APRIL 2013 Rs. 150
Volume 8 No. 4
INDUSTRIAL www.ind-safety.com
RNI NO. MAHENG/2007/20212
REVIEW
A MONTHLY MAGAZINE ON FIRE, SAFETY & ELECTRONIC SECURITY
An Exclusive Interface with: Mr. Hariom Sharma - Director, Sales & Marketing Solus Security Systems Pvt. Ltd. Pg. No. 47-50
10 Years:
Accessing Control on Future CIO’s Priority : Security Automation - Special Coverage (Pg. No. 94)
IN FOCUS
A tribute to bravery of firemen who risked their lives for saving many lifes - National Fire Services Day 2013
WE SALUTE THE MEN OF FIRE
14 APRIL 1944 REMEMBERED AS NATIONAL FIRE SERVICES DAY* IS DEDICATED TO THE SACRIFICES OF FIREMEN IN THE SHIP S.S. FORT STIKINE DURING WORLD WAR II WITH A MOTTO OF “TRANAY SEVA MAHE - WE SERVE TO SAVE” FIREMEN LOSE THEIR LIVES TO SAVE OURS! WE HONOUR THEIR SACRIFICE & IT IS THE LEAST WE CAN DO THIS DAY & EVERYDAY!
WE HONOUR & SALUTE THESE ‘MEN OF FIRE’
* Turn to pg. 84 for more info
NEWAGE PRODUCTS FIRE-FIGHTING HOSES & ACCESSORIES
FIRE HYDRANT & ANCILLARY PRODUCTS
SPRINKLERS & ANCILLARY PRODUCTS
PERSONAL PROTECTIVE EQUIPMENTS
WATER & FOAM MONITORS & NOZZLES
FOAM EQUIPMENTS & ACCESSORIES
SYSTEMS FIRE SUPPRESSION SYSTEMS WATER, FOAM, DCP & GAS
FIRE ALARM & DETECTION SYSTEMS
Fire Protection, Safety & Rescue Equipments | Fire Detection & Suppression Systems
www.newagefireprotection.com | info@newagefireprotection.com | +91 -22 24077421 newagegroupindia
APRIL 2013 Rs. 150
Volume 8 No. 4
INDUSTRIAL www.ind-safety.com
REVIEW
A MONTHLY MAGAZINE ON FIRE, SAFETY & ELECTRONIC SECURITY
The New Power in Detection and Notification. Bigger. Smarter. Faster. One of the most powerful network systems in the industry has been enhanced.
RNI NO. MAHENG/2007/20212
ecure
Contents
Monthly Magazine On Fire Safety & Electronic Security
Managing Editors Shilpa Kadam Shirish Dongre
COVER STORY
47
CEO Shekhar Dongre
10 Years : Accessing Control on Future Mr. Hariom Sharma - Director, Sales & Marketing Solus Security Systems Pvt. Ltd.
Lynx Communication Systems : Delivering the right product at right price Mr. Hemant Trivedi - Director, Lynx Communication Systems Pvt. Ltd. Business News G4S to secure your cash
CP PLUS introduces ‘Temper-Proof’ Cristal series DVRs
Kantech introduces EntraPass Software v6.00
36
14
44
Technology Update Identification using Finger Vein Pattern 76
Mr. Kiron Kunte
84
88
Section 111 ACCESS CONTROL 119 GAS & SMOKE DETECTION
AVP Solutions : Changing the dynamics
National Fire Services Day
Event Profile 70
National Fire Service Day by FSAI : A true recognition to the bravery of firemens
74
The CAO & FM Roundtable 16th Feb - 2013, Channai, Hyatt Hotel
PROJECT UPDATE ..........127 www.ind-safety.com
FOR ADVERTISING ENQUIRY CONTACT : E-mail: shekhar@engrreview.com
Advisory Board (Editorial) Mr. D.C. Nath - IPS (Retd.) Ex.President & CEO - IISSM Farooq Abdullah Managing Partner - Marvel Gloves Industries K.P. DOMINIC Vice President - Life & Safety Division, Aditya Infotech Ltd. Dr. Saifuddin Bharmal C.M.D. - Lookman Electroplast Industries Ltd. Mr. Vivek Bhasin C.E.O-Base Systems Pvt.Ltd. Mr. R. R. Nair Chief Executive of Safety and Health Information Bureau (SHIB) Mr. T. P. Singh Director-S&M, FLIR Systems India Pvt Limited Marketing Team : Ladoji Pendurkar, Bhavin Shah, Bharat Shah Vinod Surve, Kavita Chaudhari,
FACE TO FACE
46
Editor Rajeev lyer
Design & Layout Rahul Ramgude, Arun Shinde, Pradeep Pillalamarri, Dinesh Gawade
INDUSTRIAL SAFETY REVIEW : Head Office : Divya Publications, 303/304,3rd Floor, Harmony Tower, Netaji Subhash Road, Court Naka, Thane (W) Thane-400 602 Maharashtra Tel: +91 22-25380574/75 Telefax: +91-22-25418254 E-mail: shekhar@engrreview.com, mktg@ind-safety.com Website: www.ind-safety.com Branch Offices (Zonal): NORTH (Delhi & NCR regions) : Sandesh Jain : 09810837877 SOUTH (Chennai, Bangalore & Coimbatore) Y. V. Raghu : 09566141224 Hyderabad - R Tiwari : 09985381878 Kochi - Sanjeev Nair : 09846249568 EAST (Kolkata & Other regions) S. Roy - 09433097806 WEST (Maharashtra & Gujarat) Pune - S.Kadam - 09833373371 Gujarat - Dinesh Shah 09327344559 Rajkot (Saurashtra) Swapnil Bhatia: 09227909005
INDUSTRIAL SAFETY REVIEW Overseas Offices USA : Nancy TARTAGLIONE, Mepax USA n.tartaglione@mepax.com / usa@mepax.com
GERMANY: Sebastian OLLIER Mepax Deutschland, Tel: +49 711 222 54 456, deutschland@mepax.com
FRANCE: MEPAX SA, Romain CLASS Tel.: +33 1 39 02 77 78, FRANCE ITALY: Valeria VILLANI Tel.: +39 339 8610117, Via Firenze, Milano, Italia
SPAIN: Sofiane JEDIDI Mepax España Tel : +34 963 255 886, spain@mepax.com UK: Liz Jones Tel: +44 (0)1227 276016 , l.jones@mepax.com
RUSSIA: Garri ZALTS Mepax Russia Tel: +7 495 576-7666 / gizalec@yandex.ru
CHINA/South Korea/Taiwan: Mepax - Konaxis Shanghai Julien PENARD Tel : (+86) 21 6252 2731/ china@mepax.com
All rights reserved. No part of this magazine may be reproduced in any form without the permission of the Editor. INDUSTRIAL SAFETY REVIEW is owned, printed & published by Shilpa Kadam, published from 3rd Floor, Harmony Tower, Netaji Subhash Road, Court Naka, Thane (W) Thane-400 602 Tel: +91 22-25380574/75 Telefax: +91-22-25418254, Editor : Rajeev lyer. Important : Whilst care is taken prior to acceptance of advertising copy, it is not possible to verify its contents. INDUSTRIAL SAFETY REVIEW can not be held responsible for such contents, nor if any losses or damages incurred as a result of transactions with companies, association or individuals advertising in the publications. Articles, interviews published in INDUSTRIAL SAFETY REVIEW are the personal vie-ws and expressions of its authors. INDUSTRIAL SAFETY REVIEW does not necessarily agree to it. INDUSTRIAL SAFETY REVIEW can not be held res-ponsible for such articles / interviews. We therefore recommend that readers make necessary enquiries before sending any money or entering into any agreements with advertisers or otherwise act-ing on an advertisement in any matter whatsoever.
INDUSTRIAL SAFETY REVIEW
2
APRIL 2013
BUSINESS NEWS
AirLive introduced outdoor IP camera BU-720 with IR Lighting under any harsh environment Taipei, Taiwan: AirLive, one of the most advanced worldwide brands for networking and communication equipments, introduced a new outdoor IP cam BU-720 with HD resolution and IR LEDs.
4 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
A
irLive BU-720 is a last novelty in the �ield of IP cameras for outdoor use, combining high technical level, IP66 weatherproo�ing, IR LED illumination and a favorable cost, which allows it to be used in smaller systems and wherever the price was previously an obstacle to the use of devices of similar level. Robust aluminum enclosure of AirLive BU-720 camera complies with IP66 for outdoor spaces and gives her not only pleasing modern design, but also protection against harsh weather conditions, snow, rain, moisture www.ind-safety.com
EMERGENCY EGRESS LIGHTING SOLUTIONS
BUSINESS NEWS
and dust, and also effectively protects against vandalism and mechanical damage. One of the new enhancements of this design is also ability to hide necessary wiring within mounting arm. Camera housing also includes infrared LED night-time illumination with up to 25 meters effective distance. Camera AirLive BU-720 is equipped with a low-lux CMOS sensor with a maximum resolution of 1280x800 pixels at 30 frames per second, so the resulting image is sharp and detailed even in dif�icult conditions, and contains four times the amount of image data compared to ordinary CCTV cameras with VGA resolution. Automatically adjustable IR �ilter allows precise settings for different lighting conditions. Other features of AirLive BU720 include support for advanced H.264 compression, which signi�icantly reduces the use of bandwidth in the network and the needed space for data storage. Wide Dynamic Range technology ensures automatic balance of light and dark places in the picture, so even with strong backlighting remains the reference object still well recognizable and detailed, Clear Motion Technology in turn prevents blurring of fast moving objects, which works great for example to monitor passing vehicles. The camera is also equipped with a slot for micro SD memory
6 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
card, which serves as a local storage and prevents data loss. Moreover, BU-720 naturally supports active PoE (802.3af) to minimize mounting effort and cost. The camera AirLive BU-720 is supplied with standard utility software CamPro Express 64, which allows live monitoring and video recording up to 64 AirLive cameras involved in the system simultaneously. For especially demanding users is available CamPro Professional surveillance software developed by AirLive, possessing also many sophisticated methods of image analysis, thus allowing greater automation of monitoring and saving human resources. Thanks to its durability in outdoor environments, modern and functional equipment and favorable price is AirLive BU-720 actually very universally applicable in any modern system.
About AirLive
With nearly twenty-year networking expertise, AirLive stands for the high performance and top value to Government, Banking Telco/ISP/ WISP, Education, Hotel, system integrators (SI), distributors in the world. “Simple yet powerful networking”, AirLive provides high quality / performance and reliable total solutions to AirLive partners and continuously devotes itself to provide the innovative products and solution to connect people’s lives across the globe as “AirLive is in your Life”. For more information, contact: AIRLIVE www.airlive.com
www.ind-safety.com
# %" $( " " %#$ $ " # #$ $
998-6191_IN
$" % $" , $ $ !% $( For years you’ve relied on the sophisticated dome positioning systems brought to you by Pelco™ by Schneider Electric™. Now more sophisticated than ever, Pelco introduces the new Spectra™ HD 1080. Incorporating the award-winning Sarix™ imaging technology platform, Spectra HD 1080 is an all-digital system that delivers 2-megapixel resolution (1920x1080 at 30 IPS), high-profile H.264 compression, built-in analytics, and much more. Featuring HD-optimized dome bubble technology, a revolutionary solid pendant design to eliminate vibration noise, 20x optical zoom, and precise 360-degree PTZ control, Spectra HD 1080 has set the new industry standard for high-definition image quality and video security performance. Visit www.pelco.com/spectra for more information.
