EDITOR’S NOTE Smart Solutions for Senior Living
KEEP IN TOUCH WITH...
To explore the world of connected and safe lifestyles, I recently had a conversation with an industry veteran about how smart solutions can help make people’s lives more convenient and secure. When both of us were contemplating on which target group would benefit the most – not only from security, but also from solutions for a smart and convenient lifestyle – solutions for senior communities and the nursing house sector suddenly caught both of our attention. Many mature countries in the Americas, Europe and even Asia have dealt with aging populations for quite a while now, in which the healthcare of senior citizens has become an issue. In a senior apartment or nursing house, being secure and safe is the first priority. Hence, technologies such as access control, visitor management, intercoms, video surveillance and alarms have come into play. In addition, automatic door solutions, mobile access control, long-range RFID tags, video analytics and other smart (wearable) devices are also important elements that can make the life of senior citizens easier. Looking at senior living, we found a large demand for security and smart connected solutions, which can become a new market for security companies. In this issue, we also provided many security-related smart solutions for airports, parking and warehouse management. Hope these solutions can provide you some fresh ideas on exploring new markets.
SOCIAL MEDIA www.facebook.com/ asmagglobal
twitter.com/ asmagglobal
www.linkedin.com/ company/ asmagglobal
EDITOR-IN-CHIEF JILL LAI
jill.lai@newera.messefrankfurt.com
EDITORIAL TEAM
MAR 2017 ● www.asmag.com
REPORTER WILLIAM PAO
REPORTER LISA HSU
EDITOR EMILY LIN
REPORTER RYAN LIU
REPORTER PRASANTH ABY THOMAS
For all of us who drive, finding a place to park in a city can be excruciatingly painful. Luckily, with smart city initiatives going on around the world, parking has been made easier with the help of connected sensors and devices.
Things are heating up as the most innovative security shows are taking place over the next few months – Secutech and IFSEC International! We have been busy preparing for the upcoming shows, looking forward to meet security professionals from around the world. Will we see you soon?
Although the Internet of Things (IoT) will inevitably raise cybersecurity issues, this shouldn’t deter anyone from using it as it can open up new opportunities and applications in the industry. Users need to be vigilant about educating themselves on the risks and implement appropriate safeguards.
Being in a connected world, more end users are looking for a way to find a fast, reliable and secure connection. For our products of the month, we explore several LoRaWAN solutions and devices, and the way each one utilizes the power of this connection.
In several countries, airports are considered vulnerable to attacks. Experts believe that the technologies currently in place are not adequate to thwart these threats. In this issue, we look at some of the innovations in airport technology that make travelling safer and smoother.
12
NEWS FEATURE a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.
RAD and Milestone to Support All-Girls Robotics Team This partnership that will allow an all-girls team to compete at a robotics state championship is aimed at encouraging interest in the sciences and robotics among young students. BY Milestone Systems
R
o b o t i c A s s i s t a n ce Devices (RAD), an innovator in artificial intelligence and robotics, announced it has partnered with Milestone Systems to support the all-girls robotics team Coding Queens. The i n i t i a t i ve w a s l a u n c h e d to promote education in the science, technolog y, engineering, mathematics (STEM) and robotics fields. The team of six fifth-graders from John S. Malcolm Elementary w i l l co m p e te w i t h t h e i r claw-bot, “Zippy,” in the 2017 VEX IQ State Championship on Sunday, March 12, in Pomona,
APPLICATION CASES
US$115 billion MAR 2017 ● www.asmag.com
US electric and gas utility capital expenditure reached about US$115 billion in 2016. Source: Deloitte
16
California. RAD and Milestone Systems believe that organizations have an obligation to coach and encourage today’s youth to pursue technology interests in an effort to evolve the future of the industry. Through this partnership, the companies are able to share innovative ideas, support creativity and mentor future innovators. The Coding Queens team is unique in that they were the youngest team to compete in the 2016 VEX IQ Regional event in December out of 23 teams. “ We a r e h o n o r e d t o support the Coding Queens
in their quest to become state champions,” said Reinier Tuinzing, Strategic Alliances Manager — Americas, Milestone Systems. “It is very exciting to help introduce our next generation of innovators to new and emerging technologies through hands-on learning opportunities.” “It’s critical to support young minds in STEM and robotics technology fields and RAD is in a unique position to showcase the opportunities available in this field,” said Steve Reinharz, Founder and CEO of RAD. “RAD is excited to be a small part of the support network that
this team has in place, and we hope more companies will emerge as strong proponents of students striving to be successful in the engineering, coding, and robotics fields.” RAD and Milestone Systems will send the team off during an event at 4 p.m. Sunday, March 5, at Ocean
EDUCATION
HID SECURES ACCESS TO US UNIVERSITY George Mason University in Virginia, U.S., has a population of more than 30,000 students with nearly 5,000 facility members. As the campus continued to expand, it needed a more secure "one card" solution that could offer better security and end-to-end issuance capabilities. The university chose to install an end-to-end ID solution that would enable administrators to migrate its existing card system over five years. HID Global multiCLASS SE readers, as well as PERSONA Campus Software and SARGENT Passport locks from ASSA ABLOY were deployed on the campus. HID Global Seos smart card use was extended by OMNIKEY desktop readers for students to check out books and pay for meals. Also, HID Global FARGO ID card printers and encoders and Asure ID card personalization software were used to create student cards. To date, approximately 3,500 HID Global readers and ASSA ABLOY locks have been installed, offering the university scalability and flexibility.
