CONTENTS VERTICAL SOLUTION
a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.
ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher Editorial
General Press Jill Lai Alf Chang William Pao Lisa Hsu Emily Lin Ryan Liu Prasanth Aby Thomas
Smart Solutions
Editor-in-Chief Senior Consultant Reporter Reporter Editor Reporter Reporter
Art Design
Gaven Lee Executive Designer gaven.lee@newera.messefrankfurt.com Mao Chang Senior Designer mao.chang@newera.messefrankfurt.com Tzu-Yin Chien Designer tzuyin.chien@newera.messefrankfurt.com Circulation
Make Headway in
Retail
Michelle Shih Officer
P.20
Collins Yuan Group Manager collins.yuan@newera.messefrankfurt.com Thomas Pin Account Manager thomas.pin@newera.messefrankfurt.com Chihung Lee IT Manager chihung.lee@newera.messefrankfurt.com
asmag.com
Jessica Yang Project Manager jessica.yang@newera.messefrankfurt.com Secutech
Peggy Wu Veronica Chen Jason Cheng Crystal Chen
Trade Fair Manager Group Manager Project Manager Assisant Project Manager
[Headquarters]
Carolina Pattuelli Evris Consolos Adis Hodzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Ekaterina Shapovalova Mariusz Kucharski
Hospitals Offer Smarter Healthcare With IoT Access Hello!
APR 2017 ● www.asmag.com
Thank you for visiting our hospital. We noticed that you have an app ointment with Dr. Smith in orth opedic surg ery today, can we help you che ck in? If you nee d directions, please feel free to use the wayfinding fun ction on our hospital app .
Control: Key to a Building’s Smartness
Access control is a critical part in a building, protecting lives and assets by controlling who gets to enter the premises.
Best Regards , Smart Hospita l
4
israel.gogol@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com
[Branches & Representatives]
INDUSTRY REPORT
Hospitals worldwide are facing various difficulties and challenges. In this regard, IoT sensors and connected devices, as well as the data they generate, can play an important role.
peggy.wu@newera.messefrankfurt.com veronica.chen@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com crystal.chen@newera.messefrankfurt.com
International Advertising Israel Gogol Manager Audrey Fang Officer
IoT
michelle.shih@newera.messefrankfurt.com
Corporate Management
The retail industry is witnessing a natural evolution to smarter solutions. In this article, we take a look at some of the latest trends and applications in this space while trying to understand how they benefit retailers.
P. 16
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com ryan.liu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com
Europe (Italy) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia Poland
produzione@ethosmedia.it evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn shapovalovey@ru-bezh.ru mariusz.kucharski@aspolska.pl
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.newera.tw.messefrankfurt.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Intelligent System, and a&s Taiwan (above published in Chinese). a&s Adria, a&s India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2017 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
P. 28
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
EDITOR’S NOTE High Processing Power Brings AI to Security From last year’s CPSE to this year’s ISC West and Secutech, we have seen a big advancement in visual analytics for surveillance cameras, thanks to higher processing power. Hikvision partnered with Modivius, an Intel company, to launch smart cameras with 99 percent accuracy in advanced visual analytics applications. The Modivius’ vision processing unit (VPU) leverages deep neural networks and stereo 3D sensing – two key features that are able to replace traditional computer vision approaches to video analytics. Then, in ISC West and Secutech, NVIDIA demonstrated how its GPUs can accelerate artificial intelligence (AI) in security and surveillance solutions, from cameras to appliances to servers, by using the power of deep learning. Cameras with the NVIDIA GPU can turn itself into an AI camera. According to the company, the video captured and analyzed by the AI camera uses deep learning, so the transmission of metadata saves on network bandwidth. Milestone and Hanwha Techwin recently formed partnerships with NVIDIA. By adopting high performance GPUs or VPUs, smart surveillance cameras can help deliver high accuracy and bring more real-time insights, which can drive security technologies to the next level.
KEEP IN TOUCH WITH...
SOCIAL MEDIA www.facebook.com/ asmagglobal
twitter.com/ asmagglobal
www.linkedin.com/ company/ asmagglobal
EDITOR-IN-CHIEF JILL LAI
jill.lai@newera.messefrankfurt.com
EDITORIAL TEAM
APR 2017 ● www.asmag.com
REPORTER WILLIAM PAO
REPORTER LISA HSU
EDITOR EMILY LIN
REPORTER RYAN LIU
REPORTER PRASANTH ABY THOMAS
People tend to associate IoT with the smart home, but its applications go far beyond. In fact, many buyers came to Secutech 2017 to look for smart home devices to be deployed in non-residential settings, including hotels and hospitals, where IoT can help boost efficiencies and the user experience.
Smart home is on the rise, and there has been a lot of debate on who will be the leader of the industry. In this issue, industry professionals discuss their thoughts on the topic, and it looks like Apple may come out the winner. What are your thoughts?
They say “no man is an island,” and this is increasingly becoming apparently so in security – no company can win by working alone as innovation is key for growth. Forming the right partnerships can hasten development and drive the market forward.
After attending Secutech, I have witnessed some of the latest technologies in security and surveillance. One type of security that is becoming more advanced as time goes on is biometric access control. For April, we have featured a number of products from different companies that are leading the biometric field.
Even though online commerce is becoming more and more popular, brick and mortar stores continue to be a favorite destination for shoppers. For this reason, smart retail solutions remain an important technological segment. In this issue, we look at this field in depth.
8
PRODUCTS OF THE MONTH Secure Access With Biometric Technology
Editor’s Note: Access control comes in a variety of options including smart cards, PIN input or even mobile devices. Biometric access control is one option that is unique to each individual and difficult to replicate. Biometric technology makes it almost impossible for others to steal the user’s identity and eliminates concerns over misplacing cards or passwords. When it comes to the type of biometric access control a user needs, there are many choices to consider. Fingerprint scanners are the most common, owing to developments that have significantly increased the accuracy of print reading. Facial recognition and iris scanners are also viable choices that use the face and eye structures as a means of unique identification. Advances in biometrics have increased the accuracy and security of these access control technologies.
Suprema
SFM6000 Series Fingerprint Embedded Modules The SFM6000 series represents a great leap forward in biometrics. It boasts a powerful 1.0 GHz CPU that empowers the worlds’ fastest authentication, and supports multiple interfaces including RS232 and USB 2.0 that allow high-speed data transfer. With an enlarged template capacity up to 25,000 templates, the SFM6000 Series is a solution for large-scaled yet fast authentication. Key Features: • 1:1 verification in 330 milliseconds (ms) • 8 configurable digital I/O ports • 1:1,000 identification in 400 ms • Suprema, ISO 19794-2, ANSI 378 template options • 256-bit AES fingerprint data encryption • Android SDK
Supplier: Suprema URL: www.supremainc.com
Innovatrics IFace Software Development Kit This face recognition SDK provides fast and accurate facial recognition and tracking functionality, facial template extraction and verification as well as image quality checks with accordance to ISO/IEC 19794-5 and International Civil Aviation Organization (ICAO) standards.
Key Features: • Delivers facial biometrics capabilities to mobile and desktop devices • Assures convenient support for self-service and assisted enrollment scenarios
• Enables quality evaluation of pre-enrolled facial images as per normative requirements • Supports face tracking and evaluation scenarios in real-time image processing • Enables high speed face recognition solutions
Supplier: Innovatrics URL: www.innovatrics.com
Fujitsu PalmSecure Palm Vein Authentication System APR 2017 ● www.asmag.com
The Fujitsu PalmSecure sensor uses near-infrared light to capture a person’s palm vein pattern, generating a unique biometric template that is matched against pre-registered user patterns. The palm vein device can only recognize the pattern if the blood is actively flowing within the individual’s veins, which means that forgery is virtually impossible. This advanced, vascular pattern recognition technology provides highly reliable authentication. The PalmSecure technology false accept rate is just 0.00001 percent with an exceptional false reject rate of 1 percent, all in a small form factor that generates extremely fast authentication, usually under one second.