# $ ( %" & # %" $( " #% ##
$ ' , ' $ % ) $ # $ (#$ * $" + $ ' " # $ (
$ " $ $ " # $ #
BUSINESS NEWS
Unisafe Fire Protection Specialists LLC, Dubai - poised to scale new heights in fire protection & safety engineering
U
NISAFE Fire Protection Specialists LLC, Dubai, subsidiary of ZICOM India and one of the leading Fire Protection Company in United Arab Emirates (UAE) has recently hosted and successfully concluded three day annual Global Summit Zi-VISION 2013 at Meydan, Dubai, UAE. The Summit was attended by Dignitaries which included His Excellency Lieutenant General Saif Abdulla Ali Saif Al Shafar, Undersecretary Ministry of Interior, UAE and Chairman of UNISAFE, Mr. Manohar Bidaye – Vice Chairman of UNISAFE & Chairman of ZICOM Group, Mr. Pramoud Rao – Managing Director of ZICOM Group, Mr. Gurjit Singh Grewal – MD Metel Group & Director of UNISAFE, Mr. V. Raman Kumar – Chairman & MD of Aeries Group, Mr. K R Easwaran – Managing Director of UNISAFE, Mr. Thulasi Ram – CEO of UNISAFE, Mrs. Mohini Suvarna – General Manager – Finance and more than 35 Senior Management Professionals of ZICOM Group from India, UK, Brazil,
8 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Qatar and UAE. The Summit was also attended by prominent representatives of Banks such as IDBI Bank Ltd., Union Bank of India, Punjab National Bank, Bank of Baroda, Standard Chartered Bank, etc. The agenda of the Summit was to acknowledge UNISAFE’s contribution in the area of �ire protection industry by providing �ire and safety solutions in the Region through innovative technology. The aim of the Summit was to further strengthen the vital role of UNISAFE in providing quality preventive maintenance services as per new regulations to save lives and avoid accidents. The Summit has also deliberated on the idea of setting-up Global Engineering Design Center in India and to take up manufacturing facility for �ire protection components in this Region. Speaking at the Summit, the Chief Guest His Excellency Lieutenant General Saif Abdulla Ali Saif Al Shafar, Undersecretary
Ministry of Interior, UAE said “UNISAFE is the most preferred company in �ire protection industry today. UNISAFE is playing a very important role in the �ield of �ire protection and safety engineering as a quality service provider while contributing innovatively in the growth of our country. UNISAFE has successfully handled the most critical projects of this Region with the help of Civil Defence Department of UAE and will soon emerge as No. 1 player of the Region. I wish UNISAFE Team best of luck for their future endeavor.” Speaking on the occasion Mr. Manohar Bidaye, Chairman ZICOM Group said, “Our Vision is to make UNISAFE the most preferred and leading �ire �ighting Company in the Industry in UAE. With innovative design and engineering, installation and servicing capabilities with strong Management bandwidth UNISAFE is aiming to create its footprints in GCC Countries in next 2 years. We will strive hard to ensure our clients and end users enjoy blissful safety and secured environment at their operating place.” UNISAFE CEO, Mr. Thulasi Ram, also expressed his views, “At UNISAFE, our sole endeavor is to focus on our design and safety engineering capabilities. With our combined experience of 200 years, state of the art resources and with highly trained manpower we ensure that the �ire�ighting systems which we design and install are absolutely unbreachable.” www.ind-safety.com
BUSINESS NEWS
HID Global names Bridget Burke as Vice President and Chief Information Officer
H
s New Chief Information Of�icer role leads HID Global’s business applications, data networking and customer information programs. s Burke also serves as Chief Security Of�icer responsible for the company’s security policy compliance. s Role is part of company’s Genuine HID commitment to enhance the customer experience by driving innovation that aligns its IT and business strategies with customer requirements.
ID Global®, a worldwide leader in secure identity solutions, today announced Bridget Burke has joined the company as Vice President and Chief Information Of�icer (CIO). With a goal of enhancing overall information capabilities, Ms. Burke is responsible for HID Global’s business applications, data networking and infrastructure and customer information programs. Burke will also serve as Chief Security Of�icer (CSO) responsible for overseeing the company’s security policy compliance. With over 25 years of experience de�ining and implementing customer-focused technology and security initiatives on a large scale, Ms. Burke brings a unique combination of IT and security expertise coupled with her perspective as an HID Global end user customer. “Creating the new role of CIO is part of our Genuine HID commitment to enhance the customer experience by driving innovation that aligns our IT and business strategies, streamlines our information systems and extends HID Global’s scalability to address current and future customer requirements,” said
12 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Denis Hébert, president and CEO of HID Global. “With Bridget’s proven success in leading global IT strategy and programs, her information technology and security leadership will be a great asset for HID Global at this stage of our development and lead us to the next level of growth.” “Joining HID Global as CIO at this exciting time at the company is an exceptional opportunity,” said Ms. Burke. “HID Global has built a solid global reputation as a technology and industry leader in the secure identity industry and is known as a trusted source for innovative products, services and solutions. I am looking forward to being part of this dynamic team as HID Global addresses tremendous opportunities.” Prior to joining HID Global, Ms. Burke held roles as CTO for United Technologies, Director of Program Management (CIO of�ice/ Police Department) at Harvard University, a number of senior IT roles at Columbia University and is the co-founder of Gryphon Software Corporation. She presently serves as the Vice Chairman of the Information Technology Security Council of ASIS International.
About HID Global
HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, use, and management of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identi�ication RFID technologies used in animal ID and industry and logistics applications. Primary brands are ActivIdentity®, EasyLobby®, FARGO® and HID®. Headquartered in Irvine, California, HID Global has over 2,000 employees worldwide and operates international of�ices that support more than 100 countries. HID Global® is an ASSA ABLOY Group brand. For more information, contact: HID Global www.hidglobal.com
www.ind-safety.com
INDUSTRIAL SAFETY REVIEW
13
APRIL 2013
BUSINESS NEWS
CP PLUS introduces ‘Temper-Proof’ Cristal series DVRs Blending Aesthetics & Cutting-Edge technology in compact Way
C
P PLUS GmbH & Co. KG has announced the availability of latest, elegant and advanced Cristal Series Digital Video Recorders (CP-UAR0400Q1-B, CP-UAR-0800Q1-B & CPUAR-1600Q1-B), that come in 4, 8 and 16 channels respectively. The ultra-light CP PLUS Cristal Series DVRs that weigh only 0.5kg, has been designed for sophisticated applications like homes, villas etc. With its attractive external appearance, slim, lightweight design and painstaking attention to detail, CP PLUS Teknologix Labs equips this new line up with ‘Temper Proof’ technology, that preventing DVR’s control panel from any unauthorized access even the device is located in any remote place. Despite its portability, the new CP PLUS CP-UAR-0400Q1-B, CP-
14 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
UAR-0800Q1-B & CP-UAR-1600Q1-B supports full channel at D1 real time recording, allowing all channels to perform simultaneous real time playback whilst at the grid interface it can perform a smart search. Featuring 1080P real time preview in this new line-up, the new CP PLUS DVR range capitalizes on high level H.264 compression to ensure superb picture quality, whilst minimizing bandwidth and video storage requirements. The new CP-UAR-0400Q1-B, CP-UAR-0800Q1-B and CP-UAR1600Q1-B support 1SATA HDDs. In India, Aditya Infotech Ltd. is an exclusive distributor partner of CP PLUS GMBH & Co. KG, Germany for their brand CP PLUS. AIL has been aggressively distributing and marketing entire range of CP
PLUS surveillance Cameras, Digital Video Recorders (DVRs), VDP, Time & Attendance, Intelligent Home Automations and allied accessories in India. Aditya Infotech Ltd (AIL) is a leader in introducing video security and surveillance brands in India and has an expertise in designing solutions on the basis of the needs.
CP PLUS DVRs:-
Cristal
Series
s Up to 4 cameras with 1080p Realtime Preview (CP-UAR0400Q1-B) s Up to 8 cameras with 1080p Realtime Preview (CP-UAR0800Q1-B) s Up to 16 cameras with 1080p Realtime Preview (CP-UAR1600Q1-B) s H.264 dual-stream video compression s All channel D1 Realtime Recording s VGA / TV simultaneous video output s Support 1 SATA HDD up to 4TB, 2 USB2.0 s Built in Web Server s Mobile Software; CMOB , CMS Software; KVMS www.ind-safety.com
BUSINESS NEWS
Hikvision helps India’s hospitals score a knockout
M
r. Deepanshu Girish Gupta, managing director and owner of Coral Infocom Private Ltd., Hikvision security products are not only good business sense, they are common sense: “We had such success in a previous similar project – our Clara Swain Hospital solution – that it would have been foolish to do anything differently.” Like the aforementioned Clara Swain solution, this project shares strong similarities: both are hospitals and both are located in Bareilly, Uttar Pradesh – a northern state in the country of India; Mr. Gupta’s company serves as system integrator for both. Yet, there are differences: this new project, Bareilly’s Medical College and Hospital, represents a larger facility and a larger challenge. Speci�ically, in this case, a solution encompassing over one kilometer of campus space was required. As such, Mr. Gupta devised a solution utilizing a plethora of Hikvision components:
16 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
s DS-2CC572P-M 540 TVL 1/3” CCD Day & Night Camera s DS-2CC1192P(N)-IR3 650 TVL CCD IR Weather-proof Bullet Camera s DS-2CC5132P-BL 500 TVL DIS Dome Camera s DS-2CC197P(N)-A 540 TVL 1/3” CCD WDR ICR Day & Night Box Camera s DS-7316HFI-S Embedded Net DVR s DS-7216 HVI-ST Standalone DVR
And, intriguingly, the beauty of this solution is the fact that it is speci�ically designed to grow. “We’ve just completed Phase One of this project. Everything has gone so well, that this client has already ordered a large number of these additional Hikvision camera units for the next phase,” Mr. Gupta explained. An excellent example of this growth is the DS-7216 HVI-ST Standalone DVR. “This DVR was perfect for the initial requirements of the project. This hospital had www.ind-safety.com
BUSINESS NEWS
a number of pre-existing CCTV cameras that they did not want to simply discard. As such, features such as up-to CIF/QCIF real-time resolution and up-to 4CIF resolution recording were perfect. Additionally, up-to 16-ch synchronous playback, dual stream support, and up-to 1024×768 VGA output resolution make this a quality product,” noted Mr. Gupta. Yet, with the introduction of these new, high-quality Hikvision cameras, an additional Hikvision DVR model was called for. Thus, the DS-7316 HFI-S Embedded Net DVR was called upon. In this case, an easy-to-operate and user-friendly menu allowed security employees to easily access features such as upto 1024×768 VGA output resolution, the support of live view, backup / playback of high de�inition images; and digital zoom in live view / playback through the use of a mouse in PTZ control mode were all quickly utilized. Additionally, features such as redundant recording and hard disk group management are also available. But, as Mr. Gupta expressed, the big key was improved resolution, “Our new requirement put a premium on sharper resolution, and this was achieved through the DVR’s 4CIF resolution real-time recording, as well as HDMI and VGA output at up-to 1920×1080P resolution.” In turn, this new emphasis on greater resolution allowed Hikvision’s DS-2CC572P-M 540 TVL 1/3” CCD Day & Night Camera to really shine. Located throughout the interior on the hospital, the DS-2CC572P-M utilizes its compact structure design and is placed on both ceilings and walls. With features like a 1/3 inch SONY CCD, day / night auto switch, a low-illumination ability of 0.1Lux @ F1.2, and an auto white balance,
18 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
auto gain control, electronic shutter control and backlight compensation; this dome camera prevents the common nuisances of pick pocketing and the theft of costly medicine at the pharmacy, as well as improving the vital administrative function of tracking the movement of patients throughout the various wards. “From both a crime-preventive and logistical standpoints, this Hikvision dome has already improved security and ef�iciency,” summed up Mr. Gupta. Guarding the main entrance gates, and providing 30 meters of coverage, is Hikvision’s DS2CC1192P(N)-IR3 650 TVL CCD IR Weather-proof Bullet Camera. Speci�ically, this bullet IR camera is placed on outdoor security guard stations at a height of 3.5 meters. Mr. Gupta noted, “This camera’s IR functionality serves dual purposes. Obviously, it gives us great coverage in the evening. But, equally important, it also allows us coverage if there is a power outage … an unfortunate common occurrence in India … thus allowing our camera operators the ability to see who is coming-in and coming-out regardless of time or the functionality of this hospital’s external lights.” Additional bonuses, such as an IP66 weather rating come in very handy in the forgiving daytime heat and signi�icantly cooler evenings. From a technical standpoint, a SONY Exview HAD CCD II, 0.001 Lux @ F1.2 (0 Lux with IR) minimum illumination, auto white balance, auto gain control, electronic shutter control and backlight compensation, as well as internal synchronization all promise top-of-line imaging results. Conversely, providing coverage in the hospital’s smaller – but administratively vital
– three reception rooms is the DS2CC5132P-BL 500 TVL DIS Dome Camera. These areas rely on this dome camera’s support of a 4 - 9mm varifocal lens and 3-axis (pan/tilt/ rotation) adjustment positioning to allow for optimum camera rotation and placement to “get the perfect angle,” as Mr. Gupta allowed. Finally, the DS-2CC197P(N)-A 540 TVL 1/3” CCD WDR ICR Day & Night Box Camera is tasked with manning the main Out-Patient Department (OPD). Because of this particular area’s lighting conditions, a special camera was needed: “This room is largely surrounded by glass. As such, it suffers from extreme lighting challenges, and many cameras simply were not able to adjust to the bright days and dark nights,” explained Mr. Gupta. Fortunately, this Hikvision box camera employs a powerful 160× Wide Dynamic Range – perfectly suited for strong backlight environment of this OPD. Mr. Gupta: “WDR was absolutely vital for this location, and Hikvision technology really came through for us.” Complementing this WDR is auto white balance, auto gain control, electronic shutter control, and backlight compensation; but more importantly is Hikvision’s promise to both integrator and enduser: a solution that guarantees not only the success of your immediate project, but the success of future endeavors, as well.
