more, the technology has improved, now enabling a much more comfortable reading range. But that comes with a price, literally. “No surprise though, there is a higher price tag associated with these longer-range iris readers,” Reed said. “So regarding ‘iris,’ the primary weakness or limitation today is the relatively steep price tag itself.” According to him, when compared with iris, facial recognition, which ZKAccess offers, presents a much less invasive solution. “Face readers on the other hand are perceived as much more comfortable for users to interact with on both a physical and psychological level,” he said. “Face recognition is also perceived as more user friendly (handsfree) when compared to other biometric methodologies which require actual contact (that is, fingerprint, finger-vein and hand-geometry).” Facial recognition does have its limitations too. Its reading capability is reduced when, for example, the light is too bright or when the person is not directly looking at the camera. Those problems however have been improved as well, due to 3D facial recognition which does not depend on pose and illumination, and therefore the representation of the object does not change with those parameters.


Risk of Connected Devices: ONVIF Speaking at a webinar organized by the research firm Memoori, Per Bjorkdahl, Chairman of ONVIF, indicated that there is a dire need for the customers to be educated at this stage. “In the security area, you really need to know what state your devices are in and development in the security industry through IP-connected devices have been really rapid,” Bjorkdahl said. “Customers are not cyber mature. They don’t see these problems really, they don’t realize the risk.” He added that the tricky thing, and the interesting thing, is that the very smart people that are out there, that have a vicious purpose, will sort of somehow try to get a finger into the gut somewhere. They will plant some sort of malicious code that will open up something.

“So customers need to be educated about this,” he said. The Internet of Things, by its very name, implies that everything is connected somehow. If things are connected to the Internet, they would be exposed. So we are looking at things like availability vs protection – if you want to make your product or your device available, you have to somehow compromise this, Bjorkdahl pointed out. Earlier if security professionals wanted to secure a device, they would seek to isolate it. But things have changed and the priority is to keep them connected. “We also have IoT vendors where they look at the big number of features and benefits that are brought to us with the IoT-type of systems,” Bjorkdahl continued, adding that they often forget about the real problems behind it. To people dealing with it, security is a process, not a product.”

“The Internet of Things, by its very name, implies that everything is connected somehow. If things are connected to the Internet, they would be exposed.”

So what is the ideal biometrics solution? According to Reed, that depends on the user’s budget and type of business. “If you’re safeguarding airport planes and passengers and can’t risk creating backlogs of people

standing in line at the security check point, perhaps a significant investment in long-range iris recognition makes most sense. However if you’re a typical small business needing only to restrict door access to employees and frequent

visitors, typically an inexpensive fingerprint or face reader is all you need, if you’re concerned your card-based access control reader can be too easily compromised,” he said.

25


METRO AND RAIL INCREA

SEP 2016 ● www.asmag.com

Big data is no longer just a buzzword. More and more, end users turn to data generated by various sensors to find meanings and patterns in their efforts to optimize business and enhance efficiency. Increasingly, rail transportation is also moving towards this trend. BY William Pao

32

ail is one of the most important forms of transportation. Yet, with the threat of terrorism and budget constraints facing operators, they increasingly rely on technology, not only for safety purposes but also for management efficiency. The data generated by devices and sensors in a rail system can be extracted and analyzed to help operators achieve their objectives. “Security devices and platforms can stream notifications through one simple-to-use interface that will relieve the monitoring burden on security managers and staff, making it easier to deploy resources and tactical response more efficiently. It is this refinement of the security profile that allows states or privately owned rail agencies to contribute to the big data scheme as they move toward collecting better-quality information that will be useful for security as well as business operations and other quantifiable studies,” said Steve Birkmeier, VP of Sales and Business Development at Arteco.

HOW DATA KEEPS RAIL SECURE Security remains the primary concern for rail operators, in particular after various attacks on train and metro stations. “Since September 11, and more specifically following the Madrid and London rail attacks, there has been an increased awareness of terrorist threats on mass transit and the particular vulnerabilities of this transport mode. And we’ve recently seen an increase in ‘lone-wolf’ style attacks on the rail networks in Europe,” said James Chong, Founder and CEO of Vidsys. “When looking at threats in this environment, and with less tools in place to prevent attacks, managers need to leverage technology to help identify threats and prevent attacks before they happen.”


SINGLY DRIVEN BY DATA

33


FINDING FACES TO INCREASE PUBLIC SAFETY FILES Name: Alejandro Estevez Age: 37 Ethnicity: Hispanic Gender: Male Residence: London, UK

*****

LAST MATCH

CURRENT MATCH

MATCH98% SEP 2016 ● www.asmag.com

FACIAL RECOGNITION TECHNOLOGY HAS BECOME A PART OF EVERYDAY CONSUMER TECHNOLOGY. DESPITE ITS PROLIFERATION, THERE ARE STILL HURDLES FOR ITS USE IN PUBLIC SPACES. EVEN SO, THE USE OF FACIAL RECOGNITION TECHNOLOGY HAS THE POTENTIAL TO STRENGTHEN PUBLIC SAFETY AND HELP FIND CRIMINALS TRYING TO HIDE IN A CROWD. BY Eifeh Strom, Freelancer