10
Key Features: • Advanced biometric authentication algorithm delivers ultra-low false accept rate (FAR) and false reject rate (FRR) • Contactless palm vein authentication is hygienic and noninvasive – no residual trace technology • Encrypted repository for template storage and enterprise level event logging capability • Quick-start deployment across the enterprise raises security and adds value • Software development kit (SDK) for organizations deploying PalmSecure technology • Fast and easy registration with virtually no enrollment error
Supplier: Fujitsu Frontech North America URL: www.fujitsu.com
Safran Morpho MorphoFACE Biometric Solution MorphoFACE integrates state-of-the-art face recognition technologies, thus ensuring a high level of accuracy and a strong defense against fraud attempts. Based on 3D video tracking, this biometric solution enables a steady flow of users, keeping them “on-the-move” at all times, with no compromise on facial image capture quality and matching performance. MorphoFACE is a comprehensive solution for a range of applications where throughput, security and convenience are key requirements. This includes border control, self-boarding and passenger flow management. Highly adaptable, it comes either as a compact standalone unit or as a complete, ready-to-integrate OEM kit.
Zwipe Access Control
Zwipe Access is a versatile fingerprint-activated contactless credential working seamlessly with existing 125 kHz or 13.56 MHz infrastructure, without upgrading or replacing any readers or backend systems. Only after activation by a fingerprint scan will the card allow communication with a reader. Zwipe continues the security of biometric authentication with the speed and convenience of contactless credentials. Key Features: • Delivers consistent and accurate fingerprint reads in 1 second • Unique to the cardholder, only the card owner can activate card communication with the reader • Biometric data is stored on the card, eliminating the need to manage and secure an external database with fingerprint data • Strong and resistant to cracking or breaking • On-card authentication provides easy path to upgrade security without upgrading readers
Supplier: Zwipe URL: www.zwipe.com
Key Features: • Robust to users’ behavior and profile • Anti-spoofing capabilities • High image quality and accuracy • “On-the-move” face capture and identification • Multi-camera face capture for reliable 3D video tracking • Non-intrusive and intuitive, requiring minimal user cooperation
Supplier: Safran Identity & Security URL: www.morpho.com
Iris ID iCAM 7S Series Advanced Multi-factor Biometric Iris Reader
The iCAM 7S enables rapid iris acquisition with greater image quality for superior enrollment and recognition. The patented holographic targeting mirror is just one part of an intuitive and interactive interface that includes voice and visual feedback for increased speed. All models feature the robust Iris ID countermeasure package. The new iCAM 7S series is a leap forward with larger system capacity and even easier to use. A larger targeting mirror and auto-tilt assist allow touchless operation. The iCAM 7S models will operate in highly lighted areas (up to 17,000 lux). Iris ID’s biometric solutions provide highly accurate, non-contact identification by the iris of the eye from 14 inches away while delivering security, convenience, privacy and productivity to millions of people around the world. The iCAM 7S versatility and flexibility allows for easy integration with any Wiegand or IP network based access control, time and attendance, visitor management or point of sale applications. Key Features: • Fast fully automatic dual iris capture • Non-intrusive, non-contact user interface • Integrated high resolution face capture camera • Leverages existing infrastructure • Capacity for optional third-party surveillance camera • Remote management
Supplier: Iris ID URL: www.irisid.com
ievo ultimate Fingerprint Reader
The ievo ultimate was designed from the outset as a third-party reader, capable of seamlessly integrating into a large number of access control systems. Boasting many unique features and benefits, the ievo ultimate uses multispectral imaging combined with an advanced world-leading algorithm to keep data accurate and secure. Operational in a variety of harsh environments, the ievo ultimate reader is the flagship fingerprint reader from ievo. With a standard template range of up to 10,000 fingerprints (larger capacity options are available), the ability to combat a vast majority of problem fingerprints and customizable options, the ultimate reader is suitable for any business in any industry. Key Features: • Algorithm identification < 1 second • 1:N matching up to 10,000 fingerprint templates • Designed for external and internal use • Multispectral imaging sensor • Data transmission AES (128bit) encrypted • Activated by proximity detection
Supplier: ievo URL: www.ievoreader.com 11
NEWS FEATURE a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.
When Vending Machines and Streetlamps Turn Against You in a Botnet Attack
A recent DDoS incident whereby campus-wide connected devices including vending machines and streetlamps were used as bots to slow down the university’s network again underscored the importance of cybersecurity in the IoT age. BY William Pao
W
i th Gartner predicting 20.4 billion devices to be online by 2020, the Internet of Things isn’t going away, and in many ways IoT and the data they generate have indeed made our lives better and smarter. But with it come challenges as well, the biggest of which is probably the issue of cybersecurity. Already we’ve heard about the DDoS attack last October, when IoT devices including network cameras and NVRs were infected with the so-called Mirai malware. The devices then became an army of attackers that launched a series of DDoS attacks against Dyn, an internet performance management company. The result was a
APPLICATION CASES
6% APR 2017 ● www.asmag.com
US motorvehicle deaths up 6% in 2016. Source: National Safety Council
12
shutdown of service across various websites including Netflix and Amazon.com. In fact, there was a similar but less known DDoS incident reported by Verizon’s latest Data Breach Digest, whereby campus-wide connected devices including vending machines and streetlamps were used as bots to slow down the university’s network. According to the report, the school’s on-call IT Incident Commander was informed that the system’s name servers were producing high-volume alerts and showed an abnormal number of subdomains related to seafood. This caused the network to slow down significantly. The IT chief then sought
the help of Verizon’s Research, Investigations, Solutions and Knowledge (RISK) team, which identified over 5,000 discrete systems making hundreds of DNS lookups every 15 minutes. “O f t h e s e , n e a r l y a l l systems were found to be living on the segment of the network dedicated to our IoT infrastructure. With a massive campus to monitor, everything from light bulbs to vending machines had been connected to the network for ease of management and improved efficiencies,” the person said in the report. The report went on to say that some of the IP addresses were identified as part of an emergent IoT botnet, which
spread from device to device by brute-forcing default and weak passwords. Once the password was known, the malware had full control of the device and would check with command infrastructure for updates and change the device’s password — locking the IT department out of the 5,000 systems, it said. Deeply troubled by this, the IT commander thought about what to do, even considering “replacing every soda machine and lamp post,” Luckily there was a less drastic method by which the situation was resolved. “The plan was to intercept the clear-text password for a compromised IoT device and then use that information to perform a password change
TRANSPORTATION
VIVOTEK AIDS TRAFFIC MANAGEMENT IN ARGENTINA Traffic light enforcement in Argentina has always relied on devices based on physical inductive loops installed under the pavement and a physical connection to the traffic light controller. This created constant downtimes due to road maintenance or lost connection with the traffic light itself. Vialseg, a provider of Traffic Speed Enforcement systems, and its partners developed a red-light enforcement system utilizing high resolution imagery taken from VIVOTEK’s H.265 3-megapixel box type network cameras in combination with Neural Labs’ license plate recognition software. The resulting system analyzes traffic light status and vehicle position at the intersection to detect whenever a vehicle violates a red light. Traffic officials will automatically receive all imagery to use as evidence.The systems are already applied in several cities in the Buenos Aires province. Plans to deploy the systems in other cities are underway, with over 100 systems to be installed during 2017.