ACTi Introduces SARA, Industry’s First AI Assistant SARA was designed to make it easier for ACTi users to find information and manage devices. BY ACTi
S "RAD and Milestone Systems believe that organizations have an obligation to coach and encourage today’s youth to pursue technology interests in an effort to evolve the future of the industry." Breeze Park in Laguna Nigel, California. The Coding Queens will be presented with the opportunity to name RAD’s newest robot, be presented with a sponsorship check and take part in a demonstration of artificial intelligence capabilities.
ARA (Smart ACTi Robot Assistant) is an AI assistant that brings valuable information at the user’s fingertips 7/24. SARA will help find ACTi products, their specifications, contact information, documents and many other useful resources. SARA leverages many cutting-edge technologies such as machine learning, cloudbased speech analysis and natural language understanding. She is constantly learning new abilities. Security Management Instantly operate security equipment with sound of the user’s voice. • Control PTZ cameras or interact with TV Wall • Enable or disable virtual fences, restricted areas and other video-based intelligent features • Operate building automation systems, parking lot gates and other physical devices Operation Management Waste no time to know current data and command connected devices. • Enhance websites with an AI assistant to achieve zero-click navigation • Get current data from connected sensors such as temperature, pressure or speed • Control the machinery with voice commands Business Intelligence Convert metadata into valuable knowledge that users can access instantly and hands-free. In addition to the spoken response, get detailed graphs on the user’s screen. • Request aggregated customer profile data from ACTi intelligent cameras • Get instant revenue reports from the integrated POS system • Make the right decisions based on data analysis and predictions
PUBLIC UTILITIES
AXIS LIGHTS UP THE POWER GRID IN US KS Energy Services offers installation of natural gas, electric, telecommunication and water services throughout the Midwest in the U.S. The company decided to upgrade from its old analog camera system when it relocated to a new office site. KS Energy picked an end-to-end Axis Communications solution, selecting a recorder, software and 16 cameras from the Axis portfolio to provide coverage across its new facilities. Fixed bullet-
style cameras with low and varying light capabilities and outdoor enclosures were installed, allowing clear images regardless of lighting conditions with built-in IR LEDs.
With the rack server and preconfigured hardware from Axis, it was simple for IT to pull the entire system onto the office’s preexisting network. The company has so far only pinpointed incidents through the cameras like minor bumps in the parking lot. The ease of use has staff already planning out future deployments at the company’s other offices and remote sites, plus further points at headquarters.
17
A Ena
Taiwan
MAR 2017 ● www.asmag.com
26
New
Airport Technologies able Smarter Travel AIRPORTS ARE SOME OF THE MOST CRITICAL SITES TO SECURE IN ANY COUNTRY. NEEDLESS TO SAY, IN MANY PLACES THEY ARE UNDER THREAT. HOWEVER, SEVERAL NEW TECHNOLOGIES ARE ENABLING AIRPORT SECURITY AND EXPERIENCE TO BECOME SMOOTHER AND MORE EFFICIENT. IN THIS ARTICLE, WE TAKE A LOOK AT A FEW OF THESE INNOVATIVE SYSTEMS. BY Prasanth Aby Thomas
here is no doubt that the global security threats and the concerns associated with them are on the rise. Across the world, nations are strengthening their security infrastructure in order to counter issues like terrorist attacks. This is especially true of critical infrastructure, in particular, airports. According to the research firm Global Market Insights, airport security market was worth US$8.8 billion in 2015, with gains at over 4.6 percent CAGR. This is expected to reach $12.8 billion by 2023, as governments prioritize the need to protect passengers and infrastructure. Asia Pacific is expected to see substantial development due to the emerging markets in India and China. The region accounted for over 25 percent of the global revenue in 2015. Economic progress and better infrastructure are driving demand for advanced security solutions in the region. The Middle East and Africa airport security market size is expected to witness notable growth due to the rise in the vulnerabilities and undesirable attacks in the countries including Saudi Arabia and the U.A.E., Global Market Insights added. “Growing air traffic with the increasing air travelers owing to the time-related factors and rising disposable income may contribute towards the industry demand,” the research firm said. “Increasing number of airports are investing in complex control & command (C2) and integration solutions due to the high level of security offered by such systems. Moreover, these systems provide greater situational awareness.”
Patrik Anderson, Director, Business Development, Transportation, Axis Communications
Challenges to Airport Security The sheer number of people that pass through an average international airport itself should be considered a major hurdle to providing effective security. According to
Stephane Cheikh, Ventures and Innovation Manager, SITA Lab
27
| VIEWPOINT |
Building Smart Warehouses With IoT
Source: Zebra Technologies
Basic warehouse technologies are no longer cutting it. Warehouse managers are looking for ways to increase operational efficiencies and reduce costs. With the help of the Internet of Things (IoT), their wishes are being granted. BY Eifeh Strom, Freelancer
he Internet of Things (IoT) has brought a new level of connectivity to the industries across the board. Warehouse and logistics managers are using the technology to increase operational efficiency, save money and add value to their business. Consumer expectations are expected to drive increased investment in IT and operational functions in warehouses over the next four years, according to the Warehouse Vision Report by Zebra Technologies. Based on the report, 51 percent of those surveyed expected to increase investment in real-time location systems that track inventory and assets throughout their warehouses in 2015; this number increases to 76 percent by 2020. Furthermore, it found that 62 percent of those surveyed had plans to increase their usage of IoT by 2020.