40


[MATCH]

acial recognition technology is everywhere these days. It’s in Facebook. It’s in mobile apps. It’s in ATMs. While its acceptance, or at least proliferation, in consumer technology grows, its use in the public sphere for public safety has faced bigger challenges. Hollywood has set the bar high for facial recognition technology and what people expect. These expectations have been a challenge for this technology; however, the use of facial recognition technology is helping to enhance public safety and assist law enforcement agencies in identifying persons of interest. Research shows that revenue for the global facial recognition market is forecast to reach US$882 million by 2024

at a CAGR of 22 percent, according to Tractica. High-profile terrorist attacks are one of the driving forces behind the rise in adoption, as these have highlighted the need to strengthen security in public areas. In fact, Germany’s Minister of the Interior, Thomas de Maiziere, recently voiced support for using facial recognition in public spaces throughout Germany, such as in airports and train stations. Even with all the possible benefits, there have been many roadblocks for widespread adoption. From a lack of quality databases to technology shortcomings, the use of facial recognition technology particularly in public spaces has faced setbacks.

“FACING” THE TECHNOLOGICAL CHALLENGES For facial recognition technology to work there are certain conditions that must be met. These conditions play a critical role in the success of how well facial recognition works, particularly in a one-to-many facial recognition system where the system is matching faces against a database of photos instead of just one photo. Unfortunately, oftentimes the conditions needed for optimal performance are the technology’s biggest challenge. “Facial recognition can work very effectively in public spaces, but there is a need to change the positioning and focal length of some of the video surveillance

41


time, present all objects, and act as a decision support for the human operator.”

POST-EVENT PROBE AND REAL-TIME MANAGEMENT

SMART SEARCH GAINS EMINENCE IN A

MORE DANGEROUS WORLD With criminal activities on the rise and terrorist threats more imminent than ever, city and law enforcement officials rely on video surveillance to crack down on crime. But sifting through piles upon piles of video data manually can be a daunting task. This is where smart search analytics tools can come in handy. BY William Pao

SEP 2016 ● www.asmag.com

nce a major incident or criminal activity occurs, every second counts as law enforcement officials identify and track down possible suspects. A smart search analytics tool can help them in this regard. “Research shows that many shooting and terror acts can take place across several locations. Having access to a fast, effective and actionable search capability can be vital,” said Erez Goldstein, Senior Product Marketing Manager at Qognify. “Certainly, after a terrorist attack, our company experiences a sudden rise in interest. In the long run, more cameras are purchased. More cameras mean more video,” said Dror Irani, President and CEO of BriefCam. “A smart search tool is able to shorten review

46

Zvika Ashani, CTO, Agent Vi

Alan Ataev, Global Sales Director, Axxonsoft

A smart search tool usually performs two major functions. First and foremost, as its name suggests, it helps sift through video data and, in the shortest possible time, deliver those data that are relevant. “Without doubt, advanced search is an essential tool for quick video search, especially if we talk about modern security systems with thousands of cameras and petabytes of recordings,” said Alan Ataev, Global Sales Director at Axxonsoft. “In fact, in such circumstances, it is almost impossible to thoroughly analyze the video archive in a reasonable time without using highly developed search tools. Advanced forensic search allows getting useful results within seconds, which is crucial for case investigation.” “In a post-event scenario, investigations can be extremely resource-consuming when using video as a main source of data. In fact, for a major incident, it can take many hundreds of man-hours manually reviewing footage. And it can be slow, which is far from ideal in a time-pressured scenario where you need to learn fast who was involved, who were they in contact with, how they arrived, and where they might have been before acting their crime,” said Goldstein. “In this instance, where time is critical to the success of an investigation, the ability to automate much of the process saves huge amounts of time and resource, improving the likelihood of a successful resolution.” Besides post-event investigation, more and more end users rely on smart search to manage an ongoing event — like a suspected terrorist or criminal activity — and mitigate its impact. “Say you have an ongoing situation happening right now, and you want to evacuate the building and make sure it is empty. You can use our smart search capability to check if the building is empty and also try to locate the suspect to see if he is in the building right now,” said Zvika Ashani, CTO of Agent Video Intelligence (Agent Vi).


HOW IT’S DONE Most smart search analytics in the market work in the same way: a search is performed on the video archives, and all relevant data based on certain criteria are retrieved. “Search by keyword or similar object is important, for example clicking to highlight an object and saying ‘find me all instances of video that contains something like this,’” said Ben White, CTO of VCA Technology. “We need, for example, to be able to find a blue car or a man wearing a red jacket, faces similar to the one searched for, a vehicle license plate number, and so on,” said Ataev. “The face capture and search algorithm automatically detects a face in the field of view or in video footage from one or several cameras, and then searches for that same face in other videos provided by networked cameras.” Smart search can be used to find not only people of interest but also vehicles or other objects. “Our latest update is that we have added face and license plate search to MomentQuest. The license plate search works quite similarly: it detects a license plate in the field of view or in video footage from one or more cameras. The algorithm involves advanced heuristic methods (such as substitution of similarlooking letters or numbers) to identify as many potential matches as possible,” said Ataev. The extent of the search is based on the need of the user. In Qognify’s case, for example it performs three types of searches: immediate, which delivers potential