Alarm.com Announces ObjectVideo Acquisition Alarm.com’s acquisition will allow it to enhance its ability in video analytics and expand its portfolio for home and business solutions. BY Alarm.com
A
"The system’s name servers were producing high-volume alerts and showed an abnormal number of subdomains related to seafood, causing the network to slow down significantly." before the next malware update,” the IT chief said in the report. “With the packet capture device operational, it was only a matter of hours before we had a complete listing of new passwords assigned to devices. With these passwords, one of our developers was able to write a script, which allowed us to log in, update the password, and remove the infection across all devices at once.”
larm.com announced the acquisition of substantially all of ObjectVideo’s business, including the company’s products, technology portfolio and personnel. ObjectVideo is a pioneer in the fields of video analytics and computer vision, with technology that extracts meaning and intelligence from video streams in real time to enable object tracking, pattern recognition and activity identification. The business, now called ObjectVideo Labs, will accelerate Alarm.com’s research and development of video services and video analytics applications, and will continue to provide advanced research and engineering services for federal government customers. “ObjectVideo Labs brings deep expertise in the field of video analytics, and we’re excited to welcome them to the Alarm.com team,” said Jeff Bedell, Alarm.com’s Chief Strategy and Innovation Officer. “As video applications grow rapidly in both the residential and commercial spaces, this acquisition will reinforce our ability to continue to lead in the development of proactive, next generation connected home and business solutions. Unlike standalone devices and point products, the Alarm.com platform can extract meaning from a broad ecosystem of connected devices to deliver enhanced security and a highly-valued user experience.” “I am excited for the opportunities ahead for the ObjectVideo Labs research and engineering team,” said Raul Fernandez, President of ObjectVideo. “Incorporating their pioneering work into the sophistication and scale of the Alarm.com platform will yield exciting opportunities for innovative new features and applications, and can drive Alarm. com into a leadership position in the emerging fields of video analytics and computer vision.”
RESIDENTIAL
ENGENIUS WIRELESS SOLUTION FOR US RESIDENCE A US apartment complex in New York required a solution that can provide wireless surveillance coverage for its expansive site which encompasses 59 buildings across seven city blocks. The project’s security company Homeland Sur veillance Installations chose to use EnGenius’ EnStation AC, a 5 GHz long-distance 11ac wireless outdoor AP/ client bridge. Sixteen EnStationAC point-to-multipoint access points were deployed atop a central
tower, in WDS Bridge mode, connected to four EnGenius 24-port switches. Each one wirelessly bridges out to two or
three other devices located on the roof of each of the 59 complex buildings. The EnStationACs connect to 16-port network video recorders (NVRs), each of which links up to 16 surveillance cameras. In total, the EnGenius system powers and connects 975 surveillance cameras in and around all 59 buildings. Security personnel can now monitor activity throughout the complex from one central location.
13
NTERNET THINGS
OF
Hospitals offer Smarter HealtHcare witH Iot APR 2017 â&#x2014;? www.asmag.com
Hospitals worldwide are facing various difficulties and challenges. A shortage in staff and nurses, coupled with more intense competition in the healthcare industry, has left hospital operators struggling to find ways to optimize resource allocation while delivering quality care. In this regard, IoT sensors and connected devices, as well as the data that they generate, can play an important role. BY William Pao
16
Hello! Thank you fo r visiting our hospital. We noticed that you have an app ointment wit h Dr. Smith in orth opedic surg ery today, can w e help you ch eck in? If you ne ed direction s, please feel fr ee to use the wayfinding fu nction on ou r hospital app . Best Regard s, Smart Hospit al
Brian Kalis, Managing Director, Digital Health and Innovation, Accenture
Kwo-Whei Lee, Superintendent, Changhua Christian Medical Foundation Yuanlin Christian Hospital
ne of the most pressing issues facing hospitals is a shortage of staff, particularly nurses. Citing the US Bureau of Labor Statistics, the Atlantic reported that 1.2 million vacancies will emerge for registered nurses between 2014 and 2022. With a persisting labor crunch, hospital operators increasingly rely on smart technologies, including IoT, for help. “Hospitals are becoming fuller with more and more patients needing extended stays and long-term monitoring of their condition. This is stretching the healthcare workforce as they need to care for a larger number of patients. As a result, smart hospitals will become more common in the future due to the numerous advantages that they provide,” said Stephanie Lawrence, Research Analyst at ABI Research. “IoT technologies and networked sensors can be implemented to tackle some of the most common problems weighing down on hospitals and health systems. By introducing more connectivity, remote monitoring and information gathering, the Internet of Health Things can encourage better use of healthcare resources, more informed decisions, a reduction in inefficiencies or waste and the empowerment of health consumers,” said Brian Kalis, Managing Director of Digital Health and Innovation at Accenture.
ImprovIng WorkfloW One way IoT can benefit operators is to improve the workflow of staff and nurses, who can use their time more effectively. For example, nurses have to reposition certain patients every two hours to prevent pressure ulcers. IoT can make this less taxing and time-consuming. “Our system continuously monitors for
Jason Mortensen, Global Healthcare Solutions Portfolio Manager, Cisco
Patrick Ng, VP, Business Development and Clinical Operations, MedicusTek
unrelieved pressure between the patient and the bed,” said Patrick Ng, VP of Business Development and Clinical Operations at MedicusTek. “If a patient moves and successfully repositions themselves, the two-hour timer can be reset and nurses can concentrate on taking care of the patient in other ways. However, when a nurse does need to reposition a patient, they can look on a screen that visually maps the pressure accumulated between the patient’s body and the sensors. Nurses can reference this map to see if repositioning a patient has properly relieved the pressure.” Meanwhile, tags attached to medical equipment or devices can be properly tracked, saving staff’s time looking for these devices. “Healthcare institutions will use trusted IDs and other technologies to help quickly locate critical medical equipment, beds, crash carts and other medical devices by providing the missing link between physical assets and a trusted ID ecosystem,” said Steve Katanas, Director Of Sales South APAC at HID Global. “We have a hospital where they attach tags to the equipment and nurses. What that allows them to do is previously they spent 15 to 20 minutes trying to find critical equipment, now they can see where the device is and get it in just a few minutes, saving valuable time on each shift. This saves them from walking around the floor trying to find where people put the equipment last,” said Jason Mortensen, Global Healthcare Solutions Portfolio Manager at Cisco. A valuable asset in the age of IoT is data, which can offer hospital operators more insights into their facility. “Our system tracks when and how often each alert is triggered, and how long it took for nursing staff to respond to the alerts. This increases accountability in the nursing workflow, and can inform management on staffing quality and levels. Our data analysis generates regular reports that can be referenced in making decisions about hospital operations and staffing,” Ng said. “Hospitals are able to get visibility into nurse rounding to see how long nurses are spending time with patients, based off of the nurse and based off of the type of patient. They were able to align the resources better once they had that visibility through IoT, while improving patients’ overall satisfaction,” said Mortensen.
patIent Care In the midst of intense competitions in the healthcare industry
17
Vertical Solution
THE RETAIL INDUSTRY IS WITNESSING A NATURAL EVOLUTION TO SMARTER SOLUTIONS. IN THIS ARTICLE, WE TAKE A LOOK AT SOME OF THE LATEST TRENDS AND APPLICATIONS IN THIS SPACE WHILE TRYING TO UNDERSTAND HOW THEY BENEFIT RETAILERS.