For more information, contact: Balasubramanian jayam, bala.jayam@pramahikvision.com www.hikvision.com
www.ind-safety.com
Glotec Manufacturers of IP Megapixel IR Day-Night CCTV Cameras in India Glotec
Glotec Glotec
Glotec
960H Sony CCD/1.3 Megapixel/2 Megapixel With 5 years service support for spare parts and software and life-long technical support.
Leading the future of digital CCTV industry
Glotec
Glotech Exim Pvt. Ltd. Plot No. 3, 14/3 , Delhi- Mathura Road, Faridabad 121003 Haryana India Office Phone : 0129-4051210,4053100, +91-9811512100 E-mail : glotec@glotecinc.com, Website : www.glotecinc.com Bombay Office : Office No. 78, Om Heera Panna Mall New Link Road, Behind Oshiwara Police Station Andheri West, Mumbai 400 053 Mobile No +919987999684
BOLDLY
ROLL INTRODUCING ALL TERRAIN MOBILITY. NEW 9460/9470 RS (REMOTE SYSTEM) RALS MOBILITY MODELS WITH REMOTE ACTIVATION
Whether in uncharted territory or on a gravel road, rough terrain can be a challenge. Pelican’s new RALS mobility models help you overcome this challenge with A 3.8cm heavy duty polyurethane wheels, B stable base, and C telescoping handle.
E
F
RALS TECHNOLOGY FEATURES:
C
Remote Activation FOB Ability to activate or deactivate FROM A DISTANCE UP TO FEET SET OF TWO INCLUDED
G D D
A B
Intelligent Control s &ULL COLOR ,#$ DISPLAY s )NTUITIVE EASY TO USE CONTROLS s 4AILORED RUN TIME CONTROL s 2UN 4IME FROM HRS HIGH TO HRS LOW 4OTAL LIGHT OUTPUT UP TO LUMENS PER HEAD s "ATTERY LEVEL DISPLAY s #HARGING LEVEL INDICATOR
F
360° rotating/180° pivoting heads Quick release extension lock
G
12V power outlet
E
www.pelican.com/isr
0ELICAN 0RODUCTS AND 3ERVICES )NDIA 0VT ,TD ,EVEL h v !UGUSTA 0OINT 3ECTOR 'OLF #OURSE 2OAD 'URGAON (ARYANA )NDIA 4EL s &AX All trademarks are registered and/or unregisterED TRADEMARKS OF 0ELICAN 0RODUCTS )NC ITS SUBSIDIARIES AND OR AFlLIATES
BUSINESS NEWS
Mircom Group of Companies named one Canada’s Best Managed Companies of 2012 The Mircom Group of Companies is honoured to be named one of Canada’s Best Managed Companies of 2012. Recipients of this prestigious award represent the “best of the best” in Canadian organizations, making their presence known nationally and internationally.
Privately owned and distinctly Canadian, Mircom is making its mark in the life safety industry
T
22 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
he Mircom Group of Companies is honoured to be named one of Canada’s Best Managed Companies of 2012. Recipients of this prestigious award represent the “best of the best” in Canadian organizations, making their presence known nationally and internationally. The National Post announced winners in the Best Managed section published on February 26, 2013. “It is a great honour to be named one of Canada’s Best Managed Companies,” said Mark Falbo, president, Mircom Group of Companies, “We are a private Canadian company proud of our technology, services and solutions and our excellent staff - all of which re�lect our mission for saving lives and protecting property throughout Canada and around the world.” The Best Managed designation is one of Canada’s greatest markers of corporate success. It symbolizes the organizations continued efforts to focus on their overall vision, creating value to employees and customers and excelling in the global economy. Many of the nominated
companies have outperformed their competitors, created hundreds of jobs, achieved sustainable growth and excelled both at locally and internationally. The Mircom Group of Companies continues proudly operate day-to-day business this way. “Being acknowledged as a one of Canada’s Best Managed Companies is a great milestone in the Mircom story,” said Domenic Ali, vice president of �inance, Mircom Group of Companies, “We are a Canadian designer, manufacturer and distributor of some of the most innovative life safety products in the market, serving a global market; it is great to be held in the same regard with the other winners.”
About The Mircom Group of Companies
The Mircom Group of Companies has been serving the global marketplace in the life safety industry for over 20 years. Since its inception the organization has continued to be a leader and innovator in the life safety industry. The Mircom Group of Companies™ is North America’s largest independent designer, manufacturer and distributor of advanced Fire Detection & Alarm, Voice Evacuation & Communication Systems, and Controlled Access & Security solutions. With design, manufacturing and distribution all happening within Canada, Mircom’s focus is listening to their customers and understanding their needs. Creating the most advanced units and streamlining the process, Mircom is taking charge of the industry. www.ind-safety.com
FRAUDULENT? OR FRIENDLY?
With Nextiva, You’ll Know Now. In the interconnected world of banks and financial institutions, you don’t have time to wait for situations to escalate. You need to know what’s happening at all points of your operations. And you need to know now. Verint can help. As a global leader in networked video security solutions, our expertise is built on over 100,000 successful deployments, including some of the world’s largest banks and financial institutions. Their security divisions trust our systems to reduce threats against people and property, protect valuable data, decrease skimming and fight fraud and identity theft. Our scalable, open, IT-friendly architecture and robust portfolio of video security solutions give you the confidence you need to make the right call, every time.
For more information on how Verint can help you know now, visit us online at Verint.com/know-now or call 866-NEXTIVA. © 2012 Verint Systems, Inc. All Rights Reserved Worldwide.
VIDEO MANAGEMENT & ANALYTICS | BUSINESS INTELLIGENCE | PSIM | INTELLIGENT NVRS | IP CAMERAS | ENCODERS & DECODERS | WIRELESS VIDEO DEVICES
BUSINESS NEWS
Aditya infotech crosses the 3.5 million mark
A
24 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
ditya Infotech Ltd (AIL), India’s No. 1 CCTV Distribution House, sets another benchmark by selling ‘3.5 Million’ security equipments in India. Acclaimed as a ‘light house’ of the surveillance industry, AIL has emerged as a one-stop destination for complete integrated surveillance solution for any need, ranging from Video Surveillance, Intelligent Video Surveillance, Mobile Surveillance, Thermal Imaging, Fire & Safety, Human Monitoring, Access Control & Attendance Management to Home Automation. Expressing on the achievement, Aditya Khemka, Director & CEO at Aditya Infotech Ltd, stated, “AIL forayed into the video surveillance business in 2007. Today, we are the only company in security industry that that has not only sold more than 3.5million security equipments, but also committed to adding value and educating our channel partners in order to take them to the next level of solution selling. We really thank our vendors, associates, system integrators and channel partners for their constant support and encouragement that have complimented our vision, supported our efforts and help us secure India. We really feel proud to be associated with them and will continue to set such benchmarks in the industry & would continuously endeavour to bring value addition to their business”. AIL has been aggressively distributing more than 30 world’s best brands such as in Video Surveillance category FLIR, CP PLUS, DAHUA, Samsung, MAXIMUS, vPinnacle, Hifocus; in IP Solutions
Samsung, CP PLUS, Dahua Genetec, AXXON, Digifort, Qnap, NUUO, in Fire & Safety GST, Rosslare; in Home Automation, CP PLUS, Dahua, Texecom, IOTA, and much more. “Market is consistently evolving and we constantly review ourselves as well as go-to-market strategy to optimize our potential and strength. This milestone has been achieved with the continuous support of our channel partners and the incredible con�idence of vendors in us”, stated, Yogesh Dutta, Vice President at Aditya infotech Ltd. “From schools to government establishments, plants to factories, shopping malls to airports, in the last few years, AIL has helped to secure India’s most prized locations. Add to this our commitment to quality and world-class service and our constant endeavour to raise the bar, to set new standards of excellence in the industry. Today, we have our own of�ices at more than 45 locations, dedicated 550 plus sales & technical professionals with more than 5500 channel partners who work with us across the nation”, he further added. “We believe in channel empowerment, education and training. Hence, we have strong and dedicated backend team to train the channel partners on new technologies & products. The product specialists from the respective categories have been hired to spearhead this process. The schedule of calendar for the dedicated training sessions on different category of products & solutions has been made and channel would be enrolled shortly for the same”, he concludes. www.ind-safety.com
Ι ßðåòá àáðáîîáêßá ðë ìëðáêðåÝè åêðîñàáîï Ι ßðåòá àáðáîîáêßá ðë ìëðáêðåÝè åêðîñàáîï
Ι ééáàåÝðá àáðáßðåëê Ýêà êëðåâåßÝðåëê Ι ééáàåÝðá àáðáßðåëê Ýêà êëðåâåßÝðåëê Ι êïðÝêð èëßÝðåëê ëâ ìáîåéáðáî àåïðñîÞÝêßáï Ι êïðÝêð èëßÝðåëê ëâ ìáîåéáðáî àåïðñîÞÝêßáï Ι ëéìèåÝêð ðë åêðáîêÝðåëêÝè áèáßðîåß âáêßá ïÝâáðõ ïðÝêàÝîàï Ι ëéìèåÝêð ðë åêðáîêÝðåëêÝè áèáßðîåß âáêßá ïÝâáðõ ïðÝêàÝîàï Ι ðÝêàÝèëêá ëî àåîáßð åêðáîâÝßá óåðä åêðáãîÝðáà ïáßñîåðõ ïõïðáéï Ι ðÝêàÝèëêá ëî àåîáßð åêðáîâÝßá óåðä åêðáãîÝðáà ïáßñîåðõ ïõïðáéï Ι åêãèá ìèÝðâëîé âëî éÝêÝãåêã ìáîåéáðáî ïáßñîåðõ Ýßîëïï Ι åêãèá ìèÝðâëîé âëî éÝêÝãåêã ìáîåéáðáî ïáßñîåðõ Ýßîëïï éñèðåìèá ïåðáï éñèðåìèá ïåðáï
BUSINESS NEWS
Victaulic showcasesd its exclusive installation-ready line, Vic-Press line and Advanced Groove System line
Vic-Press Crimper 121002 LO
V
ictaulic, the world’s leading manufacturer of mechanical pipe joining systems, showcased its patented installation-ready, Advanced Groove System (AGS) and Vic Press product lines at the ACREX trade fair at the Bombay Exhibition Center, Mumbai. These product lines gave contractors, engineers and owners an unmatched competitive edge, cutting piping system installation time and making installations safer. Installation-ready technology is designed to address the industry’s need to compress project schedules and remain competitive. It is the fastest and safest pipejoining method currently available. The installationready coupling installs up to ten times faster than other pipe-joining methods such as welding, brazing, soldering or �langing. The Victaulic patented Advanced Groove System (AGS) is the strongest and most dependable mechanical piping joining system for 350-1525mm/14-60” size piping systems. With a two-piece housing and a wedgeshaped groove that delivers pressure ratings up to 2,400 kPa/350 psi, Victaulic AGS couplings offer exceptional assembly speed and reliability.