Investment in systems such as real-time location, along with increased usage of IoT, will not only help warehouses become smarter but also help warehouse managers meet new goals for efficiency.
Companies are turning to wearable devices and smart tags to increase productivity of workers in warehouses.
From Average to Smart Better sensing, real-time analytics, robotics, automation, wearables and video together can create smarter warehouses. Yet building a
"BETTER SENSING, REAL-TIME ANALYTICS, ROBOTICS, AUTOMATION, WEARABLES AND VIDEO TOGETHER CAN CREATE SMARTER WAREHOUSES." 35
HOW SECURITY DEVICES MAKE WAREHOUSES SMARTER The use of security devices and technologies for beyond security purposes has become a requirement for many security operators across industries.
MAR 2017 ● www.asmag.com
It’s no longer enough for a video surveillance camera to simply capture and record images. Now, end users want better return on investment (ROI), which means working together with non-security devices. “The true value is when these technologies are implemented in a way that the data can be interwoven and not seen as a single data point,” said Douglas Bellin, Industry Lead at Cisco Systems. “Many of these technologies are complimentary, not distinct, and in fact each of the capabilities will add value to the others.” Bellin provided the following example: “If I take a location-based value (where something is using RFID) and a video value (what is happening right now), I can start to add more value to the two technologies combined that I could not get on its own. Adding more sensors to the mix adds even more value. For instance, if I add a temperature sensor to the RFID and video, now I can truly see what is happening in other locations or remote locations and understand why it may be occurring and also ensure consistency of the data since it is coming from multiple data sources.” From this example, utilizing security equipment as part of a wider system not only creates a smarter environment for managers, but also increase the ROI on security investments.
36
smart warehouse can be a daunting task. “The major issue is where to start and what value it will add — and then how to start funding capabilities,” said Douglas Bellin, Industry Lead at Cisco Systems. As with any business, the value of implementing new technology is not in the initial cost — it is in the long-term benefits and its ability to solve multiple issues. For instance, adding wireless to a Douglas Bellin, Industry Lead, Cisco Systems warehouse just for the sake of adding wireless wouldn’t make sense; however, if the wireless could be applied to video feeds (instead of multiple cables to the video cameras), for location-based services (tracking items over wireless), voice communications, scanners, wearables and others, as Bellin explained, “you start to see accelerators of the return on investment versus just as a single technology for a point offering.” Mark Thomson, Retail Industry Bellin sees trending technologies such as Director, EMEA, Zebra Technologies IoT, big data, wearables, and the cloud all being increasing adopted by warehouses. Cisco is adding additional sensors for noise, temperature, power use and more as part of its IoT offering for supply chain management. The company is also using the cloud as “a capability to try new software and produce agile capabilities in process changes,” according to Bellin. “This allows us to not have to build large data on site, but also then integrate data from multiple sources to add new value levels. This then integrates big data into new capabilities.”
RFID in Smart Warehouses Using RFID in warehouses isn’t new — warehouses have been using RFID for quite a while. However, as the technology has matured, it is now being used across many businesses in closed-loop solutions, according to Mark Thomson, Retail Industry Director of EMEA at Zebra Technologies. “RFID smart tags can store significantly more information than barcodes and are, among others, an effective means against counterfeit. That is why industries with expensive products such as textiles or luxury goods rely on RFID tracking,” he said. Using RFID also allows the possibility to measure the size and weight of packages in the warehouse. By doing so, the technology could enable more optimized loading of trucks. This could be done by capturing the proportions and weight of a package during the loading process with a forklift that is accordingly equipped. Thomson provided the following example: “A truck is to depart in 15 minutes but is only half full. With the analysis of the warehouse data, suitable packages — that can be located with an accuracy of up to 1 meter at present and 30 centimeters in the future — will be chosen to optimize the truckload for the upcoming tour. A fully loaded truck means fewer tours. The fuel savings benefit both the company and the environment.” Although the use of RFID in industries with expensive products is more
Smart Technology |
Cybersecurity
Raises Eyebrows After DDoS Incident
MAR 2017 ● www.asmag.com
In October last year, a series of coordinated cyberattacks were launched against Dyn, an internet performance management company based in New Hampshire. It was later found out a botnet of Internet of Things (IoT) devices, including printers, baby monitors and IP cameras, were used in the attack. The incident again thrusts the issue of cybersecurity on the center stage, while vendors and users alike are urged to take deeper precautions against these attacks. by William Pao
38
T
he attacks against Dyn took place on October 21, 2016, and resulted in service disruptions across various famous sites including Airbnb, Amazon.com and The Boston Globe. The incident involved a series of distributed denial-ofservice attacks against Dyn, which received requests from some 100,000 IoT devices at data rates of 1.2 Tbps, putting the incident
as the largest of its kind in history, The Guardian reported. The devices were infected with malware called Mirai, which spreads itself from one device to another and enables the attackers to take control of the devices remotely. “Once the malware has identified and accessed the devices, it turns them into bots that can be commanded as part of an army of devices to flood
websites with requests, effectively crippling the server and eventually forcing it to go offline,” said Jeff Hurmuses, VP of APAC at Malwarebytes. This again put the issue of cybersecurity in the spotlight. “A very, very high percentage of the currently deployed devices are completely insecure and can be taken over administratively with a variety of off the shelf hacking products,” said Andrew Lanning, Co-Founder of Integrated Security Technologies. “We all know the weaknesses of physical systems. Interoperability and functionality come way before cybersecurity is evaluated, and security is a common afterthought,” said Darnell Washington, President and CEO of SecureXperts. “The use of default passwords and legacy PLC boards with hardcoded keys cause overall weakness where one small flaw leaves complete exposure to otherwise secure systems.”