Deep Learning Employed to Increase Accuracy

Increasingly, deep learning is employed in smart search tools to increase their accuracy. “We have a very large database of images that we collected from hundreds of surveillance cameras, including hundreds of thousands of images of people, vehicles, bicycles and other objects of interest. We also have a very large number of images of objects that are considered noise, anything that's not interesting but may be moving in a field of view, and with any VCA solution that does not employ deep learning, these things usually cause nuisance alarms,” said Zvika Ashani, CTO of Agent Vi. “When we run our algorithms on new sources of video, we can accurately identify what that object is, based on this model we created.” However, there is caution that at this stage, deep learning is merely a buzzword, and some challenges still remain. “Deep learning … has some serious requirements to work well. The deep learning approaches require huge amounts of training data and can hence take a significant time to develop. Deep learning approaches in this area are still in their infancy in commercial applications,” said Ben White, CTO of VCA Technology.

47


WOMEN IN THE SECURITY INDUSTRY

Jody Ross, VP, Strategic Accounts, AMAG Technology

As women continue to take over the workforce, the number of women in the security industry, however, is not seeing significant growth. For this article, we spoke to several women in security to find out how they got into the field and how the industry can encourage more women to enter. BY Eifeh Strom, Freelancer

Daniela Hossmann, Head of Regional Business Unit Intrusion, EMEA, Bosch Sicherheitssysteme

SEP 2016 â—? www.asmag.com

Andrea Iniguez, VP, Business Development, Theia Technologies

50

Sadiye Guler, Founder and CEO, intuVision

A look at any of the major security shows will reveal that there is a pretty big imbalance of women to men in the security industry. This gap, however, is changing, but slowly. The number of women entering tech jobs has definitely seen an increase, but it seems like security has seen less growth. Many women executives of security companies note a low number of applications coming from women, despite a rise in number of females getting degrees in engineering and computer science. a&s talked to several women in security to find out how they got into the industry, why they think there are so few women in the industry, and what we can do to encourage more women to be a part of it.

Q1. HOW DID YOU FIRST GET INTO THE SECURITY INDUSTRY?

Sadiye Guler, Founder and CEO of intuVision: I got into security through research and development in video content analysis (known as video analytics in this industry), my background is in computer vision. Daniela Hossmann, Head of the Regional Business Unit Intrusion in EMEA at Bosch Sicherheitssysteme: I have been with Robert Bosch for over 14 years and started out in the power tools industry where I collected a lot of experience in product management and marketing. After a couple of years in this field, I started to work for Bosch in the security industry (Bosch Security Systems) where I held several positions such as product manager for fire detectors, corporate communications and marketing. Currently I am responsible for the business unit intrusion in EMEA.� Jody Ross, VP of Strategic Accounts at AMAG Technology: I studied business in college and did not have any plans to enter into the security industry after graduation. I started at Andover Controls in a non-security focused role in the early 1990s and then migrated to the security side of the company in a Regional Sales Manager role. I completed my career at Andover in a National


Account Sales role. At AMAG Technology, I have held positions in Business Development and now Strategic Accounts. Andrea Iniguez, VP of Business Development at Theia Technologies: My career has been spent in international business to business and industrial marketing, sales, and business development roles, including in aerospace, specialty metals, orthopedic implants, and now in optics for a variety of industries. I earned an undergraduate degree in international studies and French and a graduate degree in international business. My education and fluency in a foreign language started me down this path. My partners at Theia Technologies invited me to join the company to add my experience and commercial skill to our joint competencies.

Q2. SOME RESEARCH HAS SHOWN THAT WOMEN ONLY

REPRESENT 10 PERCENT OF THE SECURITY INDUSTRY. WHY DO YOU THINK THAT IS? IS THIS DISCREPANCY SOMETHING YOU FEEL IS VERY OBVIOUS IN THE INDUSTRY?

Iniguez: There is a long tradition of male bias in many industries; unfortunately there is no reason to expect that the security industry would behave differently. If anything, bias may be more deeply rooted in this industry since security encompasses, and indeed was engendered by a need for physical security, originally with an emphasis on physical strength, the traditional domain of men. Obviously, there is so much more to security today than what’s provided by physical strength and women have much to offer. Ross: When I first started, there were very few women in the security industry. I almost cringe to say that women were considered a novelty. Today, more women have degrees in business

FORTUNATELY OVER THE YEARS, THE FEMALE PRESENCE HAS DRAMATICALLY INCREASED AND HAS CHIPPED AWAY AT THE HISTORICALLY MALE-DOMINATED INDUSTRY. Jody Ross, VP, Strategic Accounts, AMAG Technology

51


What Will Drive More IT Companies into Security?