26 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
In addition to simpli�ied and faster installation, Victaulic couplings, �ittings and valves are lighter in weight yet with higher integral strength and require less space than traditional products, minimizing the plant room footprint while maximizing HVAC system performance. Finally, Vic-Press, the industry’s �irst ANSI Schedule 10S pipe sized press-to-connect system designed for offthe-shelf ASTM A-312 Schedule 10S stainless steel pipe, is an industrial-grade solution for quickly and reliably joining small-diameter piping systems. Every Vic-Press product is supplied pre-lubricated, in a closed bag to maintain integrity throughout shipping and storage, ensuring seals are clean right up until installation. Visitors stopping by the Victaulic Stand P26 in Area 24 can see a pump set-up with Victaulic products installed which demonstrates these bene�its. “The Victaulic grooved system works equally well with a variety of piping materials, including carbon and stainless steel, and with a wide range of pipe sizes,” says Pankaj Soni, Victaulic Country Manager India. “This makes it the ideal choice to compress schedules in the HVAC industry where it offers the combined advantages of design versatility, highly reliable operation, and fast installation.”
About Victaulic
Since 1919, Victaulic has been the world’s leading producer of grooved mechanical couplings and pipejoining systems. Used in the most demanding markets, Victaulic innovative piping technologies and services put people to work faster while increasing safety, ensuring reliability and maximizing ef�iciency. The company has 15 major manufacturing facilities, 28 branches worldwide and over 3,600 employees who speak 43 languages across the globe. www.ind-safety.com
BUSINESS NEWS
VIVOTEK enhances compact cube camera portfolio with the launch of IP8130 & IP8131
V IP8130
IP8131
28 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
IVOTEK announced the launch of two new compact size cube cameras - IP8130 and IP8131. Both cameras, with their small appearance, elegant design and affordable price, are especially ideal for end-user surveillance applications such as homes, of�ices and shops. IP8131, the enhanced version of IP8130, is especially suited to low-light situations with a removable IR-cut �ilter for day and night functionality and built-in IR Illuminators, effective up to 6 meters, securing excellent video quality under completely dark environments. IP8130 and IP8131, both equipped with 1-Megapixel CMOS sensors, are able to capture 1280 x 800 resolution video at 30 fps. Also, by supporting industry-standard H.264 compression technology, bandwidth and storage consumption can be reduced signi�icantly. With a built-in microphone able to record sounds within a 5 meter radius, the surveillance capabilities of the IP8130 and IP8131 are truly unique. With the bundled ST7501 multi-lingual 32-channel recording software, users can set up an IP surveillance system with IP8130 and IP8131 easily. Driven by mobile device trends and a demand for more intelligent applications, VIVOTEK also provides a smart phone application, iViewer, for both iPhone and Android platforms, enabling users to monitor live video off-site in real time. Steve Ma, VIVOTEK’s Executive VP, stated, “With the increasing
demand for more seamless security solutions from end users, VIVOTEK is dedicated to the enhancement and innovation of our compact size cube camera product portfolio. The IP8130 and IP8131 are de�initely two ideal new choices for this market, providing outstanding value and performance.”
About VIVOTEK
VIVOTEK, established in 2000, has quickly taken its place as a leading brand in the security industry. Known for delivering world-class IP surveillance solutions, VIVOTEK specializes in system applications and integration. With innovative R&D teams adopting ground-breaking codec technologies, VIVOTEK provides a wide range of products, including network cameras, video servers, video receivers and central management systems. VIVOTEK (TAIEX: 3454) was listed on the Taiwan Stock Exchange in 2006. In 2008, a branch of�ice was set up in California, USA. VIVOTEK is currently working with more than 150 authorized distributors in over 80 countries.
For more information, contact: VIVOTEK www.vivotek.com
www.ind-safety.com
iCLASS SE® is HID Global’s next generation access control platform that enables authentication of a wide variety RI FRPPHUFLDO FUHGHQWLDO WHFKQRORJLHV $ KLJKO\ µH[LEOH UHDGHU IDPLO\ DORQJ ZLWK DQ DUUD\ RI PXOWL WHFKQRORJ\ credentials ensure interoperability in a variety of technology environments. iCLASS SE is also enabled for (NFC) mobile phones and other smart devices. Now, you can use multiple form factors to create your ideal access control solution today. For more information on HID’s iCLASS SE access control solution, visit hidglobal.com/path-ISR. Contact: hidindia@hidglobal.com | +91 98867 10117 © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design, iCLASS SE, Secure Identity Object, SIO and Seos are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.
We created a system with unlimited extinguishing power –
a fire engine. No more waiting for the fire department.
kind of fire to a state-of-the-art 3-tier security
No worrying about traffic jams stopping help from
system that’s one of the most foolproof systems in
arriving on time. Featuring a hose and a steady
the world – we have it all. Backed by a team of
water supply, Ceasefire’s Hydrant Systems are built
2,000, we already offer safety and security to 3,000
to come to the rescue. They’re the green, Watermist
new families and companies every month, across
powered fire engines you need on your premises.
300 towns and cities. We’re equipped and ready to come to the rescue.
Today, Ceasefire has over 400 lifesaving products, offering 360˚ lifesaving fire and safety solutions. From green fire extinguishers that can tackle any
FIRE SOLUTIONS
SECURITY
FIRE ALARM SYSTEMS
HOME SAFETY
To get 360° protection, call our toll free hotline: 1800 11 3473 / 1800 180 7233 or call +91-120-4223473 or SMS FIRE to 53030 CEASEFIRE INDUSTRIES LTD. A-3, Ground Floor, Sector - 4, Noida - 201301, Uttar Pradesh, India Tel.: +91-120-4255800 Fax: +91-120-4255801 l Web: www.ceasefire.in l Email: response@ceasefire.in
BUSINESS NEWS
Talk-A-Phone’s emergency phones now integrate with singlewire InformaCast® advanced notification
T
alk-A-Phone announces integration of the VOIP-500 series phone / WEBS Paging Module with Singlewire Software’s InformaCast Advanced Noti�ication solution. With Talk-A-Phone’s public release of the VOIP-500 �irmware version 1.0.1.12, users of the InformaCast Advanced Noti�ication can now send audio broadcasts to Talk A Phone’s VOIP-500 series phones and WEBS® paging devices over a network. “We are extremely pleased to announce the integration with Singlewire”, said Samuel Shanes, Chairman and Chief Executive Of�icer for Talk-A-Phone Co. “This is truly a signi�icant step forward to building a comprehensive all-encompassing mass noti�ication solution for our joint customer base.” The newly released �irmware allows users to activate the line-level output and to disable the speaker / microphone on Talk-A-Phone’s VOIP500 series phones by entering a user con�igurable DTMF code. The unit can also be programmed to have an auxiliary output trigger at the same time. InformaCast Advanced Noti�ication is a full-featured emergency noti�ication solution that enables organizations to reach an unlimited number of phones with text, and live or pre-recorded audio messages. Noti�ication can also be sent to IP speakers, existing analog overhead paging systems, computer desktops via a pop-up client or Cisco Jabber IM, IP-based digital signage, email, and social media sites including Facebook and Twitter. In addition, InformaCast Advanced Noti�ication
32 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
can also be used for automatically sending weather alerts, monitoring for 911/emergency numbers dialed within an organization, initiating an emergency conference call session with managers, and triggering noti�ication to and from other networked systems.
About Talk-A-Phone Co.
Talk-A-Phone is the industry leader in emergency communications, area of refuge, and mass noti�ication systems, providing the best quality, technology, and support. With over 75 years of experience creating communications solutions, Talk-APhone designs attractive, robust, reliable products, focuses on continuous technology advancement and pledges a total commitment to customer and partner success.
About Singlewire Software
Singlewire Software, based in Madison, Wisconsin, develops and supports innovative software centered around secure, fast, and reliable emergency noti�ication capabilities. Our main offerings include: InformaCast, Push-ToTalk, and Remote Phone Control. Informa Cast is deployed as a virtual appliance and can be purchased as either a perpetual or a subscriptionbased license from any registered Singlewire partner, through Cisco’s Solutions Plus program, or directly from Singlewire. For more information, contact: Talk-A-Phone Co. www.talkaphone.com www.singlewire.com
www.ind-safety.com
BUSINESS NEWS
Genetec announces new version of security center Empowers Security Professionals to Respond to Threats in Real Time, Enhances Collaboration in Control Rooms, and Introduces Broader Choices for Access Control and Video Devices
G
enetec™, a pioneer in the physical security industry and a leading provider of world-class uni�ied IP security solutions, announced Security Center 5.2, the latest version of its uni�ied security platform that combines video surveillance (Omnicast), access control (Synergis), and license plate recognition (AutoVu). This version of Security Center introduces new levels of security that will enable operators to react to threats at a moment’s notice. With greater levels of sharing and collaboration through a new software-based video-wall, expanded SDK functionality, and support for a variety of new access control and video equipment, Security Center 5.2 continues to set the pace for uni�ication, while broadening its technology partner ecosystems. Security Center introduces new threat level management features that allow users to quickly respond to changing security conditions and potential threats as they develop. At the click of a button, security operators can activate pre-de�ined threat levels that automatically restrict entry through
34 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
access-controlled doors, move PTZ cameras to speci�ic positions to increase the coverage of a situation, and automatically change the recording quality and frame rate to guarantee the highest quality video for investigations, operators can even activate a complete lockdown in extreme cases. With these and many other customizable actions, organizations will be better able to �ine-tune threat level management to meet their speci�ic goals and requirements, for both access control and video security applications. With the introduction of its new software-based video wall and display sharing functionalities, Security Center enhances collaboration in control rooms and throughout an organization for a fraction of the cost of specialized hardware. Software video walls can be easily assembled and con�igured using standard displays; the remote control and sharing of displays further augments video monitoring, access control and alarm management activities while providing organizations with a truly uni�ied experience. “This new version of Security Center continues to leverage the power of uni�ication with new tools that enhance security and promote collaboration across various security needs such as controlling access, monitoring video, intrusion detection and more,” explains Jimmy Palatsoukas, Senior Manager of Product Marketing at Genetec. “We are making it easier for our customers to get a uni�ied view of their installation, set up control rooms of the future, and effectively manage high risk situations in a rapidly changing security climate, all with the aim of protecting people
and securing their organization’s assets.” To ensure maximum privacy and restrict access to sensitive information, a new camerablocking feature will allow users to limit access to speci�ic video feeds at any point in time. More importantly, to guarantee that video is truly blocked, Security Center can prevent users from exporting video, viewing recorded video, or taking snapshots. In addition to camera blocking, other video functionalities in version 5.2 of Security Center include support for analog decoders and new DVR integrations, with the goal to continue facilitating the migration from analog to IP video, while reducing the overall cost of the path to IP through reuse of existing equipment. Security Center 5.2 will also add several key access control integrations, including support for the Synergis Master Controller (SMC) to take full advantage of threat level management, as well as full line of Genetec preferred access control hardware partners including HID EDGE and VertX EVO. Thanks to collaborative integration with industry standard access control hardware, customers will be able to deploy non-proprietary hardware from leading access control vendors within the context of an open architecture security platform. Security Center 5.2 is expected to be available in mid-April 2013, through Genetec’s extensive network of partners and integrators as a free upgrade for all software maintenance agreement (SMA) holders. For sales or upgrade pricing, contact Genetec sales, or a local Genetec certi�ied integrator. www.ind-safety.com
BUSINESS NEWS
G4S to secure your cash s Launches innovative Cash Solutions for various industry segments and new Cash Vans s Vans equipped with latest international standard security features
G
4S Cash Solutions (India) Pvt. Ltd. showcased its specialised cash solution and bullion logistics service – the Cash Van. The launch was a part of the “Leveraging Innovative Security Solutions for Banks and Financial Institutions” event organized at the So�itel Hotel in Mumbai. The event was organised by Security Watch India (SWI) in association with G4S Security Solutions Limited. The high-tech van was on display at the venue for public viewing. “G4S is known globally as an innovator in providing Cash Management Services. The new �leet of Cash Vans is built with intelligent technology and digitalized devices and will be introduced country wide for our customers. Our vast experience and signi�icant investment in latest processes and technologies in cash management services has helped us to develop innovative service solutions for organizations in varying industry segments ranging from Retail, Healthcare, Real Estate, IT, Banking, Diplomatic missions & embassies, Hospitality, Telecom to Aviation. We believe that in a world of evolving threats, security cannot remain as an afterthought but as part of the overall business strategy,” said Rupan Sidhu, Director, Corporate Affairs.