Smart Solutions
Make Headway in
APR 2017 ● www.asmag.com
Retail BY Prasanth Aby Thomas
20
Adam Agress, Global Director, Sales, People Counting, FLIR Systems
Iacopo Carreras, CEO, Uhopper
etail, today, is all about the experience. Gone are the days when a customer walked into a store only for the sake of buying a product. Today’s customers are looking for the experience of buying a product as much as the product itself. To this end, the latest technology has helped retailers provide an enhanced experience to customers. Making this possible is the all-pervasive Internet of Things (IoT). According to MarketsandMarkets, the global IoT in the retail market is expected to grow from US$14,280 million in 2015 to $35,640 million by 2020, at a CAGR of 20 percent. “IoT in retail is majorly used to manage inventory, track theft and loss, mobile payments, shopper intelligence, and advertising and marketing inventory,” the research firm said. “The demand for this market is driven by internet ubiquity worldwide and the declining cost of IoT components such as sensors and RFID. Cloud platform is another factor which is considered as an important driver to the IoT market.” The entry of IoT into retail has given rise to the concept of smart retail. In a very basic definition, smart retail refers to the use of new technology and solutions to enhance the customer experience. Employing various types of sensors and the data they collect, smart retail solutions aim to enhance the experience of the customer.
Ray Hartjen, Director, Marketing, Retailnext
Thomas Hillebrand, GM, Europe, ShopperTrak/Tyco Retail Solutions
How does smart retail benefit retailers? The rise of connected IoT devices and access to unprecedented levels of data are taking retail from the ordinary to the extraordinary. Technological advancements are refreshing the traditional brick and mortar store experience, reimagining the digital storefront and transforming the supply chain.
Ralf Kodritsch, Director, Segment Manager, RFID Solutions, NXP Semiconductors
21
Access Control: Key to a Building’s
Smartness APR 2017 ● www.asmag.com
nergy efficiency is a hallmark of a smart building. While HVAC and lighting are controlled by the building management system, further savings on energy can be achieved through integration with the access control system. “With open IP solutions, the access control units can use existing network infrastructures. With an open application programming interface (API) and configurable I/O ports, these systems use standard internet and connection protocols and can be easily integrated with other IP-based devices — from surveillance cameras to intrusion detection sensors to heating, ventilation and air conditioning (HVAC) systems,” said Pia Hantoft, Global Product Manager for Physical Access Control at Axis Communications. Several protocols now exist to enable the access control to “talk” smoothly with other systems. “Access control can interoperate or integrate with the building management systems via OPC or BACNet protocols and set up rules dictating room temperature setting according to the number of people in the room or area,” said John Davies, Managing Director at TDSi. Primarily, access control data on known occupancy can help reduce a building’s energy usage in three areas — heating and cooling, fresh air ventilation, and lighting. “Heating can be turned off if a door is left open for too long, for example, so as not to waste any energy or money. Window shades can be shut to avoid overheating of rooms and save power for air conditioning. Lights can be dimmed or turned off if there is no one in the room for specified amounts of time,” Hantoft said. “With heating and cooling systems, the best savings is gained in seldom-used areas — if no one shows up, keep the HVAC system in
28
Access control is a critical part in a building, protecting lives and assets by controlling who gets to enter the premises. But more and more, users have found more value in access control, which can combine with the building management system and other connected devices to help reduce energy consumption and deliver a greater user experience. The data access control generates, meanwhile, can offer insights into the building and help operators make the necessary planning and adjustment. by William Pao
standby mode, versus operating it on a strict schedule. The amount of fresh air ventilation required for a building is governed by building codes, and is usually expressed in the amount of fresh air per minute per person. If the number of known people in the area is below the design number, then fresh air dampers can be throttled back, which saves the expense of conditioning that outside air,” said Rick Focke, Senior Product Manager at Tyco Security Products. The savings that this helps create can be significant. “Using an access control system to pass through user information, such as a user’s card badge at a reader to a BMS system allows that system to accurately bill users for heating and lighting costs on a pay-per-use basis,” said Daniel McVeagh, Senior Product Manager at Gallagher. “A recent integration of this nature saw one Gallagher customer achieve a 30 percent energy saving, with a full return on their investment within 24 months.”
integrated systems,” said Philip Verner, Sales Director for EMEA at CEM Systems, citing his company’s room booking app as an example. “It eliminates the requirement for a separate room booking solution from the access control system. Here users can easily create and edit meeting room bookings through their Microsoft Outlook exchange calendar or directly on the terminal at the door.” John Davies, Managing Director, TDSi
Rick Focke, Senior Product Manager, Tyco Security Products
operAtionAl efficiency Moreover, access control can work with other systems in the building to automate tasks that have previously been manual processes. Integrated with parking, the access control will allow author ized employees to enter their work areas once they parked their vehicles. Integrated with the elevator, they can reach the desired floor more quickly. Integrated with visitor management, the access control can track a visitor’s whereabouts. “Whether it’s accessing your office building’s parking gate, turnstiles leading to the elevator banks, the office front door or even your computer, the faster a person can gain access to their work, the more operationally efficient their organization becomes,” said Larry Reed, CEO of ZKAccess. “Going beyond the physical security realm, the access control system needs to pay for itself and add real measurable value to businesses. This can be achieved by either reducing operational costs or by enhancing operational efficiencies through the use of ‘intelligent smart applications’ at the door or the centralized command and control of
Robert Gaulden, Director, Aftermarket and Electronic Sales, Allegion
Boosted User experience A good side benefit of integrating access control with other building systems is an enhanced experience by the user, who can enjoy a more automated and frictionless work environment. “(Benefits for users include) not waiting too long for your lift, being directed to the next one, ensuring the room temperature is at the optimum, being directed to a free hot desking module/spot and assigning rights, and routing calls to either landline or mobile phone depending on where the person is — in or out of the office,” said Davies. “A good access control system can trigger actions in other building systems tailored to the individual entering the building,” said McVeagh. “In our Command Centre we use a feature called ‘personalized actions’ for this, which can trigger things such as turning on specific lights, unlocking a PC, and turning on air conditioning next to a desk, creating a great start to a user’s day.” When the access control is integrated with visitor management it creates a better experience for the visitor who otherwise has to stand in line at the lobby desk, waiting to get registered and receive their badge. “The employee can pre-register their visitors, and they can receive a welcome e-mail with a QR code. When they arrive in the building they just need to show their QR code to the front desk or go to the self-check in kiosk, so they can get their badge immediately without having to line up in the lobby,” said Gaoping Xiao, Director of Sales for APAC at AMAG Technology.
Access control-Video integrAtion Needless to say, security is a critical part of a building, and both access control and video play a key role. For a long time they’ve been run on separate systems, but thanks to their deeper integration these days, one can now trigger the other, enabling security personnel to monitor the building more intelligently. “In the past, access control logs are recorded in one database while video is
Pia Hantoft, Global Product Manager, Physical Access Control, Axis Communications
29
The Right Combination Makes Multi-Site Monitoring Easier
Video surveillance monitoring and managing of multiple sites can be a challenging task. With the right combination of key features and utilization of new technologies, security operators can make monitoring multi-site environments not only easier, but more effective and efficient as well. BY Eifeh Strom, Freelancer
APR 2017 ● www.asmag.com
he size and scale of multi-site environments can vary drastically. From a few cameras spread across a few city blocks to thousands of cameras spread across a city, state, country or even oceans, managing and monitoring video surveillance data across multiple sites can be daunting. Nowadays, new technologies and increased connectivity are not only helping multi-site security managers increase security, it is also helping them
32
increase effectiveness and efficiency. By incorporating certain key features into a video surveillance system, such as remote monitoring and analytics, and by adopting a flexible and scalable solution, monitoring and managing multi-site environments have become simpler than ever.