SEP 2016 ● www.asmag.com

The convergence of security systems and IT systems has been a widely debated topic in the past ten years. In many cases, the results were not successful due to conflicts of interest and disagreements between IT and security professionals. Could a growing presence of IT players in the physical security field shake up the industry? Are recent projects involving IT companies a new trend or just anecdotal evidence? BY the a&s Editorial Team

54

John Reno, Marketing Manager, IoT Product and Solutions, Cisco Systems

he presence of IP infrastructure in physical security is no longer a novelty. More often than not, new physical security systems are IP-driven, such as in IP video and IP access control. Established industry players are experimenting with new offerings such as video surveillance as a service (VsaaS), cloud storage and edge analytics. In parallel, we can see a growing involvement of IT/ICT companies in projects related to verticals where physical security was traditionally prominent. Not long ago, we saw a lot of NAS companies from the IT industry enter surveillance by offering more powerful storage management systems. Now, we see many of them getting involved in analytics, big data management and cybersecurity.

IT/ICT COMPANIES IN THE FIELD Cisco Systems is one such example of a communication technology conglomerate that has a substantial presence in physical security. “We have widespread involvement in physical security. Important industry segments include manufacturing, energy, smart cities and government. Largely, we engage customers seeking specific business outcomes such as increased worker or public safety and process acceleration,” explained John Reno, IoT Product and Solutions Marketing Manager for Cisco Systems. “Physical security plays an enabling role for IoT (Internet of Things) and enterprise initiatives. Our growth plans are driven by customer demand with expansion happening most recently in the IoT segment. As an ecosystem participant, we continue to drive for promoting the benefits of adopting IP for physical security. This includes work with standards bodies and the development of industry best practices. The primary advantage that Cisco delivers to the market is integration


A LARGE NUMBER OF ICT COMPANIES ENTER SMART HOME SECTOR The relative technical strengths of IT companies, such as in networking, cloud services, etc., holds potential for both private sector smart home and large-scale smart city projects. Companies like Google and Amazon are involved in the smart home sector, offering solutions for home operating systems from thermostats to security and surveillance cameras. This new field has also drawn telcos and internet service providers (ISPs). In Korea, for example, the high penetration rate of high speed internet and available bandwidth enabled the large-scale introduction of cloud services and home security by telecom companies that are venturing into the Internet of Things (IoT) and smart home verticals. It’s not uncommon for people to use 4G networks to monitor their homes through their cellphones, and so far, two of Korea’s leading ISPs offer wireless video surveillance that runs off their own 4G network. In Taipei, the capital of Taiwan, a local cable company is offering a bundle service which includes cable TV, internet and a Wi-Fi IP camera for home monitoring. The service is provided using the cable company’s existing network of fiber optic cables across the city.

THE RELATIVE TECHNICAL STRENGTHS OF IT COMPANIES, SUCH AS IN NETWORKING, CLOUD SERVICES, ETC., HOLDS POTENTIAL FOR BOTH PRIVATE SECTOR SMART HOME AND LARGE-SCALE SAFE CITY PROJECTS. with cybersecurity systems, consistent policy across IT/OT environments and simplified compliance. Customers benefit from the ability to mitigate risks, protect their businesses from an increasingly hostile threat environment, and cost savings from simplified compliance,” added Reno. Cisco is not alone in this, nor is this phenomenon limited to North America. Other companies like Chinese giant Huawei, Japan’s NEC, British Telecom and Korea’s SK have branched out and are now also involved in security technologies like IP cameras, video surveillance management and physical access control. The advantages IT and ICT companies bring to the table, compared to “traditional” security companies, lie in the breadth and scope of their technologies and their resulting experience in large-scale national projects. IT companies are well-positioned to benefit from their experience in wired and wireless network transmission, storage and cloud computing; however, they do not always have the domain expertise needed for security projects. The incentives driving IT companies to enter the security field rests in the potential to generate new demand within a customer base consisting of potentially tens of millions of homes and businesses, and “upselling” their existing offers.

WILL DEEP LEARNING AND ANALYTICS LEAD COMPANIES INTO SURVEILLANCE? Recently, Huawei unveiled a full range of security products and solutions during an exhibition in London. The rationale behind Huawei’s product line is the

belief that traditional security architecture is failing to meet the requirements of efficient big data analytics for massive videos. Huawei branded its offer as “Matrix Intelligence” and promises intelligent analysis for big data. Enabled with computing resource scheduling, this will allow dispersed resources to get involved in intelligent analysis. According to the company, this solution is meant to improve the next generation of core engines in safe city systems. In other words, the problem Huawei is trying to solve is how to locate important data in time, which can be likened to finding a needle in a haystack. Video analytics have been considered “the next big thing” for several years now. Many industry commentators agree that in the early days, video analytics over-promised and under-delivered. However, the consensus still remain that it will be invaluable in a future where we will be swamped by information. The vast amounts of video information being collected require an effective way to quickly analyze and locate information. To understand the scale involved, it is important to realize that information from a citywide surveillance system can easily reach petabytes of video footage in a single year.