Common Vulnerabilities According to experts, there are certain vulnerabilities that, if not taken care of properly, can put connected devices at high risk. Hardening their devices against cyberthreats, therefore, has
Smart Technology |
etary or personally identifiable information (PII) and also enable access to a command line via services such as Telnet. The default configuration also allow a means of injecting malware into a device,” said Salvatore D’Agostino, CEO of
IDmachines. Vendors therefore are responsible to ensure their device software has strong security with a difficult username and password. Requiring the user to change the default username and
CYBERSECURITY TIPS FOR SIs AND END USERS Ensuring cybersecurity is as important for SIs and users as it is for vendors. Darnell Washington, President and CEO of SecureXperts offered the following tips for SIs as they install systems: ●They are trained in cybersecurity. ●They are issued unique smart cards that are used to open the secure container of the camera. ●They use digital certificates to secure the authentication to the network, open a configuration screen that binds the camera and the user using active directory, and establish the trust framework for end-to-end encryption and strong authentication. ●The archives are secured using strong encryption. ●The system is tested for vulnerability.
For users, they can also engage in certain practices to protect their devices. According to Jeff Hurmuses, VP of APAC at Malwarebytes, these include the following:
MAR 2017 ● www.asmag.com
●Regularly updating software — Always remember to update software periodically as soon as new versions of operating systems are available or when alerted by device vendors. ●Strengthening passwords — Not only the password must be difficult to guess, they must also be different from one to another to prevent hackers to re-use the same password on other online accounts. ●Scrutinizing permissions requested by applications — One of the most prevalent methods through which malware gains access to devices is through the use of “permissions.” For example, when installing an application on the user’s phone, they will be prompted to provide the application with permission to access various types of information on the phone. Thus the user should always consider whether the application is trustworthy and if the requested permissions make sense.
40
password is also a must. Further, some even outright recommend the use of multifactor authentication to add extra layers of security. “With today’s computational power of tools used to crack passwords, and the addition of the use of Rainbow tables, we need to move completely away from the use of username/passwords in favor of multifactor authentication, biometrics and smart cards,” Washington said. “Vendors can even consider implementing two-factor authentication, be it from tokens, apps or RFID cards to verify user’s identity instead of simply entering a username and password to log in,” Hurmuses said.
Encryption Usernames, passwords and other information stored in devices should also be encrypted, and experts advise against proprietary algorithms that are not vetted. “Using proprietary cryptography —
’our patented high security technology’ — is a widespread problem. Many standards have sections called ’security considerations’ that often are overlooked,” D’Agostino said. “This is one of the reasons that national, international and industry standards exist and need to be followed. Generally the so-called NSA Suite B algorithms represent the list of acceptable cryptographic algorithms.”
Firmware Updates Firmware exists on nearly all hardware, and it also presents a vulnerability; once a malware is planted into it the hacker can get full access to the system. That’s why vendors should provide updates once security flaws or potential security threats are found. “Most security devices are full blown computers with modern operating systems, for example embedded version of Windows or Linux. Updating firmware for these devices is as crucial as the updates to
The use of default usernames and passwords allows cyber criminals or malware to take over a device easily. Changing the default username and password pair is therefore a must.
Enterprise Identity and Access Management Made Easy With PIAM
Keeping track of each and every person within an enterprise environment can be quite a task. Couple that with managing their access and the task becomes all the more complicated. Utilizing a physical identity and access management (PIAM) system could not only help enterprises ease management, but also protect them from avoidable risks. BY Eifeh Strom, Freelancer
Enterprise Questions for PIAM When choosing a PIAM system, enterprise users must take an array of questions into consideration. According to Magnus Malmström, VP of Product at identity and security company Nexus Group, enterprises should search for responses to the following questions:
MAR 2017 ● www.asmag.com
How can I implement best practices and standardize my security organization? How do I lower my liability and maximize asset protection? How do I future-proof my entire security investment? How can I leverage my existing security infrastructure on a global scale? How can I reduce manual processes that can be labor intensive, repetitive and may have potential errors? How do I optimize my resources, technologies and security operations? How can I keep up with government of organizational and industry regulations? How can I easily monitor infractions and proactively enforce my security policies and rules? How can I regularly report and audit my security landscape? How can I secure user provisioning of RFID cards and key fobs, PKI smart cards and mobile tokens?
44
dentity management in enterprise environments is an integral part of both physical and data access. However, identity and access management is complex and can be complicated. Physical identity and access management (PIAM) systems could help ease these complexities. A PIAM system centralizes an enterprise’s ability to manage the lifecycle of identities by processing physical identification, authentication and access management. By 2022, the global PIAM market is expected to reach US$861.5 million, at CAGR of 15.7 percent from 2016 to 2022, according to market research company Global Information. Drivers for growth include increased security and operations management concerns, compliance mandates and technology development. “Most organizations today rely on the corporate security department to manage policies on how much physical access to facilities zones and assets should be granted to each identity. Separately, the IT department manages access to the information systems. Regardless of the diligence of these
Don Campbell, VP, Products, Quantum Secure
Jasvir Gill, CEO, AlertEnterprise
departments, changes to the status of individuals is rarely correlated on a timely basis between the IT and physical security data silos,” said Jasvir Gill, CEO of AlertEnterprise. “Full-time employees may leave the company, change jobs or move to new locations. Contractors may become permanent employees, complete their projects or be replaced. There is seldom an integrated and up-to-date profile on how much access has been granted and what happens when an individual’s status, class or category changes.” Now, more than ever, enterprises are needing to fill those gaps. That’s where a PIAM system can help.