Challenges of Building the Right system A good multi-site system allows users to record video locally or centrally and
share it across the organization, explained Laurent Villeneuve, Product Marketing Manager at Genetec. “It should be built to scale, allowing you to connect to hundreds or thousands of cameras within the same system without having to connect to individual or independent systems.” Using a truly unified security platform would allow operators to control cameras, monitor alarms, track access control and vehicle activity from the same user interface. “It lets you access
Jammy DeSousa, Senior Product Manager, American Dynamics, Tyco Security Products
Bjørn Eilertsen, CTO, Milestone Systems
your video surveillance system from any location, at any time and get a common operational picture of the situation. It simplifies collaboration and sharing with public safety agencies, without sacrificing privacy,” Villeneuve said. Building the right video surveillance system for a multi-site environment, however, can be challenging. Users must consider the fact that not all sites within a multi-site system are identical — there may be variables between them, such as bandwidth availability. It is also important to address that networked systems are constantly expanding; this could be by adding new network nodes or increasing capacity or redundancy. Expansion, though, comes with challenges. “Organizations’ expansion often outpaces the security investment,” Villeneuve said. As a result, “They are often stuck with systems that cannot support multi-site operations.” Jammy DeSousa, Senior Product Manager for American Dynamics at Tyco Security Products, addressed this by pointing out that users “should be sure that the maximum configuration has been tested by the manufacturer — number of sites, number of overall cameras, maximum bandwidth requirements, etc.”
Key featuRes foR BetteR management Challenges, however, can be overcome with the right set of system features. Although every installation is different, a good video surveillance system must be able to adapt to these differences. Adaptability means flexibility, which is key
James Somerville-Smith, Channel Marketing Lead, EMEA, Honeywell Security & Fire
in multi-site environments. “We think a good video surveillance system for multi-site monitoring should have a flexible, centralized management software platform that could remotely manage every device on all sites,” said Claudi Zhu, Product Marketing Manager at Hikvision Digital Technology. “It should also provide multiple methods for further equipment connection, namely system scalability, and provide smart event
Laurent Villeneuve, Product Marketing Manager, Genetec
detection and smart event search to improve surveillance operation efficiency.” Casper Wu, Product Manager at Surveon Technology, named several key features including centralized management, centralized monitoring, interactive video walls, matrix screen displays, centralized alarm management, centralized account management and high scalability for thousands of cameras and multiple clients, which he believes
Smart, Safe and Secure Storage There are several options on how and where to store video surveillance data. Choosing the right storage method will depend on the needs of each application. Multi-site environments could have several thousands of cameras on-site, and with that comes a huge amount of video data. When it comes to storage methods, many are moving to the cloud; nonetheless, the proper storage solution is critical to ensuring data security. “Video surveillance environments support much more strenuous workloads than a standard hard disk drive (HDD),” explained C.N. Chu, Sales Engineer at Seagate Technology. To address this, Seagate has been committed to providing smart, safe and secure storage solutions that are best optimized for surveillance applications. “Surveillance is more than just the sum of its parts — cameras, recorders, and storage — it is about business continuity,” Chu continued. “Customers are asking for the right approach for the best-fit storage solution that answers their needs of today and tomorrow. The business continuity aspect ultimately resides with a secure, highly available storage system that has the ability to scale with their needs without sacrificing convenience and ease-of-use. Delivering best in-class storage system is the cornerstone of many business critical applications that will help meet customers’ surveillance needs.” Laurent Villeneuve, Product Marketing Manager at Genetec, pointed out that multi-site security environments require fast, accessible storage with plenty of short-term accessibility and long-term “deep storage” for investigations. “Security professionals can choose an all on-premises storage systems, administered by a full-time IT technician, or a hybrid-cloud model with immediate and short-term storage on-premises, with older video content archived in the cloud, securely for five years or more.” He further explained how some companies are moving to an all-cloud services and storage model, for maximum flexibility, mobility and freedom from on-premises storage served from very far and remote locations. In the end, choosing the right storage method will vary by application, need and budget. 33
Enhancing Surveillance Storage for the Future The rise of large trends such as urbanization and smart city initiatives has spurred the need for business intelligence and video analytics. These, together with technology trends like the increased adoption of HD and 4K, Big Data, artificial intelligence and deep learning, industrial automation, etc. are the factors driving the expansion of surveillance systems. BY the a&s Editorial Team
APR 2017 ● www.asmag.com
C.N. Chu, Sales Engineer, Seagate Technology
38
Surveillance Storage on a Growth Path
Storage is an essential part in every surveillance project, yet it does not have the halo of cameras or VMS systems. According to IHS Markit market research, 98 million network cameras will ship out in 2017, all of which would require the right storage solution. ncreasing retention requirements can drive the price of storage up as high as 30 percent of the total project cost. Due to the nature of security systems, reliability is of utmost importance. A hard drive failure can render the whole system useless if there is no place to store video footage or retrieve it. Systems integrators must therefore reach a practical balance between cost and reliability. a&s had a chance to sit down with C.N. Chu, Sales Engineer at Seagate Technology, to discuss the future of storage for surveillance systems. “When I discuss how the future of surveillance landscape will look, I like to use the Jason Bourne movies as an example, if you want to understand contemporary surveillance, watch Jason Bourne,” said Chu. Even though in many aspects, the technology described in these movies is still science fiction, the presence of security systems and their impact on our every-day security and storage requirements is already here. “People now joke that it’s not easy to be a thief today. License plate recognition software (LPR) can track cars and their routes; facial recognition and analytics open up the possibility of tracking illegal activities, increasing the efficiency of police work. Analytics is becoming more sophisticated, computers need to run faster and the number of cameras are increasing exponentially. As a result, there is a need for more data storage capacity,” he added.
Surveillance verSuS Pc Hard driveS All the major vendors are rolling out dedicated surveillance drives which support surveillance DVRs (SDVRs), network video
recorders (NVRs) and centralized or cloud surveillance for video data analytics. Chu pointed to several main reasons which justify having all these different products specifically for surveillance. “The hard drives used in surveillance differ from the hard drives used in regular PCs. PCs need to balance workloads, both reading and writing of data. However, in a surveillance system, the hard drive’s work load is 90 percent write and 10 percent read since the surveillance systems need to record all the time, while playback is sporadic. PC hard drives are not meant to run 24/7, they are not meant to be used in a multiple-drive environment where temperatures and vibration are concerns, and they are not tuned for multiple video streams at the same time,” said Chu. “On the other hand, dedicated surveillance drives support three times the workload of standard desktop drives, are built to be NVR-ready (i.e., they can work with multiple hard drives), have lower power consumption to avoid overheating in a multipledrive environment, and are ruggedized to perform reliably also in non-climate controlled environments,” explained Chu. “In our surveillance line we also added special firmware optimized to support up to 64 HD cameras without losing frames.” An additional differentiator between a dedicated surveillance drive and a regular hard drive is the presence of a rotational vibration sensors. Hard drives which are designed to run continuously (24 hours a day, 365 days a year) generate extra heat and vibration compared to “regular” hard drives. When there are several drives packed together (like in an NVR), their vibration can disrupt the proper operation of the drive and lower perfor-
mance. If there is any other source of vibration, like cooling fans, the performance deteriorates even further. Vibration can shake the drive head off its intended path causing data corruption or making the drive temporarily unavailable. The disrupted drive must then wait for its head to move back into position before resuming normal operation. “One of the things we implemented to solve this problem is providing more rotational vibration sensors in all high capacity hard drives as we see surveillance systems take on more hard drives and vibration becomes a serious issue. For systems that have more than 16 hard drives, we recommend the use of enterprise-grade hard drives for better reliability,” said Chu. The rotational vibration sensors allow the drive to compensate and balance the drive when it senses vibration anomalies and can adjust the drive head as needed.
Future Storage trend Looking into the future, Chu sees growth potential in solutions for surveillance systems. “We see a growing interest in specific vertical surveillance projects that uses 2.5-inch drives. HDDs are a more viable option than SSD as HDD is more cost-effective and has a larger capacity, which are important when vast amounts of surveillance footage need to be stored for compliance and regulatory or data analytics purposes. We are continuing the development of larger capacity, more robust performance and NVR-ready features to offer customers the best way to manage their data and maximize the value of what they have.”