55


NTERNET THINGS

OF

THE SMART FACTORY REVOLUTION IS HERE SEP 2016 ● www.asmag.com

A transformation is taking place in the manufacturing segment. Factories are becoming smarter and the production process is getting more efficient. To some, this would seem a natural evolution in the sector; to others, this is the most important change that the manufacturing segment has witnessed in years. BY Prasanth Aby Thomas

58

erhaps the buzzword of this decade is “smart.“ No industry is exempt from it. From phones to homes and buildings, all are trying to be labelled as such. And one industry that is taking serious interest in it is manufacturing. Known by various names, from smart, intelligent factories to the larger concept of industry 4.0, the manufacturing sector is slowly witnessing a revolution that could make its impact felt across several other divisions. “At the heart of any smart factory is intelligence,” said Andy Ward, CTO of Ubisense. “At Ubisense, we believe location intelligence is an essential component of this: if something moves and it is process-critical, you need to know where it is and what it is doing. Industry 4.0 describes an environment in which flexible, intelligent processes leverage real-time data from sensors connected across the entire value chain to enable optimization of industrial processes. These cyber-physical systems leverage big data analytics to translate full operational visibility into unprecedented manufacturing agility and efficiency.” Others point out that the terminology could be different depending on where you are, but the concept remains the same.


Johnny Chang, Associate VP, iAutomation Systems and Solutions Group, Advantech

Jerry Huang, Project Manager, IEI Integration

“There are multiple definitions depending on the region where this topic gets covered,” said Aloke Palsikar, Senior VP and Global Head for the Manufacturing Vertical at Tech Mahindra. “However, going beyond the conventional definitions of the terms ‘smart factory’ or ‘industry 4.0,’ to me, these terms reflect the fundamental shift in terms of how technology is changing the face of manufacturing processes through ‘connected architecture.’ Today, various stages of manufacturing processes right up to the lowest level of a machine or equipment are now getting directly connected through sensors/ IoT and are able to communicate directly with each other making the whole chain transparent and more efficient. The machines, the equipment can now be enabled not only to communicate with each other, but also with their higher and lower systems, and to take intelligent decisions independent of human intervention. This is the modern smart factory.” “A smart factory is an industry that leverages on IoT devices to improve the efficiency, continuity and security of its operations,” said Andrea Sorri, Director of Business Development for Government, City Surveillance and Critical Infrastructures at Axis Communications. “Real-time and remote communication among the production components and the operators enables factories to be a showcase for automation.” Johnny Chang, Associate VP for iAutomation Systems and Solutions Group at Advantech, pointed out that that the company defines smart factory concept in two phases. “Currently we define these as two separate phases,” Chang said. “For instance, smart factory is part of industry 4.0. Industry 4.0 will include the design phase, manufacturing phase and the logistic phase. The whole thing is called 4.0, but smart factory becomes the middle of the process.” Jerry Huang, Project Manager at IEI Integration, elaborated further on the topic. “From my observation, smart factories need at least four elements,” Huang said. “The first one is machine-tomachine integration. The second thing would be the domain knowledge. The third thing would be the business intelligence

59


THE LOGIC OF

INTEGRATING PHYSICAL

ENTRY MANAGE en LOGICAL AND PHYSICAL SYSTEM IM

AND

ACCESS CONTROL SOLUTIONS

COMBINATIONS improved efficiency

LOGICAL ACCESS CONTROL

Risk and Compliance L ACCESS CONTROL SOLUTIONS

Access control solutions that integrate logical and physical systems have an important role to play in the security industry. Although there are challenges, these combinations ensure better safety and improved efficiency. In this article, we take a look at the various nuances of integrating physical and logical systems. BY Prasanth Aby Thomas

SEP 2016 ● www.asmag.com

64

ncreasing security concerns and advancements in technology have forced access control companies to come up with innovative solutions. One such measure has been the combination of physical and logical access control systems.

Experts concur several factors need to be considered while integrating physical and logical access control systems.

To industry experts, this presents as one of the most efficient entry management solutions. “Integrating physical and logical security provides the benefit of simplifying user management whilst increasing security,” said Mike Sussman, Technical Director at TDSi. “Integration ensures that


IMPROVED EFFICIENCY

improved efficiency

IMPROVEDEFFICIENCY EFFICIENCY

ENTRYIntegrating Physical MANAGEMENT

LOGICAL ACCESS CONTROL

Risk and Compliance

LOGICAL ACCESS CONTROL INTEGRATING PHYSICAL GEMENT LOGICAL nsure better safety COMBINATIONS

ACCESS CONTROL SOLUTIONS

ensure better safety

improved efficiency LOGICAL ACCESS CONTROL

SOLUTIONS

ACCESS CONTROL SOLUTIONS

LOGICAL AND PHYSICAL SYSTEM

LOGICAL ACCESS CONTROL

ACCESS ACCESS CONTROL SOLUTIONS CONTROL

ACCESS CONTROL SOLUTIONS

COMBINATIONS

ACCESS CONTROL SOLUTIONS

ENTRY MANAGEMENT

IMPROVED EFFICIENCY

IMPROVED EFFICIENCY

improved efficiency

ACCESS CONTROL SOLUTIONS Integrating Physical IMPROVED

MPROVED EFFICIENCY Integrating Physical ACCESS CONTROL IMPROVED LOGICAL AND PHYSICAL SYSTEMS ENTRY MANAGEMENT EFFICIENCY IMPROVED IMPROVED EFFICIENCY EFFICIENCY