36 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Cash vans have been designed to match international speci�ications. Outstanding features of these vans include : s polycarbonate windscreens and windows, fully airconditioned s four cameras along with display screens s tamper proof digital video recording s GPS on board for emergency route planning and centrally monitored tracking s Emergency Panic Switch s Intelligent door locking along with sensors on hatches.
G4S Cash solution has its presence in 53 cities and vault facilities in 16 major �inancial hubs of the country and provides comprehensive, scalable and customer-focused cash management solutions globally. The range of services include - Cash and Valuables Transportation, Secure Storage and retrieval, Cash processing, ATM outsourcing and CASH360 (the �irst and the only end to end cash management solution in the marketplace). Other services offered by G4S Cash Solutions (India) Pvt. Ltd. are Cash In-Transit, Vaulting Facility, Forex Management, ATM Management, Cash Processing, Bullion Management and Cash Management. The infrastructure, ranging from vaults to transport vans adheres to global standards and is subject to International Security Audits at regular intervals. G4S UK is a member of the Note Circulation Scheme (NCS), the regulatory framework set down by the Bank of England. By partnering with G4S, banks reduce their exposure to potential risk and ensured regulatory compliance. www.ind-safety.com
BUSINESS NEWS
Schneider Electric announces availability of new Sarix Thermal Imaging Series high-resolution IP cameras by Pelco Offer provides the highest quality image to critical security applications, ideal for borders and military installations, enabling unprecedented security
Sarix - TI - 90
38 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
S
chneider Electric today announced the availability of its Schneider Electric™ Pelco™ HighResolution Sarix TI™ Series Thermal Imaging (TI) IP cameras. Adding to its popular line of existing thermal imaging surveillance technologies known for creating high-quality and affordable thermal imaging with infrared detection, the cameras have been built on the Sarix technology platform, and provide a digital endto-end IP solution that allows for easy integration into a wide variety of third-party systems. The camera has longer detection, recognition and identi�ication ranges, that are up to twice as long as the mid-range model, making it ideal for the most demanding and critical security applications such as international borders, airports, seaways, dams, pipelines, power generation stations and military installations. The High-Resolution Sarix TI Series IP cameras are available in �ixed or pan/tilt enclosures designed for outdoor deployment and offer unprecedented protection beyond four miles when out�itted with a 100mm lens. In addition to the 100mm lens, the camera is also available with four other lens con�igurations: 6.25mm, 14.25mm, 35mm and 50mm focal lengths.
Key features of the new HighResolution Sarix TI Series IP cameras include: s Heightened image quality: Delivering up to 640x480 thermal video resolution, these positioning and �ixed cameras provide outstanding sensitivity below 50 milliKelvins at f/1.0 and are capable of multiple display formats, including white hot, black hot and various color signatures. The Sarix TI uniquely maintains a full sensor dynamic range (16 bits) and keeps the signal in the digital domain for all image and analytics processing rather than converting to an analog signal. This series also allows up to two simultaneous video streams in IP installations. s Industry - leading open integration : While thermal imaging has historically been deployed in closed, proprietary video management systems, the Sarix TI supports a wide variety of video management systems and is easily integrated into existing video networks. s Wide-range of customizable analytics : The Sarix TI comes standard with integrated camera www.ind-safety.com
TM
SAFETY & SECURITY PROJECT 2012
I know which
DVR to choose
Access Control .........no Issue
CCTV in a jiffy Biometrics is so easy now
ITA certified
ITA certified
Lets Say you are in a Company’s Annual General Meeting for Safety & Security Project Whom would you hire & whom would you be ? ......................... Grey or Blue
Security Networking no problem sir
A INI N G R T TM
Introducing India's Premier Certificate Course in Biometrics & Surveillance
Visit www.inceptonline.com for Course dates and seats availability
022 40 30 01 03
training@inceptonline.com
AC ADEMY www.inceptonline.com/training
Corp. Office : 202, Shivam Chambers, Next to Sahara, S. V. Road, Goregaon (W), Mumbai 400104 © Incept 2011. all rights reserved Ref : incept - training - V3 261012.
BUSINESS NEWS
analytics at no additional charge, including adaptive motion, object counting, stopped vehicle, loitering detection and camera sabotage, which are customizable for a wide range of applications. In addition, alarms can be integrated into the system and users can be alerted via email with alerts, images and/or hardware alarms. s Robust construction : The compact, lightweight aluminum camera is designed for maximum environmental protection, complete with sun shroud and heater/defroster. The system has a sustained operating temperature range of minus 40 degrees to 122 degrees Fahrenheit. At its core is an uncooled, sun-safe microbolometer, long-wavelength infrared (LWIR) camera with an amorphous silicon detector, which provides a lower �ixed pattern noise, while maintaining high resolution and sensitivity when exposed to the sun during daylight hours.
“The Sarix TI gives our customers �lexibility to address surveillance and security challenges in their facilities with ease, especially while covering very large areas. Sarix TI is the �irst thermal camera speci�ically designed to be an integrated part of any end-to-end video security solution. Completely operable with both Pelco by Schneider Electric and third-party video management and recording systems, Sarix TI is quite simply, the evolution of thermal imaging. We are really excited to bring this product to the Indian market”, said Mr. Nikhil Pathak, Vice President, Building Business,
40 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Schneider Electric India. In addition to the highresolution 640 x 480 camera, the Sarix TI Series is currently available in two other models: 240 x 184 (low-resolution camera) and 384 x 288 (mid-resolution camera). With its Pelco video portfolio, Schneider Electric is a world leader in the design, development and manufacture of video security systems. The Sarix TI Series was the winner of an IFSEC International Security Industry Award 2012.
About Schneider Electric
As a global specialist in energy management with operations in more than 100 countries, Schneider Electric offers integrated solutions across multiple market segments, including leadership positions in Utilities & Infrastructure, Industries & Machines Manufacturers, Nonresidential Building, Data Centres & Networks and in Residential. Focused on making energy safe, reliable, ef�icient, productive and green, the Group’s 140,000 plus employees achieved sales of 24 billion euros in 2012, through an active commitment to help individuals and organizations make the most of their energy.
For more information, contact: Schneider Electric www.schneider electric.com www.pelco.com/sarixti
www.ind-safety.com
® & ™ are owned by Ansell Limited or one of its affiliates. ® All Rights Reserved 2012
ANSELL, GLOBAL LEADER IN HAND PROTECTION SOLUTIONS. Mechanical Protection, Chemical & Liquid Protection, Product & Worker Protection. As a global leader in hand protection Ansell offers a complete range of solutions and services to industry, providing protection while enhancing productivity. Mechanical Protection guards against cuts, abrasions, snags, punctures and hand fatigue. Chemical & Liquid Protection defends against harmful chemicals, oils, liquids and mechanical hazards. Product Protection shields hands and products from contamination. HyFlex®, AlphaTec®, TouchNTuff® gloves feature the latest innovations, leading the industry in safety and functionality. When you need the right solution for the most challenging jobs and environments, these gloves deliver and provide the highest levels of worker safety and comfort.
WWW.ANSELL.EU infoindia@ansell.eu
BUSINESS NEWS
Milestone Arcus : New multi-platform video management software for embedded partner solutions
M
Low-complexity, low-cost offerings will run on Linux, Mac or Windows
ilestone Systems, the open platform company in IP video management software (VMS), announces Milestone Arcus™: an embedded video surveillance platform for low-complexity, lowcost security installations. Milestone Arcus runs on Linux®, Mac® OSX and Windows® related operating systems, within network storage and cameras or other devices on the edge. This is a signi�icant differentiator in security market offerings. Hardware partners embedding Milestone Arcus in any kind of hardware form factor will be able to offer a streamlined, video management tool that is simple and easy to install – at very competitive price points. Milestone Arcus is a multiplatform VMS solution for hardware vendors to embed in their products, to be sold by their channels as an out-of-the-box solution, ready to use. These embedded solutions will be co-branded with Milestone to let customers know they are getting the best in video surveillance. Milestone Arcus is the most lean yet high-performance product in the Milestone portfolio, which up to now has been Milestone XProtect® VMS offerings that run on Windows and are sold by the worldwide Milestone Systems network of channel partners. Milestone Arcus is a brand-new VMS product with new development code in its core that takes advantage of the company’s 15 years of experience in video surveillance technology. It is the �irst delivery
42 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
from Milestone’s new Incubation & Ventures business unit that was created in 2012. “Milestone Arcus is a multiplatform VMS that hardware vendors can embed in their products for customers wanting simple, inexpensive surveillance tools. Milestone Arcus makes the move from analog to IP easy and fast for partners and their customers,” says Lars Nordenlund, VP of Incubation & Ventures at Milestone Systems. About 60% of the physical security market is estimated to be using analog equipment so there is considerable potential business that will be moving to IP networked solutions over the coming years. “There is conservatively $6B in analog sales by 2015 that will be converting to IP in the security equipment market, not including service and maintenance. Milestone Arcus opens up new growth opportunities in which hardware vendors can accelerate their business,” said Balaji Srimoolanathan, Principal Consultant - Aerospace, Defence & Security, Frost & Sullivan. “Milestone Arcus is timed right for this trend and can reach the low end of the security market that will be in transition. It will be a major driver, with huge impact in motivating a lot of people to move toward IP.” Hardware vendors who embed Milestone Arcus in their products will gain an advantage from low development costs by using the top-
branded Milestone VMS technology. Milestone will provide the integration and software upgrade paths in ongoing new releases. Several early adopter partners will be announcing their products with Milestone Arcus very soon. Learn more at the Milestone Systems booth #20053 at the ISC West trade show in Las Vegas April 10-12.
About Milestone Systems
Founded in 1998, Milestone Systems is the global industry leader in open platform IP video management software, according to IMS Research. The XProtect® platform delivers powerful surveillance that is easy to manage, reliable and proven in thousands of customer installations around the world. With support for the widest choice in network hardware and integration with other systems, XProtect provides best-inclass solutions to video enable organizations – managing risks, protecting people and assets, optimizing processes and reducing costs. Milestone software is sold through authorized and certi�ied partners. For more information, contact: Milestone Systems www.milestonesys.com www.milestonesys.com/Arcus
www.ind-safety.com
PROTECTING WHAT MATTERS MOST TO YOU HD SPRINKLERS LISTED
Alarm Valve
Gong Bell
LISTED
APPROVED
LISTED
Flexible Hose for Sprinkler
LISTED
APPROVED
APPROVED
Pressure Relief Valve LISTED
APPROVED
LISTED
APPROVED
LISTED
Air Vent Valve for Sprinkler System
Water Flow Alarm Switch with Retard Water Spray Nozzles
APPROVED
Pressure Switch
Water Curtain Nozzles
LISTED
C-3/6, Nandanvan Industrial Estate, LBS Marg, Thane - 400604, India Tel: +(91) 22 25826958, 25826793 Fax: +(91) 22 25812524, 67969049 Email: info@hdfire.com INDUSTRIAL SAFETY REVIEW
LISTED
www.hdfire.com
43
APRIL 2013
BUSINESS NEWS
Kantech introduces EntraPass Software v6.00 Enhanced user experience delivers portability, �lexibility and scalability
K
antech, part of the Security Products business unit of Tyco (NYSE: TYC), has introduced EntraPass v6.00 security management software which takes the user experience to the next level by enhancing the portability, scalability and �lexibility of the solution. The latest software build now includes support for the EntraPass Go mobile app and EntraPass Web, an intuitive web browser interface. EntraPass Go enables security administrators to interact with the EntraPass software using a variety of mobile devices, such as smartphones and tablets. The easy-to-use mobile app gives you anytime, anywhere realtime management of over 20 security tasks, including managing/creating cards, locking/unlocking doors, requesting reports, and much more. EntraPass Go has been developed to work with iPhone, iPod Touch and Android powered phones. The app is also available for the iPad and Android powered Tablets. “Mobility, �lexibility and on-the-go security is the future,” said Scott McNulty, Senior Product Manager, Kantech. “With EntraPass Go, security administrators do not need to be tied to a workstation to make changes
44 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
to their EntraPass system. Users can remotely control their security system from anywhere using EntraPass Go without having to physically return to the of�ice.” EntraPass Web is a web application that allows security administrators the �lexibility to access EntraPass from a standard web browser. The intuitive web browser interface provides real-time management capabilities for various security tasks, including telephone entry, card management, door control, live video, maps, alarm management, and much more. EntraPass Web also enhances the managed access control experience by ensuring portability and ease of use through its user friendly, intuitive, next generation interface. “With the advent of EntraPass Web, we’re bringing the simplicity to security professionals wherever they are, and allowing them greater accessibility to handle those important, day-to-day security-related tasks,” said McNulty. EntraPass software is scalable from a 4-door small of�ice to enterprise level applications. This scalability is also built-into EntraPass Go and EntraPass Web. With these enhancements, EntraPass v6.00 helps security administrators keep pace with rapidly changing security priorities and technology.