Preventing Hard Drive Failures
Hard drive failures will render even the most sophisticated surveillance system useless. Without a working HDD, it is impossible to store and then retrieve the video footage. .N. Chu, Sales Engineer in Seagate Technology spoke with a&s about the factors leading to hard drive failures and how these issues can be avoided. Chu pointed to two major issues that cause hard drive failures: focusing on price and choosing the wrong hard drives for the project. Chu noted that as much as systems integrators don’t want failures, their customers might still be cost-sensitive. Some of them might end up choosing PC hard drives for surveillance systems, which can cause failure under the more demanding conditions of constant video surveil-
39
Looking Ahead to the Trends in Security
The security industry is evolving with several new technologies and concepts entering the scene. Here we present the views of an industry expert on the rapid changes being seen in the market. BY a&s Italy
APR 2017 ● www.asmag.com
he constant changes that are being witnessed across the industry demand the watchful eye of security professionals. At the recently concluded ASIS Conference in Milan, a&s Italy caught up with Thomas Langer, President of ASIS International, to learn his thoughts on what to expect from the market in the coming days and how the industry would adapt to changing trends as it goes forward.
42
1.What are the technology trends that the industry should pay extra attention to? It’s crucial that the security discipline is part of product design work at the front end. It’s going to end up costing a lot of money in rework and customer confidence if it fails on you because it has been embedded with all those technologies we know have already been corrupted. None of that is going to benefit anyone. I really think it is about security having a seat at the design and
employees are. What is the furthest remote point they are at, that’s where it ends. And we have to make sure that we’re designing platforms that allow them to securely do the work that they are doing and not artificially design security in and cause them to have to find ways to work around those. So you end up in a situation where somebody is at home and they can’t add a printer to their device so they mail it to an open email address on an unsecured computer in their home, and print it out because they need to do something with it physically. So we want to make sure that as security professionals we don’t design things that make us feel better, but actually don’t support the business.
3.What should the security professionals learn from the recent cybersecurity attacks and is there any other emerging threat ahead? The cyber piece is always going to be present wherever our information, our assets reside. Primarily right now it’s in our networks. Many of the cloud offerings have to be looked at with an eye towards “how does that satisfy what I have committed to my clients want and what I’m going to do with this information.” So to put it on a semi-secured cloud that may be cost-saving to you, is actually putting in jeopardy the information that you are committed to protect or your own design information that could be compromised by the wrong cloud provider. Given the advancements in technology and data portability and availability (anywhere/anytime/device agnostic), we can only speculate where that data will be next. The other thing I’m concerned about is making sure we have an educational program as we bring new employees in, that they understand what it is that we need to secure. I think there is a real misconception that the younger people coming into the industry don’t know that. They do. I can’t say that I’ve encountered anyone coming into the workforce that wanted to work on company proprietary information on an unsecured device, nobody wanted to do that. Again back to what I said before, let’s make sure that what we create for security safeguards don’t force people to make bad decisions. innovation table so that we actually build it into the front end.
2.is there any prominent tendency in terms of assets/people/ information protection? I think they are equally important and I hate to sound preachy when I say that. We have an obligation obviously for the physical perimeter and the physical safeguard of our employees but because we have borderless companies now, our propriety information, our crown jewels, extend out to wherever our
4.What is the next market driver for security companies? iot and big data? I want to see how our companies are going to use Big Data and how we are going to try to leverage that to better our own position in the corporation. I really see that being part of our role at the table — sitting with the leadership and making a decision on what we are going to use, where we are going to go and being able to secure that platform. So we, as professionals, need to do a better job anticipating those vulnerabilities. Here is an
43
SMAhome
Manufacturers Remain Confident in Apple’s Ability to Lead the Smart Home Industry When talking about the futuristic smart home industry, one is unlikely to leave out Apple, the big name that really made the first smart device — the smartphone, which is both user-friendly and appealing to the general public.
APR 2017 ● www.asmag.com
Nowadays as iOS and Android devices alike have become more universal, many have begun to ponder the potential of broader smart technology applications. The name of the game being referred to as Big Data, the Internet of Things (IoT) or smart home. Despite Apple’s market leader position in the smartphone sector,
46
it has yet to cement a similar role in the IoT or smart home industry. Apple, Google and Amazon have all introduced smart home platforms which hardware manufacturers comply to when creating their own products. Due to Apple’s stringent requirements, there have been relatively few products compatible
to its HomeKit platform. Google and Amazon, which opt for establishing a more open development environment for manufacturers, appear to have gotten the upper hand in the smart home market. Just a few weeks ago, Amazon announced a new milestone —10,000 skills working with its Alexa
Apple provides a consistent user experience for end users with the integration of Apple Home and Siri voice control with iPhones and iPads. Controlling accessories with Apple HomeKit is both easy and fun, and it just works, which we believe is exactly what Apple users want.” • Mikko Savolainen, Senior Marketing Manager, Silicon Labs
I still believe HomeKit is better at this stage. Although development is more difficult, it provides a unified user experience and the installation is unified. It also offers better security.” • Jerry Chen, CEO, Dexatek Technology
platform were created by third-party developers, a testament to the wide range of devices and appliances that are compatible with Alexa. The market has seen much fewer products compatible with Apple HomeKit. However, despite its slow development, manufacturers working with Apple still
plan to launch new HomeKit products in 2017, according to a study conducted by SMAhome. CviLux Group, a Taiwan-based original design manufacturer/original equipment manufacturer that makes HomeKit parts, components and finished products, said that it plans to launch a new power outlet in March and a new light bulb in April under the Opro brand name. CviLux’s Opro iU9 Smart Power Outlet is already listed in Apple’s official webpage of HomeKit accessories. The device lets users control, monitor and schedule lights and appliances remotely and by voice control. Home electronics and appliances can be scheduled to turn on or off automatically based on users’ preferred routines. U.S.-based semiconductor company Silicon Labs, which focuses on developing IoT solutions, also said it expects at least two HomeKit software releases during 2017. Silicon Labs’ primary HomeKit products are Blue Gecko Bluetooth SoCs, wireless modules and Bluetooth software. These products help developers create
home accessories such as smart locks, thermostats and weather stations. S h e n z h e n O p s o Te c h n o l o g y, a China-based startup with Apple’s MFi certification, said in a recent interview that it will launch sensor or security products like cameras, doorbells and alarms in 2017. The company’s OPSO Smart Outlet HK-OU1, an Apple-certified HomeKit accessory, supports home management like switch scheduling, power use monitoring and Siri voice control. The outlet has multiple use case setting to meet the demand from different users.
Apple’s strict technicAl requirements China-based lighting solution and IoT manufacturer Leedarson also intends to launch lighting products compatible with the HomeKit later this year. Leedarson also develops smart products based on platforms other than Apple’s HomeKit. Products that are compatible with Amazon’s Alexa are still more popular among distributors, Leedarson’s
47
The Middle East spent around US$2 billion on physical security in 2013. The market in the region is expected to reach $10.9 billion in 2020. Middle East set to represent almost 10% overall global security market by 2020. 23.7 percent CAGR growth predicted between 2015 and 2020. APR 2017 ● www.asmag.com
Source: Frost & Sullivan
50
he Middle East is one of the most important markets for global security companies, so much so, that when the oil price crashed in the recent years, most of them felt the weakness. According to Frost and Sullivan, during 2013, the region was estimated to have spent around US$2 billion on security systems and equipment. The research firm predicted that the overall physical security market would have reached US$3 billion in 2014 and could scale to an impressive $10.9 billion by 2020. That’s a 23.7 percent CAGR between 2015 and 2020, more than double the global growth rate, which could mean the Middle East will represent almost 10 percent of the overall global physical security market by 2020. The whole of the Middle East is expected to see infrastructure protection reach $13.1 billion
The Middle East Shifting Gears for Growth The oil and gas industry continues to remain under pressure from low prices. In the Middle East market, this means businesses have to find new avenues to generate income. BY Prasanth Aby Thomas
by 2018. The region’s transportation safety and security market is likely to grow from $3.8 billion in 2014 to $6.6 billion in 2019 at a CAGR of 11.9 percent, according to Frost and Sullivan. Obviously then, growth in the region has gone beyond the traditional oil and gas industry to other more lucrative fields. These markets outside oil and gas are probably going to be the strength of the region in the days to come.