Risk and ComplianceENTRY LOGICAL MANAGEMENT

ACCESS CONTROL

INTEGRATING PHYSICAL

ENTRY MANAGEMENT

any change to a user’s profile is updated in all systems without any delay. In these cases, security is often managed by the IT staff, with the benefit of reducing a requirement for extra staff to manage the access control system and to concentrate on risk and compliance. Integration also has the benefit of increasing security as a functionality, such as restricting logical access if no physical access has occurred, reduces tailgating and thereby increasing site security.” But there are several factors to consider when integrating physical and logical access control. According to Daniel McVeagh, Senior Product Manager at Gallagher, logical and physical access systems both share the need for robust methods for authenticating an individual at the keyboard or door.

Mitchell Kane, President, Vanderbilt Industries

Julian Lovelock, VP, Strategic Innovation, HID Global

ACCESS CONTROL SOLUTIONS LOGICAL ACCESS CONTROL

ACCESS CONTROL SOLUTIONS

ACCESS CONTROL SOLUTIONS

ENTRY MANAGEMENT

“Sites are increasingly looking to standardize on the authentication methods used for both logical and physical systems, with both linking back to single point of truth for the individual’s identity,” McVeagh said. “Factors that need to be considered in achieving this are what authentication factors (e.g., smartcards, biometrics, PINs, etc.) can be used by both the logical and physical systems, how issuance and maintenance of the factors are controlled by the organization (e.g., are different departments managing credential issuance for logical and physical access systems?), and what linkages do both systems have back to the database storing single point of truth for the individual’s identity.” Mitchell Kane, President of Vanderbilt Industries, said one of the main factors that organizations must consider with this type of access control is the security of the data being transmitted. “Logical access controls are used to protect the network — for identification, authentication and authorization on a computer,” Kane said. “Combining the two spheres enhances protection in the event of an attempted breach. As an example, if someone does not access the building, but attempts to log in to a computer on the premises, that would trigger a red flag on the network. Combining the two takes security one step further to bolster network security and alert officials in the event of a potential threat. As with the shift from analog to IP video in the industry’s surveillance sphere, the network integrity must be taken into account when merging physical and logical access. This shift also brings into play a positive

65


SMAhome

VOICE RECOGNITION, SMART LIGHTING TO REMAIN KEY DRIVERS FOR SMART HOMES In this issue, we will highlight findings and statistics related to the smart home from reports by leading research firms. According to a recent study by Berg Insight, the number of smart homes in North America and Europe reached a total of 17.9 million in 2015. Another report by ABI Research predicts that the number of consumers who engage with voice functionality on a monthly basis will grow to more than one billion by 2021. Lastly, a recent survey conducted by MarketsandMarkets also suggested that the smart lighting business will pose as one of the top segments for growth through 2022.

1

North America to Remain the World’s Largest Smart Home Market Through 2020

North America will continue to remain the largest market for smart homes in the foreseeable future, according to a recent study by Berg Insight. The research firm revealed that the number of smart homes in North America and Europe reached a total of 17.9 million in 2015, and cited that this will remain the largest driving force behind the burgeoning industry by 2020 with 46.2 million households, or 35 percent of the total market share. In a separate report, the research firm also noted that Europe currently lags behind North America in terms of smart home penetration and market maturity, with the market forecasted to grow at a CAGR of 54 percent in the next five years to reach 44.9 million smart homes by 2020. For both markets, the most successful smart home devices include thermostats, security systems, light bulbs, network cameras and multiroom audio systems. Companies such as Philips Lighting, Sonos, Honeywell, Belkin, Nest, Ecobee, Netatmo and D-Link are among the key vendors of such products, it said.

Source: Berg Insight

3

Smart Lighting Segment to Pose Significant Growth by 2022

SEP 2016 â—? www.asmag.com

While North America will continue to dominate the smart home market through 2022, smart lighting systems will pose as one of the top segments for growth, according to research firm MarketsandMarkets. Furthermore, a recent survey also suggested that the smart lighting business has changed recently. In the past, smart lighting systems were sold as a step up from traditional lighting management systems, but now they are considered as trendy electronic products. Besides smart lighting, HVAC control, security and access control will also witness exponential growth during the same period. As sub-categories of the security segment, geofencing, IP cameras and voice activation controls are currently driving growth in the home automation market, it said, citing that the latter two are increasingly gaining popularity in the North American and European markets. Source: MarketsandMarkets

70


2

Conversing with Computing Devices: The Race to Humanize Voice Recognition Speeds Up

The need for conversational interaction between humans and their devices is increasing as people rely on them for more daily tasks. ABI Research predicts that consumers who engage with voice functionality on a monthly basis will grow to more than one billion by 2021, an 80 percent CAGR. The market report indicated that this trend will be driven by growth in smart glasses and smart home devices. Consumerwise, voice control and conversational interaction is a natural fit for both smart glasses and AR devices, as their primary purpose is to offer hands-free, efficient data display and interaction. Smart home devices like Amazon Echo and Google Home will drive consumer use cases, with growth in AI-powered personal assistants enabling natural and rewarding interaction. The research firm cited Apple, Google and Microsoft as the main players in this field as they are each pushing their voice platforms heavily, most recently with Google’s Home voicepowered smart home device. Amazon is also poised to see great growth if it can capitalize on the momentum brought out by the sales of its voice-supported Echo and Fire devices.