About Kantech
Kantech access control solutions are part of the Security Products business unit of Tyco (NYSE: TYC), the world’s largest pure-play �ire protection and security company. Kantech access control technologies are ready to use right out of the box, and provide solutions that are compact, and easy to use for smaller businesses while scaling to meet the needs of larger businesses. Kantech solutions can easily link to American Dynamics video systems and DSC alarm panels to provide an integrated, holistic security solution. For more information, contact: Kantech www.kantech.com
www.ind-safety.com
Fall Protection
Eye Wash & Safety Showers
Lifting, Pulling & Material Handling
Eye Protection
Fire Fighting
Search & Rescue
INDUSTRIAL SAFETY REVIEW
45
APRIL 2013
IN FOCUS
Lynx Communication Systems : Delivering the right product at right price Q. In your opinion, what is the state of security industry in India and what is the trend you see in the space ?
Security industry in India is one of the most emerging industries in India. Market is growing by 40% annually. As the market opens up to new generation network based products and solutions that support remote access/monitoring, work in an open and integrated environment, market will grow faster to meet the new demands.
Q. Which market are you targeting ?
Currently we arefocusing on SMB and the corporate segment.
Q. What is the advantage of Matrix products vis-à-vis the competition ?
Mr. Hemant Trivedi, Director Lynx Communication Systems Pvt. Ltd.
Matrix is SUBSTANCE brand. Substance is in the DNA of Matrix solutions. Substance in the form of technology, depth, genuineness and going beyond the mere outer façade and offer more values in all the areas. This is what differentiates Matrix from the lot. Matrix solutions are packed with More. More productivity, more applications, more �lexibility, more functions, more features, more cost saving, more reliability, and more support. Matrix positioning is based on offering more of these true inherent values which customers expect from infrastructure solutions.
Q. What is your marketing and channel strategy ?
Our Strategy is very simple we prefer “to sell the right product at right price”.
Q. What is your support strategy ?
Our support policy is “Give them Quality, you don’t speak, let them speak, make the customer the hero of our success story “.
Q. What are the challenges that you are currently facing in India ?
Relatively low level of awareness/knowledge about electronic security and reluctance to invest in systems thatdo not offer immediate and tangible bene�its seems to be the challenges faced in India.
Q. How much of growth are you expecting this year and are you also expecting any business from the overseas market ? As the market is growing by 40%, de�initely our market share is sure to increase in the near future.
46 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
www.ind-safety.com
IN FOCUS
Mr. Hariom Sharma - Director, Sales & Marketing Solus Security Systems Pvt. Ltd.
10 Years : Accessing Control on Future Q. Security is the buzzword among every industry, how does Solus is countering this demand of commercial security systems in India?
Yes, Security is the industry buzzword and a responsibility equally on users and enablers. In terms of demand, the scenario is challenging and exciting simultaneously. Solus’s core focus on product development and innovations has always kept it ahead of its time. We engineer continuous innovation www.ind-safety.com
which in turn fuels further demand. We are ably backed up with a mature infrastructural setup for production and post-sales service support across India and the Mid-East which is helping us to effectively serve our customers. 10 years completed with over 30% CAGR indicates proven sustainable business model.
Q. Could you expatiate more about Solus’s domestic & global business activities? Our clients in the Indian market INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
47
IN FOCUS
range from sectors as diverse as IT/ITES, Govt. & Defense to Health-care and Hospitality �ields. We have also marked our footprint abroad by successfully executing prestigious projects in the Mid East. Today’s customer has become mature enough to differentiate between true performers and those who rely on marketing gimmicks and hypes, and that’s where opportunity lies for Solus. Our expertise, product & service quality and sheer professional dedication has resulted in a happy set of customers for us, who are then themselves recommending us to others. Our future activities, both on domestic and global fronts ‘ll be rigorously based on those tenets as well.
“In our �ield, R&D is a critical ingredient for staying relevant in the fray. Consequently, at Solus, signi�icant investment is made into R&D every year.”
comparing with others as the key to be the market leader. We rely on our strengths and focus on identifying and removing our weaknesses to improve ourselves. Further, our product portfolio’s capabilities and our proven track record validate our position as far as competition is concerned. We are also working on brand building & maintenance to further strengthen our market position.
Q. How do you account R&D activity in Solus Software?
Testing Facility
Q. Solus has wide range of security products; can you highlight some of the top line products & its applications?
Integrated Security Management Suit (iSACS) is the latest and most comprehensive product coming out of the SOLUS stable. Built on the latest .NET platform, it is fully browser-enabled with additional scalability to mobile OS platforms (Android, iOS etc.). Its modular design enables seamless integration of Access, T&A, Visitor management, Contract Work management, Canteen, Guard tour and numerous other features into iSACS as per customer demands. Security projects normally have life till business existence, hence demands from customer keep evolving, object oriented approach in design enables agility and rapid deployment of emerging needs along with seem less data exchange with third party systems.
Q. What is Solus product marketing strategy to confront the competition? Ans: We believe in competing with ourselves rather than
48 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
In our �ield, R&D is a critical ingredient for staying relevant in the fray. Consequently, at Solus, signi�icant investment is made into R&D every year. A good amount of pro�its is reinvested back for R&D each year in a mixed format of capital as well recurring expenditures.
Uttarahalli Factory
Q. Does “India” as market has a great potential? What are the key performance areas?
Ans : Absolutely, though the growth is slow but consistent and as Indian businesses get larger, they are bound to address security issues and we would step in there. The initiatives taken by the current govt to promote domestic manufacturers in security solutions is an encouraging signal. www.ind-safety.com
IN FOCUS
Jayanagar Of�ice
biometrics for access control, intelligence-sharing and integrated functioning of equipments-basically Event Fusion, remote capabilities, data encryption standards are some of the major features which will drive the next phase of growth in this industry. Its really an exciting time to be in this �ield and competing to become the industry leader in innovation.
Q. What is your vision for Solus Security ?
Q. Could you brief us the Indian & global scenario of electronic security systems and solutions industry? Customer’s seriousness and interest is de�initely far greater globally. Correspondingly, foreign players have developed highly ef�icient products. Indian industry is still in an adolescent stage and we have some way to go before we are on an even keel with our global counterparts.
Q. According to you what are the factors affecting the electronic security business?
There are a multitude of factors-be it technological expertise, �inancial capital structure, hardware supply, distribution network and most importantly, sensitizing earmarked customers about their need for electronic security as well as developing solutions tailored to each client’s requirement.
Q. What are the key technological trends that are driving the electronic security industry?
Higher resolution cameras, improved www.ind-safety.com
Solus will lead the enterprise security market with inspiring products, business models and services. thus will bring best value of association to its customers, employees and business partners.
Q. What are the issues or initiative needs to be taken by governmental & non governmental bodies that are related to electronic security industry?
Awareness programs can be launched by the Govt. to highlight the need for an enterprise on spending some resources towards safeguarding its valuable assets. The central govt.’s decision to promote Indian manufacturers in this sector is a welcome move in that direction. Push to implement & maintain effective security thru automation in PSU’s and other sensitive installations is required. incentives like Lower tax rates for security automation can also boost business for industry. We wish to Thank all Customers, Employees, Partners and well wishers for their continued trust and support of Solus. We, in return, promise to continually deliver products and services surpassing expectations for which Solus is known for. INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
49
BUSINESS NEWS
Micro Technologies introduces ‘Micro Portable Black Box’ s Secures Consignment-in-transit s Security Measures Only For Consignor & Consignee s Can Monitor & Control Consignment Movement Through A Mobile Phone
Mr. Nagendra Mefta, Hon Secretary. Imitation Jewelry Manufacturers’ Association (UMA) Cots Ribbon Before Unveiling Micro Portable Black Box (Micro PBB) Af The Fashion Jewelry & Accessories Show On April 7,2013 At The Bombay Exhibition Center, Goregaon East Mumbai
Micro Portable Black Box is Of�icially Launched. Present (L-Rj Mssssrs Oalpat Baoie (TreasureMJMA). Milind londhe (Chief Communication Of�icer. Micro Technologies (India) Ltd.). Nagendra Mehta.Hon. Secretary, UMA and Mohan Iyer, vice President. UMA
50 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
M
icro Technologies (India) Ltd, (MTIL : BSE 532494 & NSE: MICROTECH) a leading global developer and marketer of security devices and solutions announces that it has introduces ‘Micro Portable Black Box’ that provides advanced security to goods-in-transit. The company unveiled Micro PBB at the ‘Fashion Jewelry and Accessories Show’ at the Bombay Exhibition Center at Goregaon in the north-western suburb of Mumbai. According to jewelers in this exhibition portable high value goods are most vulnerable to be lost or stolen which is one of the main reasons to introduce this effective Black Box to curb such untoward incidents. Introducing ‘Micro Portable Black Box’ [‘Micro PBB’], Mr. Milind Londhe Chief Communication Of�icer said, “The days of uncertainty about goods-intransit are over. The security of the consignment can be managed better by the consignor and the consignee through a mobile phone. With Micro PBB one can dispatch any valuable item without any tension as it takes care of their safety while en route. Looking forward to the upcoming need of valuable consignment articles, it’s showcased herein this exhibition to one of the sensitive domains namely jewelry”. Unveiling ‘Micro Portable Black Box’ at Micro Retail Booth at the Exhibition, Mr. Nagendra Mehta, Hon. Secretary, Imitation Jewelry Manufacturers’ Association remarked, “I congratulate Micro www.ind-safety.com
BUSINESS NEWS
Technologies India) Limited on introducing Micro Portable Black Box. It is a nice product for the safety and security of jewelry. It is a very innovative idea and would ful�ill the security requirements.” “The Micro Portable Black Box is very useful product to Jewelry Industry. I strongly recommend to our industry so that everybody bene�its from its usage,” added Mr. Mohan Iyer Vice President, Imitation Jewelry Manufacturers’ Association . This innovative solution emerged due to increasing demand on safety and security of movable assets by the industry; this solution effectively protects the assets of a businessmen, corporate, banks & other allied services. Micro PBB is a real-time portable consignment security device, which can be used for the safe and secure consignment movement. It provides over- the-air security by SMS commands. It also has many useful features such as SMS Alerts & Noti�ications, GPS Location Tracking, Locking and Unlocking Facilities for the consigner from anywhere at any time. With Micro PBB both the consigner and the consignee can be relieved from hassles while the goods are in-transit. This solution is targeted at high value transactions. Currency notes, jewellery, gold and other valuable items can be transshipped from one place to any corner on the globe safely and securely.
About Micro (India) Ltd.
Technologies
Established in 1992, MTIL is a leading global developer and marketer of security solutions. It is an ISO 9001, 14001 & 27001 company. MTIL has already received certi�ications
52 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
from prestigious national and international testing organizations like PESO, ERTL, EMC, SAIAS, and ARAL It has also recently received A Tick Mark & CB Certi�ication from TUV Rheinland, an internationally renowned German Certi�ication body. Product line includes the much-needed security devices, life style and support systems and webbased software. MTIL has a long track record of offering leadingedge security solution products. The company focuses on innovation, advanced technology and on making the life of people safe, secure and manageable in terms of security, time and money. The company has grabbed many national and international awards for its growth and R&D. MTIL aims at displaying not just the technological innovation prowess but also the product diversity in various segments of vehicle, premise, mobile and other assets. It is now vigorously entering the energy & health segments. MTIL’s R&D Unit was accorded recognition by the Department of Scienti�ic & Industrial Research (DSIR), Ministry of Science & Technology, Government of India.