Divyakant Gupta, CEO, IDCube
to improve accuracy, speed up many of the process steps and collect valuable data that can be used to gain further cost savings and operational improvements,” he said. Even with the majority of today’s key business processes being automated, there are still challenges. “IT manages the underlying applications for these processes. Security practices relating to application and database access and authorization are tracked by IT security personnel; however, this tracking is rarely coordinated with physical security personnel who are tasked with protecting the facilities and physical assets and who are responsible for managing building access,” Gill said. “Further, there is often a
Magnus Malmström, VP, Product, Nexus Group
lag before status changes noted in HR systems are reflected in IT and physical security systems. Herein lies vulnerability.” Another major challenge is the number of systems from different vendors the enterprises are deploying. These systems are then oftentimes managed by different departments, such as IT, corporate security and operations, resulting in a lack of interoperability. “These systems have been established over time to efficiently perform the tasks for which they are responsible. While each function may perform their own prescribed set of tasks very well, the systems may not be designed to interact with each other, particularly with regard to how much access and authorization to
Challenges Enterprises are required to open up more of their business processes to external stakeholders as a result of today’s instant economy. This means that everyone from employees to contractors to vendors, partners, service providers and visitors all need access to particular assets, facilities and resources. However, this raises the question, how much access is too much? Not only that, but what kind of risk does this put the company in? Don Campbell, VP of Products at Quantum Secure pointed to the inefficiency and ineffectiveness of manual identity management processes as a major challenge for enterprise customers. “ Whether it is managing visitors, employees or contractors, manual processes are slow, error-prone and costly. Customers stand to gain significant ROI by automating these processes
PIAM in Oil and Gas The use of PIAM in enterprise environments has obvious benefits; however, one vertical in particular that could greatly benefit from a PIAM system is the oil and gas market.
Don Campbell, VP of Products at Quantum Secure explained why: “The oil and gas market, and to a great extent the general energy market, typically uses a large number of contractors and subcontractors to get specialized work done. At the same time, this work is often regulated, with requirements for training, certifications and even background checks that must be entered, verified and tracked on an individual basis. Watch lists must also sometimes be checked on a periodic or ongoing basis, further complicating the records. Managing these contract workers, and their access to job sites, is a significant challenge for management, who is tasked to ensure that each worker has been vetted per the requirements, has had the required training and is actually supposed to be at that worksite at any particular time. PIAM systems automate this process and provide improved accuracy and easily auditable records.”
45
SMAhome
Smart Home Trends for 2017 Telco smart home launches Leading telcommuication providers (telcos) such as AT&T, Deutsche Telekom, Orange and more have been in the smart home business for several years. Considering smart home is a good addon for subscribers, telcos in different countries such as Telstra (Australia), Singtel (Singapore), True (Thailand), MobiPhone (Vietnam), SK (South Korea), O2 (U.K.), KPN (the Netherlands) have introduced new smart home services with their own apps in 2016. According to sources, more telecommunication and cable TV service providers from emerging markets for smart homes, such as South
MAR 2017 ● www.asmag.com
48
Africa, ASEAN, South Americas and East Europe, are planning to launch the smart home kits and services in 2017.
Voice control & command Research reports from different institutions have pointed out that voice control has became a new standout category for smart home devices over the past 18 months. ABI Research reports that voice control smart home devices, typified by the Amazon Echo, will represent almost 30 percent of smart home device spending by 2021, despite being a device category that barely existed two years ago. The ability to leverage digital assistant
adoption on smartphones delivers genuine consumer value. “The ability to integrate and extend voice control throughout the home environment will require many more smart home devices to work seamlessly with voice control offerings,” said Jonathan Collins, Research Director at ABI Research. “Over the next five years, a wide range of home device and appliance vendors, as well as the installer and managed smart home systems providers, will have to address how to partner to integrate with voice control platforms.” German operator Deutsche Telekom has confirmed its non-proprietary platform for connected homes, QIVICON, has been integrated with the Alexa app from Amazon in September 2016. The German telco cited, “working with Amazon allows us to share even more innovation with our customers. We believe strongly in the future of voice-controlled smart homes.” With the popularity of Amazon Echo in the Western markets, language abilities have been giving market opportunities to Echo’s rivals such as NUGU of SK Telecom in South Korea and DingDong in China. NUGU’s service is initially offered through a 21.9 cm.–tall cylinder-shaped device also built to work as a home
speaker and LED lighting. The Korean telco confirmed that it plans to open up NUGU’s Application Programming Interfaces (APIs) in the first half of 2017 in a move to boost the creation of an ecosystem surrounding NUGU by working closely with startups, SMEs and experts in the field of artificial intelligence to develop related services. Linglong Tech, the company behind DingDong, is a joint venture between Chinese tech company iFlyTek and e-commerce firm JD.com. DingDong will use one of Amazon Echo’s winning strategies which is to offer Alexa as an open platform for third-party developers, inspiring more creative applications. The company has started to work on a new platform for developers to integrate DingDong skills into their apps.