Beyond the oil and Gas industry Industry professionals gave varying opinions when it comes to discussing markets in the Middle East that are outside the oil and gas segment. Harri Rantanen, Director of Sales in the Middle East at Teleste, pointed out that his company has seen a global increase in demand for solutions which are designed to ensure the safety of citizens. “The related increase in public spending in the optimization of surveillance of public spaces such as city centers and other areas of high crowd density are another key growth area,” Rantanen said. “At Teleste, we have continued to concentrate on strengthening our offering for securing public spaces, critical infrastructure, airports and public transport. Teleste’s offering is built on our long-term experience in delivering high-level security solutions to these very demanding sectors.”
Wael Abdallah, GM, Network Information Technology
Marwan Khoury, Regional Marketing Manager for Axis Communications, gave a similar opinion, suggesting that several industries in critical infrastructure and retail are seeing strong growth and are of interest to the company. “The scope of the projects and the constant demand for solutions in segments such as retail is driving security and surveillance projects,” Khoury pointed out. “Moreover, there is a growing demand for connected and network devices as customers are embracing the future of technology
where cameras will play a central role. End customers are thinking of the future, long term, scalability and analytics, while depending on their solutions to get apt results.” Manufacturers’ opinions apart, there are several systems integrators in the region who are actually seeing strong growth outside the oil and gas vertical. Craig Mackenzie, Country President of Securitas UAE, emphasized on Dubai’s presence as an attractive destination for travelers. “I am seeing what I perceive as growth in the luxury retail and hospitality markets; despite the global economic downturn the U.A.E. and Dubai, in particular, continues to attract visitors who want to spend money on high-end luxury goods and experiences,” said Mackenzie. “This serves equally well those very wealthy individuals, and those seeking a taste of the high life for a once in a lifetime experience. This
Costa Boukouvalas, CEO, AgilityGrid
Jabir Hameed, CEO, Lantern Software and Security Systems
51
CEM Systems S700e Multi-Technology Intelligent IP Reader
Paxton Net2 Entry Touch Panel Features:
• 7 -inch color touch screen • Advanced sound processing provides clear sound quality for busy areas • Convenience with code and PIN entry options available • Multi-panel options – rain hood, flush and surface mount • Dual frequency proximity reader, now offering EM and HID Prox as well as Paxton and MIFARE • Energy efficient – auto screen dimming in idle mode ■Paxton/U.K. ■Email: support@paxton.co.uk
Features:
Vicon Industries Surveyor MKII HD PTZ Camera Dome
Features:
• • • • •
D 1080p resolution at 30 images per second H Integrated camera module with 30X optical zoom WDR day/night camera; low light capability Electronic image stabilization (EIS) Triple encoding generates simultaneous H.264 (2) and M-JPEG video streams • High-speed 360° continuous pan ■Vicon Industries/U.S. ■Email: sales@vicon-security.com
• D esigned for use as part of the CEM Systems AC2000 access control software range • Contactless card presentation with the option to enable Personnel Identification Number (PIN) for two-stage authentication • Integral reading support for 13.56 MHz smartcard and 125 kHz proximity technology • Secure transfer of DESFire and AES encryption keysets • 10/100 Mbps Ethernet host connection • Two changeover relay outputs to activate door strike or other equipment ■ CEM Systems (Part of Tyco Security Products)/U.K. ■Email: cem.info@tycoint.com
Matrix SATATYA SAMAS Centralized Video Management Software Features: • • • • • •
S upports up to 1,00,000 cameras and 10,000 video recorders No public IP required for centralized connectivity Edge recording for central notification of events, even when data is stored locally Camera-wise recording retention can help define storage retention days based on importance Intelligent video analytics like people counting, face detection, missing object, etc. Real-time centralized health status notification for any system issues like camera disconnect, hard-disk failure, camera tamper, etc.
Hikvision Digital Technology Blazer Pro VMS Server Features:
• C apable of handling up to 128 or 256 channels • Performs optional functionality such as ANPR, business intelligence and people counting • Flexible user management – prioritizes access for management and personnel to ensure that staff members can be allocated an appropriate system access authority • Connects previously separated NVR/DVR sites together with centralized management • Alarm management interface displays real-time performance and alarm notification ■Hikvision Digital Technology/China ■Email: overseasbusiness@hikvision.com
■Matrix Cosmec ■Email: More@MatrixComSec.com
Fermax VEO-XS Monitor Features:
• 4 .3-inch wide-screen color video door entry system • Avoids the need for a handset and allows for simple, intuitive hands-free communication • OSD menu and the button layout allow for access to any of the functions using just a finger • Auto-start of outdoor panel camera • DUOX technology ■Fermax/Spain ■Email: export@fermax.com
Louroe Electronics AOP530 Speaker Microphone
APR 2017 ● www.asmag.com
Features:
• F or IP camera • Built-in microphone and a 2-inch speaker for bi-directional audio • Full-duplex communication with DSP technology • Dry contact blue illuminated pushbutton • Vandal-resistant, stainless steel faceplate that fits into a 3 gang electrical box ■Louroe Electronics/U.S. ■Email: Sales@louroe.com
60
S2 Security S2 Magic Monitor Version 4
ZKTeco SBTL3000 Series Turnstile
• U nified security management user experience for access control, video surveillance, forensics, digital signage and live internet feeds • Third-party video management system support, audio support and advanced internet widgets • Available for Milestone and exacqVision, in addition to S2 NetVR series products • Includes audio support for cameras, video clips and online digital content • Real-time media from Twitter and Everbridge and enhanced weather radar maps bring tailored situational awareness into a variety of environments
• S US304 stainless steel casework ensure long-lasting durability • Barriers swing automatically during emergencies • SBTL3000 series ships already integrated with customers’ preference for either card or fingerprint access control reader, reducing installation time and expense • LCD display screen shows current running status, easy operation • Ergonomic design makes card and fingerprint authentication fast and simple ■ZKTeco/U.S. ■Email: sales@zkaccess.com
Features:
■S2 Security/U.S. ■Email: sales@s2sys.com
Features:
Dahua Technology 2-Wire Apartment Video Intercom System Features:
• V TNS1006A-2 switch and the VTH5222CH indoor unit use a two-wire interface; switch is connected to the indoor unit using any two wires for signal transmission and power • Retains Dahua’s regular IP apartment system functions and satisfies large apartments requirements • Calls can be answered anywhere in the household • Indoor monitors can monitor IPC in real time; connects with wired alarm and detection devices to implement 24 hours protection • Smart PSS management ■Dahua Technology/China ■Email: overseas@dahuatech.com
Honeywell Pro-Watch 4.3 Security Management Suite Features:
• C ombines access control, video surveillance, intrusion detection and other business critical functions into one intelligent business management system • Ideal for a wide range of companies including banking, finance and office buildings • Capable of accommodating more than a million card holders and more than 10,000 doors • Features a new application program interface (API) that allows integration with other operational services • Optimized for mobile control, allowing site security staff to manage time-sensitive access rights from any location ■Honeywell Security & Fire/U.S. ■Email: comments.security@honeywell.com
Vision-Box Seamless Gateway
Grundig GCI-R1667F 12 MP Fisheye Vandalproof Dome IP Camera with IR LED
• I dentification is conducted in a few seconds, with the biometric capture quality or matching accuracy of the single token • Obtains facial image on the fly without eliminating the travel document from the equation • Adapts itself to each passenger’s unique behavior and features • Combines data from different systems to deliver the highest level of security • Operates according to international regulations and best practices, under a rigorous Privacy-by-Design architecture ■Vision-Box/Portugal ■Email: sales@vision-box.com
• 1 2-MP CMOS, color/B&W camera • 60° field of view • Rugged anti-vandal body made of die-cast aluminum with polycarbonate lower dome for outdoor applications • Built-in de-warping function • 0 Lux: integrated LED IR Illuminator to see even in total darkness • SDHC memory card slot for alarm and scheduled image recording
Features:
Features:
■Grundig/Germany ■Email: info@grundig-security.com
Suprema BioSign 2.0 Mobile Fingerprint Authentication Solution Features:
• 2 -stage fast matching algorithm with patented “Entropy Point Pairing” method • Optimal architecture for mobile-embedded applications • Reconstruction of discriminative fingerprint patterns from various noises • Pattern analysis technique to ensure consistent performance over low-quality fingerprints (wet/dry skin, partial wound, crease) • Intelligent self-learning algorithm to reflect users’ fingerprint condition and habit • Sensor-specific pre-processing algorithm: capacitive/optical/under glass (up to 300 um) ■Suprema/Korea ■Email: biosign@supremainc.com
61
Show Calendar
Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.