For more information, contact: Micro Technologies (India) Ltd. www.microtechnologies.net
www.ind-safety.com
BUSINESS NEWS
Allied Telesis Switching Solution empowers Eden Gardens at the inauguration ceremony of IPL-6 Allied Telesis has deployed their switching solution in both Eden Gardens and Guwahati Cricket Stadium
A
llied Telesis, leader in IP and Ethernet network solutions, has been chosen as the IP networking brand and their state of the art switching solution has been deployed to power the entire network in both the stadiums - Eden gardens wherein the IPL-6 gets inaugurated today, as well as, Guwahati Cricket Stadium. To ensure highest level of security, both cricket associations - Kolkata as well as Guwahati choose to go the IP way and have build a comprehensive and sophisticated IP network for their access control, physical security as well as surveillance. Allied Telesis has been chosen to empower IP surveillance in Kolkata and Guwahati cricket stadiums. Allied Telesis has worldwide deployments in the IP based security-surveillance access control and physical security networks. They have more than a decade
Mr. Subhasish Gupta, Country Manager - India & SAARC Allied Telesis
54 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
experience in developing strong- low latency and high resilience switching solutions to address this space, wherein video, voice, access control and other such realtime applications converge on an IP backbone. Mr. Subhasish Gupta, Country Manager India & SAARC at Allied Telesis said, “I am excited that Allied Telesis has successfully implemented its IP networking solutions in two of the most prestigious stadiums where IPL-6 matches are going to be held, Eden Garden and Guwahati Cricket Stadium. The implementation was completed on time. I am sure the quality of Allied Telesis video networking will provide lot of physical and IP surveillance security in the cricket ground.” For more information, contact: Allied Telesis www.alliedtelesis.com
“I am excited that Allied Telesis has successfully implemented its IP networking solutions in two of the most prestigious stadiums where IPL-6 matches are going to be held, Eden Garden and Guwahati Cricket Stadium. The implementation was completed on time. I am sure the quality of Allied Telesis video networking will provide lot of physical and IP surveillance security in the cricket ground.”
www.ind-safety.com
BUSINESS NEWS
Wireless integrated announces automated instrument tracking system The system tracks and monitors medical and surgical items in hospitals using RFID tags
W
ireless Integrated, the division of BioEnable Technologies Pvt. Ltd. based in Pune, India, has announced the latest offering from the company, Automated Instrument Tracking System, which helps in the tracing and monitoring of medical and surgical items in hospitals. The tracking system serves to offer effective, real-time and accurate monitoring capabilities which can be integrated with APD equipment, hospital information systems as well as Real-Time Locating Systems. The company claims that the system utilizes QR odes and RFID for tracking purposes. The company states, “QR codes & RFID tags are capable of withstanding sterilization, liquid and metal environments, expected during the instruments’ lifespan. The QR codes & RFID tags are �irmly secured to the instruments and sterile consumable items.” Tag location is set after taking into consideration the recommendation of the medical staff. Wireless Integrated substantiates that the surgical instrument tracking system comes with a lot of features and capabilities. The system helps manage the instruments tagged with RFID and maintain the database. In addition, the instruments which are sent for maintenance are also tracked and managed. Regular statistical analyses as well as reports on the utilization of instruments are also generated. It serves as a work�low management tool and helps in keeping inventory of the instruments too. Prede�ined indicators are also imparted to the dashboard to alert in the event of missing instruments, arrival of instrument sets or when requirement for instruments arise somewhere.
56 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
The company claims that the system offers signi�icant bene�its in terms of Return on Investment (ROI). The system reduces the shrinkage of the inventory of instruments, increases instrument accuracy, eliminates reimbursements as instruments can be easily tracked, reduces medical errors, reduces insurance premiums etc. In terms of patient safety as well, the system helps considerably on multiple fronts.
About BioEnable Technologies Pvt. Ltd.
BioEnable Technologies Pvt. Ltd. is a company based in Pune, India offering services, solutions and products in the �ields of identi�ication, automation and tracking. Founded in 2001, the company currently employs over 100 and has customers in as many as 50 countries all over the world. Wireless Integrated is a division of the company which offers simple, but effective wireless solutions for energy management, healthcare etc. The company aims at providing innovative wireless solutions such as Real Time Location System, Driver Performance Monitoring System, Laptop Anti-theft System, Automatic Retail Vending Machine, Jewelry Anti-theft System, Infant Security System, Automated Instrument Tracking System etc. For more information, contact: BioEnable Technologies Pvt. Ltd. www.bioenabletech.com www.wirelessintegrated.com
www.ind-safety.com
BUSINESS NEWS
Matrix certifies Hazel Infotech’s Telecheck as an accurate and easy call accounting solution for ETERNITY range of IP phone systems.
T
he Integration team at Matrix has tested and certi�ied the Telecheck – telephone monitoring and management software from Hazel Infotech Limited as fully compatible and integrated CAS solution for its ETERNITY range of IP phone systems. As a result of this integration, businesses keen on cost savings will gain additional control over telecom resources. With the use of Telecheck CAS tool with Matrix ETERNITY IP phone systems, organizations can keep track of all the calls placed or received through the phone system. “Matrix ETERNITY is the advanced IPPBX offering combination of trunks and users/ subscribers for Analog, Digital, IP and GSM networks. ETERNITY IP-PBX is loaded with the range of cost saving features such as least cost routing, GSM network support, call budgeting, automatic call back and many more. Besides, ETERNITY also has buffer memory of 12000 calls for call logs and users can get the print of these records.” said Ruchir Talati, Product Manager – Enterprise Phone Systems for Matrix. “In response to the need of modern businesses for more call controlling and management tools, Matrix identi�ied the need of integrating ETERNITY with leading Call Accounting Solutions available in the marketplace. We selected Hazel Infotech for its good performance and comprehensive solution for cost accounting.” continued Ruchir Talati. “With this integration, ETERNITY IP phone system users will get additional call controlling and management �lexibilities and will be able to implement cost control policies, customize cost allocation, detect toll fraud, verify overbilling, record call events and in turn increase employee productivity through resource optimization.”
58 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
concluded Ruchir Talati. “Hazel Infotech is pleased to partner with Matrix in building an enhanced telecheck version optimized to maximize the bene�its of ETERNITY IP phone systems. Telecheck is noted for being readily deployable with CAS, and with many additional capabilities, Matrix users can expect to achieve the best performance from their ETERNITY IP phone systems and earn returns many times over on their telecheck investment” said Nikhil Daftary, Vice President – Development at Hazel Infotech.
About Matrix Comsec
Established in 1991, Matrix is a leader in Telecom and Security solutions for modern businesses and enterprises. An innovative, technology driven and customer focused organization; the company is committed to keep pace with the revolutions in the telecom and security industries. With around 30% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like IPPBX, Universal Gateways, VoIP Gateways and Terminals, GSM Gateways, Access Control and Time-Attendance Systems, Video Surveillance System and Fire Alarm Systems. These solutions are feature-rich, reliable and conform to the international standards. Having global foot-prints in Asia, Europe, North America, South America and Africa through an extensive network of more than 500 channel partners, Matrix ensures that the products serve the needs of its customers faster and longer. Matrix has gained trust and admiration customers representing the entire spectrum of industries. www.ind-safety.com
BUSINESS NEWS
EverFocus One World 2013 : Mumbai marks an opulent start
E
verFocus India has recently kick-started its �irst ever multi-city event “EverFocus One World 2013” series at Mumbai Recreation Club, Bandra on 12th March, 2013 This is for the �irst time in India that a video surveillance manufacturer has bought Third Party Partners, Channel Partners, System Integrators, Consultants, End Users under a same roof. The event provided the unique opportunity to the participants to get accustomed to the new EverFocus products with innovative & unique solutions in IP, HD, CCTV, Mobile & Analog Solutions. The Show witnessed a very encouraging response from over several prominent Channel Partners / System Integrators / End Users / Consultants / Third Party Partners in Mumbai who are into product Installation & Integration for CCTV System, Fire Alarm System, Time
60 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Attendance & Access Control, Building Management and more. Event was initiated with the objective to create awareness about the various solutions for large and mid-sized projects based on EverFocus IP Cameras and third party Open Platform Management Software (VMS), solution for Video Analytics with EverFocus products, solution for distributed business based on EverFocus IP Cameras and third party Network Video Recorders(NVR’s), solution for third party’s Integrated Building Management System (IBMS) integration with EverFocus products, solution for Energy Security, solution for Remote Monitoring of Education/ Exam Centres, solution for Mobile Surveillance. The event was an excellent platform that enabled EverFocus and participants to have face to face
conversations and understand the features and bene�its of integrating third party partner’s products with EverFocus Cameras. EverFocus had displayed a full range of IP Products and Mobile Solutions with live demonstrations thereby attracting majority of crowd toward this. Participating Partners like Axxon, Elcom, Energos, Intellivision, L&T, Milestone, QNAP and many more came forward to show the integration of their respective solutions with EverFocus Cameras. Session on case-studies was indeed fruitful. The event was comprehensively covered by our Media Partner “India Safe”. Participants were treated to some impressive livedemonstrations by EverFocus team and participating partners who showcased a variety of products such as IP Cameras, Mini-Dome Cameras, Speed Domes, Bullet Cameras, storage systems such as DVR’s, NAS,NVR’s and few more. Dr. Jessy Lee, Director of System Planning and Development Centre at Everfocus Taiwan said, “We hope that our partners will further take this forward and win projects together”. “It is our attempt to bring innovative new applications using EverFocus products and we hope our Channel Partners can help us to offer these to the end customers”, says Mr. Rajesh Solanki, Managing Director at EverFocus India addressing the event. Our Participating Partners were honoured with a memento titled “EverFocus One World 2013, Mumbai” & “Certi�icate of Participation” was taken home by all the participants. www.ind-safety.com
BUSINESS NEWS
OS+H Asia returns : 7th – 9th May 2014 at Suntec - Singapore The9th edition of The Occupational Safety + Health Exhibition for Asiawill be held on 7 – 9 May 2014, at Suntec Singapore.