AI-based smart homes Artificial intelligence (AI) technologies enable smart home devices to detect the signals that are received through remote controlled devices (such as wearable devices) to control the functioning of home appliances, devices and security systems. Alongside Amazon and Google, Apple, Samsung and Microsoft all have the impetus to bring similar devices and
functionality to market. According to Technavio, the AI market itself is full of opportunities for vendors and smart home OEMs such as Samsung Electronics. In November 2016, the tech giant from South Korea announced its plan to roll out AI Technology on Samsung smart home appliances. The ability to achieve this comes from Samsung’s acquisition this October — Viv. The startup Viv was founded by the creators of Apple’s virtual assistant, Siri. They left Apple and created Viv in 2012. Viv is built up differently from Siri in that its back-end systems is programmatic. Viv’s AI is capable of creating new codes by itself to accomplish new tasks. This allows the AI to achieve tasks though there’s no existing codes written for it. Such companies are planning to invest in AI solutions to build next-generation intelligent devices. Leading cloud computing vendors, such as Amazon Web Services and Microsoft, have also invested in AI solutions and machine learning technologies. Cloud computing has become an essential component in smart home technologies because the cloud offers both applications and storage solutions. Additional investments in AI, powered by cloud computing solutions, will provide a competitive edge to leading vendors. Technology-wise, emotion detection and recognition is the other facilitator of
AI-based solutions. Biosensor technology is expected to grow at the highest rate. Research institute MarketsandMarkets estimated that the emotion detection and recognition market is estimated to grow from US$6.7 billion in 2016 to US$36.1 billion by 2021, at a compound annual growth rate of 39.9 percent. The tech giant IBM announced that it will release its cognition computing skill to all the developers in November 2016. IBM called this experimental project as “Project Intu,” a platform allowing developers to embed Watson functions, such as cognitive or basic machine learning skills, into devices and offering a next generation architecture to build up cognitive-enabled experiences. Through this open project, developers can then shorten the time creating cognitive experiences and put their efforts toward establishing more other capabilities.
More go-to IoT platforms IoT platforms are the key for the development of scalable IoT applications and services such as smart homes that connect the real and virtual world between objects, systems and people. In 2016, there are at least 300 IoT platforms such as GE’s Predix, IBM’s Watson, and SAP’s HANA in the market and the number continues to grow. The growth is facilitated by innovative startups, hardware and networking equipment manufacturers, enterprise software and mobility management companies such as IBM, Amazon, Ayla Networks, Exosite, Orbweb and so on. With the various business strategies presented by different IoT platform providers, partnership is always the right answer to capitalize on the potential of
49
Avigilon Appearance Search Features:
Dallmeier DF5400HD-DN/ IR Ultra HD Camera
■Avigilon/Canada ■Email: asksales@avigilon.com
• Day/night with ICR • Integrated IR illumination • Motor-driven lens • One-push autofocus • P-Iris control • PoE (Class 0)
Features:
• Quickly searches for a person of interest • Refines searches based on time and camera location • Playback, bookmark and export tools • Self-learning video analytics-enabled • Integrated with Avigilon Control Center (ACC) software
■Dallmeier/Germany ■Email: info@dallmeier.com
Toshiba Percept S-Series Cloud Empowered Recorders Features:
• Centralized user management • Cloud-based health monitoring • Export/share/download video clips to/from the cloud
• HDMI and VGA video output • Single sign on from any device • Up to 30 fps
■Toshiba/Japan ■Email: TAIS-Surveillance@toshiba.com
March Networks MegaPX ATM Cameras Features:
• High dynamic range for superior images in bright backlight conditions • Excellent low-light performance • Choice of styles: self-contained or modular • Two M12 lens options for self-contained camera: 2.8 mm standard and 3.7 mm pinhole • Easy to install and won’t shift over time • Compliant with ONVIF S profile ■March Networks/Canada ■Email: sales@marchnetworks.com
3xLogic 2MP IP Indoor Multi-Sensor Camera with Wi-Fi Features:
• Hosts VIGIL Server, allowing the camera to record video to the onboard SD card, with full search capabilities in VIGIL Client and in the View Lite II and infinias mobile apps • Built-in Passive Infrared (PIR) sensors • 2-way audio with VIGIL Server • Digital I/O allows the multi-sensor to be an alarm annunciator, audio system and video recorder in one small unit • IR-range up to 10 meters • Video compression using H.264 MJPEG ■3xLogic/U.S. ■Email: sales@3xlogic.com