4

Source: ABI Research

Apple, Microsoft Join Amazon and Google in Voice-Activated Assistant Frenzy

The trance surrounding Mac OS and Windows may sound really blasé, but speculations involving old school rivals Apple and Microsoft hit the spotlight again after the former recently brought a limited extension of Siri to the Apple TV. Meanwhile, Microsoft also announced in March that it plans to integrate its intelligent personal assistant, Cortana, into the popular gaming console Xbox One, where it described the AI system as a “personal gaming assistant” that will be able to help you find new games, tips and tricks. Contrary to what Google and Amazon are doing for smart speakers (Google Home and Amazon Echo), both Apple and Microsoft will use smart TVs to carry out AI-based assistants for their operating systems. While voice activation will undoubtedly remain the backbone of home automation control, two emerging patterns can be seen — one that adopts a small, portable speaker device while the other requires a smart TV. Put simply, the solutions by Apple and Microsoft are not portable — unlike Amazon’s Echo or Google’s Home. So, when you’re in the kitchen making dinner and want to ask Siri about something, chances are your Apple TV won’t be in the same room as you, but instead next to your television set. Although it is still too early to tell who will prevail in the intelligent personal assistant arena, only time will tell when Apple, Google and Microsoft will officially enter the fray with their market solutions.

71


3xLOGIC infinias CLOUD Access Control Solution Features:

• S imple to operate • Affordable: no server, no maintenance, automatic updates and pay-as-you-go pricing • Infinite scalability: unlimited doors, cardholders, credentials • Mobile event monitoring with integrated video via the infinias mobile app • Video integration with Milestone XProtect ■3xLOGIC/U.S.A. ■Email: sales@infinias.com

Aurora FaceSentinel Face Recognition Biometric Access Control Reader Features: • • • • •

T otally non-contact Wiegand/RS485 interface Light-immune Fast and simple to use Stores images of all users

■Aurora/U.K. ■ Email: info@ facerec.com

Canon VB-R13VE Speed Dome Network Camera Features:

• G enuine Canon 30x optical zoom lens, 20x digital zoom and enhanced digital zoom function • 2.1-MP high-sensitivity CMOS sensor with exceptional low-light performance • Advanced DIGIC DV III image processor to help maximize image quality • IP66 rated and IK10 vandal resistant enclosure • Haze compensation, smart shade control and auto gain control limit • Scheduled custom video settings ■ Canon USA/U.S.A. ■ Email: pr@cusa. canon.com

Arteco Events Analytics (AEA) Features:

• W eb-based application • Dashboard consists of 2 different pre-configured charts which give the user an immediate representation of all the events that occurred in the last 7 days • System diagnostics allow the user to monitor, analyze and compare the health status of the connected systems • A responsive and effective reporting environment provides the ability to analyze and compare all the events generated by any installed device • Operation ranking provides information for the optimization of the operations and coordination of operators to help improve management ■Arteco/Italy ■Email: support_na@artecous.com

Siemens Siveillance VMS 300

Axis Camera Station S2008 Appliance

• E asily expandable as business needs change • Ensures that video recording is never interrupted using failover recording servers and redundant management servers • Provides multistage video storage, including video grooming possibilities, for efficient long-term storage, without interfering with active video • Secures availability for video for investigations via evidence lock, overriding normal video retention for grooming policies • Enables encryption of sensitive data

• • • • •

Features:

■ Siemens Building Technologies/Germany ■Email: contact@siemens.com

Features:

ll-in-one solution with integrated PoE switch A Validated with extensive support High definition surveillance up to 4K Axis camera station included Full compatibility with Axis products

■Axis Communications/Sweden ■Email: axis-sap@axis.com

SRI Identity IOM Handheld Identity Reader Features:

SEP 2016 ● www.asmag.com

• D ual-iris enrollment with wireless connectivity to the database server • Convenient two-click iris and face capture with one hand • Identity verification in less than one second • Standoff capture at a comfortable distance from subject • Onboard enrollment for flexible registration • Portable design for field operations ■SRI Identity/U.S. ■Email: info@sri.com

74


Arecont Vision AV1195DN MegaVideo Flex Camera Features: • • • • • •

1.2-MP resolution 2.8 mm lens NightView technology Remote focus True day/night SD card slot

■ Arecont Vision/U.S. ■ Email: support@arecontvision.com

Genetec Security Center 5.5

Seagate SkyHawk Surveillance Hard Drive Features:

• O ptimized for DVRs and NVRs, tuned for 24x7 workloads in capacities up to 10 TB • ImagePerfect firmware enables smooth video streaming • Supports up to 64 cameras • Ready to record 90% of the time • Up to 10 TB or 2,000+ hours of HD videos ■ Seagate/U.S. ■ Email: apj.sales.enquiry@seagate.com

Features: • • • • • •

Disaster recovery Alarm grouping and filtering Plan manager enhancements New tiered SDK packages Security desk in 64-bit mode Active directory universal group support

■ Genetec/Canada ■ Email: info@genetec.com

Sony SNCVB770 4K Network Camera Features:

• U ltra-high sensitivity of expandable ISO 409600 captures clear color video even in near darkness • Overview and close-up at the same time with intelligent cropping • Maximum detail where it matters with intelligent coding • Best picture quality around the clock with intelligent scene capture • 35 mm full-frame Exmor CMOS sensor ■ Sony Electronics USA/U.S. ■ Email: bis.product.support@am.sony.com

Wavestore A-Series NVR

Union 2200 – BS 5 Lever Sashlock

• • • • • •

• C hamfered bolt design increases the performance of the lock under side load testing • Anti-pick, anti-saw and anti-drill security features for resistance against attacks • Radius inner forend for ease of installation • Deadbolt locked or unlocked by the key from either side • Case size: 68 mm or 81 mm • Faceplate: supplied with square faceplate which covers a radius inner forend

Features:

VR channels: up to 8 IP N Hard drive: 1 x 2.5” 9 mm form factor Internal storage: up to 2 TB IP throughput: up to 100 Mbits/s Full WaveView client operation Near silent operation

■ Wavestore/U.K. ■ Email: info@wavestore.com

Panasonic WV-SUD638 PTZ Network Camera

Features:

■ Union (part of Assa Abloy)/U.K. ■ Email: info@uniononline.co.uk

Features: • • • • • •

Full HD (1080p) 60 fps, 30x zoom lens Built-in wiper and auto defroster Wind load durability 60 m/s (operation), 80 m/s (non-destructive) Video stability augment system for high-class image stabilization IP67, IP66, IK10 certified Anti-salt air corrosion protection ideal for seaside operations

■ Panasonic Corporation of North America/U.S. ■ Email: panasonicwebcasesf@us.panasonic.com

75


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 23 51 37 5 INSIDE FRONT COVER, 1 7 77 19 BACK COVER 13 4 29 2 73 8, 9 INSIDE BACK COVER 30, 31 15 3

ADVERTISER AV TECH CORPORATION BOSCH SECURITY SYSTEMS CHENGDU POWERVIEW SCIENCE AND TECHNOLOGY CO., LTD. COMMAX CO., LTD. DAHUA TECHNOLOGY CO., LTD. EVERFOCUS ELECTRONICS CORP. FOCTEK PHOTONICS, INC. FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. HIKVISION DIGITAL TECHNOLOGY CO., LTD. IDIS CO., LTD. MEERE COMPANY INC. RICOM RIFATRON CO., LTD. SHENZHEN COMMANDER TECHNOLOGY CO., LTD. SONY SEMICONDUCTOR SOLUTIONS CORPORATION TAMRON CO., LTD. TECHPOINT INC. VIDEOPARK TECHNOLOGY CO., LTD. VIDEOTEC S.P.A.

MAJOR ITEM IP CAMERA CCTV SURVEILLANCE SURVEILLANCE SURVEILLANCE CAMERA / DVR / IP CAMERA LENS DOME COVER SURVEILLANCE SURVEILLANCE CAMERA LENS DVR CASING SEMICONDUCTOR CAMERA CHIPSET SURVEILLANCE IP CAMERA / SOFTWARE / VIDEOSERVER

COUNTRY TAIWAN GERMANY CHINA KOREA CHINA TAIWAN CHINA CHINA CHINA KOREA KOREA CHINA KOREA CHINA JAPAN JAPAN USA CHINA ITALY

E-MAIL ezum@avtech.com.tw apr.securitysystems@bosch.com dennis@powerview.cn pcy@commax.co.kr overseas@dahuatech.com marketing@everfocus.com.tw sales@foctek-lens.com sales@fjsmt.com overseasbusiness@hikvision.com sales@idisglobal.com sales@cube-eye.co.kr sales@forecam.com contact@rifatron.com sjw@yjdcase.com newbiz@tamron.co.jp dma@techpointinc.com overseas@videopark.com.cn info@videotec.com

MAJOR ITEM ALARM

COUNTRY E-MAIL KOREA overseas@isaso.com

ADVERTISER GIGA-TMS INC.

MAJOR ITEM RFID MODULE / LOCK / READER

COUNTRY E-MAIL TAIWAN promag@gigatms.com.tw

ADVERTISER TIBBO TECHNOLOGY INC.

MAJOR ITEM CONTROLLER

COUNTRY E-MAIL TAIWAN sales@tibbo.com

INTRUSION ALARM PAGE NO. 6

ADVERTISER KMT CO., LTD.

ACCESS CONTROL PAGE NO. 63

OTHERS PAGE NO. 11

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

77


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.