WORLD SECURITY EXHIBITION DIRECTORY MAY
IFSEC PHILIPPINES
• Date: 2017/05/03–05/05 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-7966-222-505 • Email: agnius.kazlauskas@ubm.com • URL: www.ifsec-global.com/philippines/
EXPOSEC
• Date: 2017/05/23–05/25 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: info@fieramilano.com.br • URL: www.exposec.tmp.br
SECUREX
• Date: 2017/05/30–06/01 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: leighm@specialised.com • URL: www.securex.co.za
JUNE
GUANGZHOU ELECTRICAL BUILDING TECHNOLOGY
• Date: 2017/06/09—06/12 • Venue: China Import and Export Fair Compex, Guangzhou, China • Tel: +852-2238-9917
AUGUST
• Email: building@china.messefrankfurt. com SECUTECH VIETNAM • URL: www.building.messefrankfurt.com.cn • Date: 2017/08/16—08/18 • Venue: Saigon Exhibition & Convention Center (SECC), Ho Chi Minh City, IFSEC INTERNATIONAL • Date: 2017/06/20—06/22 Vietnam • Venue: ExCel London, London, U.K. • Tel: +886-2-8729-1016 • Tel: +44-20-7921-8231 • Email: stvn@newera.messefrankfurt.com • Email: ifseccustomerservice@ubm. • URL: www.secutechvietnam.com com • URL: www.ifsec.co.uk
SEPTEMBER JULY
(ISC)2 SECURITY CONGRESS APAC
• Date: 2017/07/03—07/04 • Venue: Sheraton Hotel, Hong Kong, China • Tel: +852-2850-6957 • Email: securitycongressapac@isc2.org • URL: apaccongress.isc2.org
IFA
• Date: 2017/09/01—09/06 • Venue: Berlin ExpoCenter City Exhibition Ground, Berlin, Germany • Tel: +49-30-3069-6924 • Email: ifa@messe-berlin.de • URL: www.ifa-berlin.de/en/
SHANGHAI INTELLIGENT BUILDING TECHNOLOGY
IFSEC SOUTHEAST ASIA
• Date: 2017/09/06—09/08 • Venue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia • Tel: +6-03-2176-8788 • Email: tj.tan@ubm.com • URL: www.ifsec.events/sea
ISAF ISTANBUL
• Date: 2017/09/14—09/17 • Venue: Istanbul Expo Center (iFM), Istanbul, Turkey • Tel: +90-212-503-32-32 • Email: marmara@marmarafuar.com.tr • URL: http://www.isaffuari.com/en/
SMART SUMMIT LONDON
• Date: 2017/09/19—09/20 • Venue: Business Design Centre, London, U.K. • Tel: +44-330-3353900 • Email: hello@nexusmediacom.com • URL: http://www.iotsmartsummitlondon. com/
• Date: 2017/09/05—09/07 • Venue: Shanghai New International Expo Centre (SNIEC), Shanghai, China ASIS • Date: 2017/07/26—07/28 • Tel: +852-2238-9917 • Date: 2017/09/25—09/28 • Venue: International Convention Centre • Email: building@china.messefrankfurt. • Venue: Kay Bailey Hutchison Sydney, Darling Harbour, Australia com Convention Center, Dallas, U.S.A. • Tel: +61-3-9261-4660 • URL: www.building.messefrankfurt.com.cn • Tel: +1-703-519-6200 • Email: aphillips@divcom.net.au • Email: asis@asisonline.org • URL: www.securityexpo.com.au • URL: https://securityexpo.asisonline. org/
SECURITY EXHIBITION & CONFERENCE
CompanieS in ThiS iSSue
APR 2017 ● www.asmag.com
PRODUCTS OF THE MONTH
VERTICAL SOLUTION
• Fujitsu • ievo • Innovatrics • Iris ID • Safran Identity & Security • Suprema • Zwipe
• FLIR Systems • IEI Integration • Intel • NXP Semiconductors • Retailnext • ShopperTrak • Uhopper
INDUSTRY REPORT
INTEGRATED SYSTEM
• Allegion • AMAG Technology • Axis Communications • CEM Systems • Gallagher • HID Global • PACOM Systems • TDSi • Tyco Security Products • Vanderbilt Industries • ZKAccess
• Genetec • Hikvision Digital Technology • Honeywell Security & Fire • Milestone Systems • Seagate Technology • Surveon Technology • Tyco Security Products
58
IoT • ABI Research • Accenture
• Changhua Christian Medical Foundation Yuanlin Christian Hospital • Cisco • MedicusTek
SPECIAL FEATURE • AgilityGrid • Axis Communications • Lantern Software and Security Systems
nexT iSSue
• Network Information Technology • Securitas UAE • Specialized & Interactive Systems • Teleste
VIEWPOINT • ASIS International • Rasilient Systems • Seagate Technology
Vertical Solution | Banking Smart Technology | Wireless Communications Integrated Systems | Edge Analytics on Cameras IoT | Smart Factory/Manufacturing
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
7
FUJIAN FRAN OPTICS CO., LTD.
DOME COVER
CHINA
sales@fjsmt.com
BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
3
MEERE COMPANY INC.
CAMERA
KOREA
sales@cube-eye.co.kr
FRONT COVER BARN DOOR, 36
MILESTONE SYSTEMS
SURVEILLANCE
DENMARK
sk@milestonesys.com
9
RICOM
LENS
CHINA
sales@forecam.com
63
SHENZHEN COMMANDER TECHNOLOGY CO., LTD.
CASING
CHINA
sjw@yjdcase.com
INSIDE BACK COVER
TAMRON CO., LTD.
CAMERA
JAPAN
newbiz@tamron.co.jp
2
TECHPOINT INC.
CHIPSET
USA
dma@techpointinc.com
5
VIDEOTEC S.P.A.
IP CAMERA / SOFTWARE / VIDEOSERVER
ITALY
info@videotec.com
ACCESS CONTROL PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
55
GIGA-TMS INC.
RFID MODULE / LOCK / READER
TAIWAN
promag@gigatms.com.tw
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
63