HID Lumidigm M-Series Fingerprint Sensors Features:
• Multi-spectral fingerprint imaging provides reliable capture for real-world productivity • Ergonomic USB housing fits easily on desktop • Enhanced liveness detection prevents use of fake or stolen biometric data (M32x) • Support for Windows, Linux, Android and thin-client application environments • SDK 6 with MINEX III algorithm supports 1:1 matching and 1:N searching on device or USB host ■HID Global/U.S. ■Email: lumidigm@hidglobal.com
ISONAS Pure Mobile Credentials
MAR 2017 ● www.asmag.com
Features:
• iOS 8.0, Android 5.0 and newer • Quick enrollment and management of credentials • Encrypted communication using unique session keys • Individual pairing to specific devices • Non-transferable credentials ■ISONAS/U.S. ■Email: sales@isonas.com
60
Bosch Security Systems AVIOTECVideo-Based Fire Detection
Hundure Technology HTA-502PEF-N Fingerprint Time & Attendance Recorder
• Detection of flame and smoke helps to identify hidden smoldering fires and burning liquids • Fast detection at the source allows users to see fires where they start, speeding reaction times, improving rescue response and minimizing damage at the site • No masking is necessary due to AVIOTEC’s capability to detect fires using the camera’s entire field of view in most cases • Intelligence in the camera detects disturbances using raw data with no transmission or compression • Live streaming enables live monitoring of environments and speeds up rescue response • Video storage as a basis in order to perform root-cause analysis with recorded videos
• Supports 1,500 users with 2 fingerprint templates for each person • Provides 3,000 cardholders and 100,000 events • Built-in USB-host interface to import/export data through USB flash drive • Built-in USB-slave interface for connecting PC to upload/download • Various interfaces TCP/IP, PoE or Wi-Fi are available for choice • The device ACU-30 (with 2 relays) is optional for connecting an external lock and siren • Provides 32 working shifts and 32 siren schedules
Features:
■Bosch Security Systems/Germany ■Email: apr.securitysystems@bosch.com
Features:
■Hundure Technology/Taiwan ■Email: overseas@hundure.com
EverFocus EPRO 32CH Embedded NVR with 4HDDs Features:
• Records up to 32 channels (main stream and sub stream) • Supports ONVIF IP cameras • H.265 and H.264 codecs • Dual-stream recording • Supports 4 HDD (up to 6 TB each) ■EverFocus Electronics/Taiwan ■Email: marketing@everfocus.com.tw
Eagle Eye Camera Cyber Lockdown Features:
• Detects if an unwarranted communication attempt is made and informs appropriately • Eagle Eye takes responsibility for patching and securing the Eagle Eye Bridge which is located on the network and connects to the internet • Eagle Eye Bridges and CMVRs are not exposed directly to the internet with no exposed IP addresses; cannot be directly reached by attackers
ICP DAS IIoT Communication Server Features:
• Provides a physically separate port on the Eagle Eye Bridge to connect cameras. Cameras are not on the general network and cannot be reached by employees or other people with access to the network • Uses AES encryption to protect video data being communicated between the Bridge and the cloud to insure that a hacking effort never results in usable video ■Eagle Eye Networks/U.S. ■Email: sales@EagleEyeNetworks.com
Hi Sharp Electronics HS-AHD-D024C9 Video Surveillance
• OPC UA server and MQTT client service • MQTT broker inside • Real-time capability • 64-bit hardware serial number for software protection • Supports redundancy and PID • 4 serial ports (RS-232/RS-485)
Features:
■ICP DAS/Taiwan ■Email: cmkt@icpdas.com
■Hi Sharp Electronics/Taiwan ■Email: sales@hisharp.com.tw
• 5-MP pick up device • AHD 1080P output • 360° and 180° panoramic view • Multiple view patterns • Control Over Coaxial (CoC) • Board lens 1.19mm / F2.0
MAR 2017 ● www.asmag.com
asmag.com Product Focus To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com, or scan the QR code below! For more information, contact as-pr@newera.messefrankfurt.com 62
Show Calendar
Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.
WORLD SECURITY EXHIBITION DIRECTORY APRIL
MAY
• Date: 2017/04/05–04/07 • Venue: Sands Expo & Convention Center, Las Vegas, U.S.A. • Tel: +1-203-840-5602 • Email: inquiry@isc.reedexpo.com • URL: www.iscwest.com
• Date: 2017/05/03–05/05 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-7966-222-505 • Email: agnius.kazlauskas@ubm.com • URL: www.ifsec-global.com/philippines/
SECUTECH INDIA
EXPOSEC
• Date: 2017/04/06–04/08 • Venue: Bombay Exhibition Center, Mumbai, India • Tel: +91-22-4286-3800 • Email: info@secutechexpo.com • URL: www.secutechindia.co.in
• Date: 2017/05/23–05/25 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: info@fieramilano.com.br • URL: www.exposec.tmp.br
SECUTECH INTERNATIONAL
SECUREX
• Date: 2017/04/12–04/14 • Venue: Nangang Exhibition Center, Taipei, Taiwan • Tel: +886-2-8729-1017 • Email: kirsten.wu@newera. messefrankfurt.com • URL: www.secutech.com
• Date: 2017/05/30–06/01 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: leighm@specialised.com • URL: www.securex.co.za
ISC WEST
IFSEC PHILIPPINES
ISC BRASIL
JUNE
• Date: 2017/04/18–04/20 • Venue: Expo Center Norte, São Paulo, Brazil • Tel: +55-11-3060-4717 • Email: atendimento@reedalcantara. com.br • URL: www.iscbrasil.com.br
• Date: 2017/06/20—06/22 • Venue: ExCel London, London, U.K. • Tel: +44-20-7921-8231 • Email: ifseccustomerservice@ubm. com • URL: www.ifsec.co.uk
IFSEC INTERNATIONAL
JULY
SECURITY EXHIBITION & CONFERENCE
CEDIA 2017
• Date: 2017/09/05—09/09 • Venue: San Diego Convention Center, San Diego, U.S.A. • Date: 2017/07/26—07/28 • Venue: International Convention Centre • Tel: +1-800-669-5329 • Email: info@cedia.org Sydney, Darling Harbour, Australia • URL: http://expo.cedia.net/home • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au ISAF ISTANBUL • URL: www.securityexpo.com.au • Date: 2017/09/14—09/17 • Venue: Istanbul Expo Center (iFM), Istanbul, Turkey • Tel: +90-212-503-32-32 SECUTECH VIETNAM • Email: marmara@marmarafuar.com.tr • Date: 2017/08/16—08/18 • URL: http://www.isaffuari.com/en/ • Venue: Saigon Exhibition & Convention Center (SECC), Ho Chi Minh City, SMART SUMMIT LONDON Vietnam • Date: 2017/09/19—09/20 • Tel: +886-2-8729-1016 • Email: stvn@newera.messefrankfurt.com • Venue: Business Design Centre, London, U.K. • URL: www.secutechvietnam.com • Tel: +44-330-3353900 • Email: hello@nexusmediacom.com • URL: http://www.iotsmartsummitlondon. com/
AUGUST
SEPTEMBER IFA
• Date: 2017/09/01—09/06 • Venue: Berlin ExpoCenter City Exhibition Ground, Berlin, Germany • Tel: +49-30-3069-6924 • Email: ifa@messe-berlin.de • URL: www.ifa-berlin.de/en/
ASIS • Date: 2017/09/25—09/28 • Venue: Kay Bailey Hutchison Convention Center, Dallas, U.S.A. • Tel: +1-703-519-6200 • Email: asis@asisonline.org • URL: https://securityexpo.asisonline. org/
Companies in This Issue PRODUCTS OF THE MONTH • Actility • Cisco Systems • Embit • LORIOT.io • Microchip Technology • Multi-Tech Systems • Trusted Objects
MAR 2017 ● www.asmag.com
NEWS FEATURE • ACTi • Milestone Systems • NXT Robotics • OmniVision Technologies SMART TECHNOLOGY • IDmachines • Integrated Security Technologies 58
• Malwarebytes • SecureXperts VERTICAL SOLUTION • Analogic • Axis Communications • Clear Flight Solutions • Digital Barriers • Genetec • Honeywell Security & Fire • LG Electronics • RIMOWA Electronic Tag • SITA Lab INTEGRATED SYSTEM • AlertEnterprise • IDCube • Nexus Group • Quantum Secure
VIEWPOINT • Cisco Systems • Zebra Technologies IoT • Acer • Dahua Technology • Genetec • Happiest Minds Technologies
Next Issue
• Hikvision Digital Technology • Nedap Identification Systems • Smart Parking Technology • Streetline
VERTICAL SOLUTION | Smart Retail INTEGRATED SYSTEM | Audio Detection SMART TECHNOLOGY | Access Control in Smart Buildings IoT & BIG DATA | Smart Healthcare
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO. ADVERTISER 25 BOSCH SECURITY SYSTEMS 13 COMMAX CO., LTD. INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD. 37 DALLMEIER ELECTRONIC GMBH & CO.KG 33 FUJIAN FRAN OPTICS CO., LTD. BACK COVER HIKVISION DIGITAL TECHNOLOGY CO., LTD. 23 HI SHARP ELECTRONICS CO., LTD. 9 IDIS CO., LTD. 31 RICOM 63 SHENZHEN COMMANDER TECHNOLOGY CO., LTD. 6 SIA RIOT ENGINEERING 2, 3 SONY SEMICONDUCTOR SOLUTIONS CORPORATION 64 TAMRON CO., LTD. INSIDE BACK COVER TECHPOINT INC. 5 VIDEOTEC S.P.A.
MAJOR ITEM COUNTRY CCTV GERMANY SURVEILLANCE KOREA SURVEILLANCE CHINA SURVEILLANCE GERMANY DOME COVER CHINA SURVEILLANCE CHINA CCTV/ DVR/ MONITOR/ IP CAMERA/ HD-SDI/ TVI/AHD TAIWAN SURVEILLANCE KOREA LENS CHINA CASING CHINA SURVEILLANCE LATVIA SEMICONDUCTOR JAPAN CAMERA JAPAN CHIPSET USA IP CAMERA / SOFTWARE / VIDEOSERVER ITALY
E-MAIL apr.securitysystems@bosch.com pcy@commax.co.kr overseas@dahuatech.com info@dallmeier.com sales@fjsmt.com overseasbusiness@hikvision.com sales@hisharp.com.tw sales@idisglobal.com sales@forecam.com sjw@yjdcase.com eu@luxriot.com newbiz@tamron.co.jp dma@techpointinc.com info@videotec.com
ACCESS CONTROL PAGE NO. 41 39
ADVERTISER GIGA-TMS INC. UWC ELECTRIC (M) SDN. BHD.
MAJOR ITEM RFID MODULE / LOCK / READER ACCESS CONTROL
COUNTRY E-MAIL TAIWAN promag@gigatms.com.tw MALAYSIA sales@uwcelectric.com
MAJOR ITEM INTRUSION ALARM INTRUSION ALARM INTRUSION ALARM ALARM
COUNTRY ITALY KOREA ITALY TAIWAN
INTRUSION ALARM PAGE NO. 11, 47 4 7 41
ADVERTISER EL.MO. S.P.A. KMT CO., LTD. LINCE ITALIA S.P.A. SUPERIOR ELECTRONICS CORP.
E-MAIL info@elmospa.com overseas@isaso.com info@lince.net info@superior-elec.com
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
63