62 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
O
S+H Asia is �irmly established as the region’s most important exhibition and the key business platform for all involved in occupational safety and health, providing a broad and comprehensive selection of new products, technologies, services and solutions applicable across diverse industries and sectors. The biennial exhibition remains unique in Southeast Asia and has recorded consistently healthy numbers of participation from both exhibitors and visitorssince its inception in 1998. OS+H Asia 2012, heldin September last year at the same venue, witnessed 163 exhibiting companies from 22 countries, for 5,918 quality trade professionals. This approximates a 20% increase for both exhibitors and visitors from the 7th edition in 2010, re�lecting the highest ever turnout in the exhibition’s history. “Moving beyond numbers, the steady expansion of OS+H Asia through the yearsis signi�icant of the growing demand in Singapore and the region for new and enhanced products for occupational safety and health. This reinforces the necessity of this exhibition as Singapore evolves as an industry leader in implementing and advocating workplace safety and health practices”, observed Shirley Lim, General Manager, Messe Düsseldorf Asia. To date, 3M SingaporePte Ltd,
BIS International Pte Ltd, Brady Corporation Asia Pte Ltd and QMT Industrial & Safety Pte Ltd number among those who have con�irmed their participation at OS+H Asia 2014, while several others have indicated their return from 2012. “I am extremely pleased to receive the fervent support of our returning exhibitors, manyof whom have been with us for a decadeor more. We are equally delighted to welcome �irst-time exhibitors, with full con�idence that they will reap the bene�its of this signi�icant exhibition.” Lee Ai Ling, Project Manager for OS+H Asia at Messe Düsseldorf Asia. Concurrent to OS+H Asia 2014 are important and strategic events by expert authorities for the industry. The Singapore WSH Conference 2014 (organized by Singapore’s WSH Council, Ministry of Manpower and WSH Institute) will feature for the third time together with OS+H Asia. Similarly, the IPAF Asia Conference 2014 (organized by the International Powered Access Federation) and the Forum on Workplace Safety and Health (co-organised by the Singapore Institution of Safety Of�icers and Messe Düsseldorf Asia) will make a return, adjacent to the exhibition. For more information, contact: OS+H Asia www.osha-singapore.com www.ind-safety.com
BUSINESS NEWS
CP PLUS launches WDR IP camera range in India
C
P PLUS GmbH & Co. KG, headquartered in Germany and world’s preferred electronic security brand, launches the extensive range of high de�inition WDR (Wide Dynamic Range) technology based IP cameras including CP-UNC-BP13CD (Box Camera), CP-UNC-TP13FL2CD (IR Bullet Camera), CP-UNC-VP13FCD (Dome Camera), CPUNC-VP13FL2CD (IR Dome Camera), CP-UNP-18D (PTZ Dome camera), CP-UNP-28D (PTZ Dome Camera) and CP-UNP-36D (PTZ Dome Camera). It is majorly observed in places where there are lot of variations in light levels such as retail shops where entrance doors with daylight outside and a darker indoor environment; parking entrance where vehicle entering a parking garage with daylight outside and inside low light levels. Similarly, city surveillance and transportation perimeter surveillance face great variations in light levels within the scene. In such situations, users demand for a surveillance solution, enabling them to identify persons, vehicles and activities in situations where there is a wide range of lighting conditions. The WDR feature in CP PLUS IP cameras feature allow the camera to capture both the dark and bright parts of an image and combines the differences to generate a highly realistic image representative of the original scene, enabling it to provide video quality close to the capabilities of the human eye. This function enables CP PLUS WDR IP cameras to be widely applicable in high contrast environments such as lobby entrances, parking lots, ATM, loading areas and much more. The CP PLUS CP-UNC-BP13CD (Box Camera), CPUNC-TP13FL2CD (IR Bullet Camera), CP-UNC-VP13FCD (Dome Camera), CP-UNC-VP13FL2CD (IR Dome Camera) adopts 1/3-inch 1.3 Megapixel PS CMOS sensor and advanced DSP technology, whereas CP-UNP-18D (PTZ Dome camera), CP-UNP-28D (PTZ Dome Camera) and CP-UNP-36D (PTZ Dome Camera) are built with 1/4” EXview HAD CCD to cope with challenging lighting conditions, resulting in producing superb color video even in the lowest of light. The new CP PLUS IP series supports simultaneous streaming of H.264, MPEG-4, and MJPEG video to provide both high-quality and bandwidth ef�icient compression formats. H.264 produces a small �ile size, making it useful
64 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
www.ind-safety.com
BUSINESS NEWS
for extended recording with high detail or for use in low bandwidth networks. MJPEG delivers excellent �ile integrity, ideal for situations which require extensive image detail. In addition, these new cameras support multiple independent streaming pro�iles, each with its own resolution, frame rate and codec. The vandal-proof and IP66-rated housing of the CP-UNC-VP13FCD (Dome Camera) and CP-UNC-VP13FL2CD (IR Dome Camera) enables users to easily build a cost-effective IP surveillance system without additional accessories. Its metal vandal-proof housing effectively provides robust protection from vandalism. Meanwhile, the IP66 integrated housing shields the camera from dust and water, allowing it to be applied in the harsh weather conditions of outdoor environments. In addition, the focal lens ranges from 2.8mm to 12mm of CP-UNC-TP13FL2CD, CP-UNCVP13FCD and CP-UNC-VP13FL2CD, satisfying the wide range surveillance applications. On the other side, the CP PLUS PTZ under IP range features sophisticated pan/tilt mechanism, providing fast, precise movement with continuous 360-degree pan and 90-degree tilt. Users can easily control the lens position via a mouse or a joystick to track the object of interest in and set up to 255 preset positions for patrolling. CP-UNP-18D (PTZ Dome camera), CP-UNP-28D (PTZ Dome Camera) and CP-UNP36D (PTZ Dome Camera) have 18, 28 and 36 high-speed optical zoom respectively. In India, Aditya Infotech Ltd. is an exclusive distributor partner of CP PLUS GMBH & Co. KG, Germany for their brand CP PLUS. AIL has been aggressively distributing and marketing entire range of CP PLUS surveillance Cameras, Digital Video Recorders (DVRs), VDP, Time & Attendance, Intelligent Home Automations and allied accessories in India. Aditya Infotech Ltd (AIL) is a leader in introducing video security and surveillance brands in India and has an expertise in designing solutions on the basis of the needs.
s High-Performance TI DaVinci series DSP (CPUNC-BP13CD, CP-UNC-TP13FL2CD, CP-UNCVP13FCD and CP-UNC-VP13FL2CD) s H.264 and MJPEG dual-stream encoding (CPUNC-BP13CD, CP-UNC-TP13FL2CD, CP-UNCVP13FCD and CP-UNC-VP13FL2CD) s 25 / 30fps@1.3M (1280×960) / 720P (1280×720) / D1 (704×576/704×480) Image Resolution (CP-UNC-BP13CD, CP-UNCTP13FL2CD, CP-UNC-VP13FCD and CP-UNCVP13FL2CD) s 2.8~12mm varifocal lens (CP-UNCTP13FL2CD, CP-UNC-VP13FCD, CP-UNCVP13FL2CD) s IR Range of 20 Mtr. (CP-UNC-VP13FL2CD) s WDR, Day/Night(ICR), 2DNR, AWB, AGC, BLC (CP-UNC-BP13CD, CP-UNC-TP13FL2CD, CPUNC-VP13FCD and CP-UNC-VP13FL2CD) s Supports PoE (IEEE802.3af) (CP-UNCBP13CD, CP-UNC-TP13FL2CD, CP-UNCVP13FCD and CP-UNC-VP13FL2CD) s Built-in 1/1 alarm in/out (CP-UNC-BP13CD, CP-UNC-TP13FL2CD, CP-UNC-VP13FCD and CP-UNC-VP13FL2CD) s Built-in Web server s Mobile Surveillance Software; CMS (IPSS) s 1/4” EXview HAD CCD (CP-UNP-18D, CPUNP-28D, CP-UNP-36D) s Powerful 18x optical zoom and 12x digital zoom (CP-UNP-18D) s Powerful 28x optical zoom and 12x digital zoom (CP-UNP-28D) s Powerful 36x optical zoom and 12x digital zoom (CP-UNP-36D) s 25/30fps@D1(4CIF)/ CIF/VGA Resolution (CP-UNP-18D, CP-UNP-28D, CP-UNP-36D) s Max 300 °/s pan speed, 360° continuous pan rotation (CP-UNP-18D, CP-UNP-28D, CP-UNP36D) s Build-in 7/2 channel alarm input/output (CPUNP-18D, CP-UNP-28D, CP-UNP-36D) s Micro SD memory, IP66 (CP-UNP-18D, CPUNP-28D, CP-UNP-36D)
CP PLUS WDR based IP Cameras:-
1/3” 1.3 Megapixel PS CMOS image sensor (CPUNC-BP13CD, CP-UNC-TP13FL2CD, CP-UNCVP13FCD and CP-UNC-VP13FL2CD)
66 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
www.ind-safety.com
BUSINESS NEWS
Dahua technology releases Next-Generation NVR series in India
s
D
ahua Technology releases powerful and nextgeneration 128 Channel Super Network Video Recorder (DHNVR6000/6000D/6000DR) that is intelligently designed to satisfy demands of highly wide areas that can record up to 128 network cameras. Aiming to meet the highcapacity storage needs, Dahua Super Series NVRs are the ideal solution for wide locations like ports, military land, prisons, power plants, airports etc. Equipped with Intel® Core™ i5 Processors, the new Dahua NVRs enable simultaneous recording and remote access to live images across the full range of 128 cameras. Scheduled and triggered recordings can be performed at a resolution of D1 with 128 cameras recording. The two models (DH-NVR 6000D/6000DR) is built with monitor, enabling users to view videos on the NVRs only, hence eliminating the need for a separate PC or monitor to view video from the unit.
68 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Designed with reliability, the new Dahua NVR series provides performance enhancement and fault tolerance by employing RAID 0/1/5 disk management, supported with 16 hot-swap SATA Hard drives. In addition to supporting Dahua Network Cameras, the NVR range also supports third-party IP cameras from major network cameras manufactures to offer customers more versatile video solutions. Furthermore, the NVR range provides web-monitoring and management GUI, which enables users to conveniently monitor anytime, anywhere.
Dahua DH-NVR6000/ 6000D/6000DR NVR
s Max 128ch IP cameras connection s Up to 32 channel HD realtime transmission s up to 128 channel@D1, 64 channel@720P, 32 channel@1080P realtime recording s Up to 6-screen output: 6 HDMI
s s s
s
s
s s s
sync output/1 VGA+5 HDMI sync output (Default: 2 HDMI) Support 16 hot-swap SATA HDDs to better its scalability and �lexibility Support RAID0/1/5 (optional) Human-oriented Dahua UI Compatible with Dahua SDK and seamless integrated to other platforms Support Multi-brand network cameras: Dahua, CPPLUS Arecont Vision, AXIS, Bosch, Brickcom, Canon Dynacolor, Honeywell, Panasonic, Pelco, Samsung, Sanyo, Sony, Videosec, Vivotech and etc. ONVIF Version 2.0 conformance Redundant power supply module adopted (DH-NVR6000DR) Front LCD display (DHNVR6000D/DH-NVR6000DR)
About Dahua Technology:-
Dahua Technology Co. Ltd. is a professional manufacturer in the security and surveillance �ield. Over the past 15 years, development, Dahua Technology has been fully experienced in research and design of cutting-edge technology surveillance equipments. Both hardware and software are modular-designed with �lexibility for different con�igurations, various scales of applications and future expansion. www.ind-safety.com
'JSF 3FTJTUBODF 4BGFUZ $BCJOFUT GPS 'MBNNBCMF 1SPEVDUT
4FMG DMPTJOH EPPS T
XJUI UIFSNP GVTF
/PSNBMJ[FE -BCFM
1FSGPSBUFE DPWFS QMBUF GPS CBTF USPVHI
"EKVTUBCMF 4IFMG
"QQSPWFE
1FEFTUBM BSFB VOEFS EFSJWBCMF CZ B BGPSLMJGU
NJO
BDDPSEJOH UP &/
"EKVTUBCMF MFWFMMJOH MFHT
8IBU .BLFT i&DPTBGFw 3FBMMZ 4BGF &DPTBGF &/ "QQSPWFE $BCJOFU
'. 04)" "QQSPWFE $BCJOFU
$PNQMJBODF UP &/ MBUFTU TUSJDU OPSNT
/PSNT OPU TUSJDU NBJOMZ VTFE GPS JOEVTUSJBM DBCJOFUT
"QQSPWFE รถSF SFTJTUBODF GPS NJOVUFT
'JSF SFTJTUBODF GPS NBY NJOVUFT
.BEF GSPN )JHI 1SFTTVSF -BNJOBUF )1- XJUI UIFSNBM FYQBOEJOH TFBM
.BEF GSPN %PVCMF 8BMM 4UFFM XJUI HSJE PO UIF WFOUJMBUJPO UIBU TUPQT UIF รธBNFT CVU OPU UIF IFBUJOH
$PNQVMTPSZ 4FMG DMPTJOH EPPST GVTF MJOL XIJDI DMPTFT BU EFH $ 0QUJPOBM 4FMG $MPTJOH EPPS GVTF MJOL XIJDI DMPTFT BU EFH $ "VUPNBUJD DMPTJOH PG UIF WFOUJMBUJPO JG 5ยก SFBDI ยก$
(SJE GPS TUPQJOH รธBNF BOE OPU IFBUJOH
'JSF QSPPG JOTVMBUFE QBOFM XIJDI SFTJTU IFBU DPOEVDUJPO GSPN PVUFS XBMM UP JOOFS XBMM
%PVCMF XBMM JO TUFFM XJUI UIFSNJD CSJEHFT UIBU DPOEVDUT IFBU UP JOOFS XBMM PG UIF DBCJOFU
EVENT PROFILE
National Fire Service Day by FSAI : A true recognition to the bravery of firemens
T
he fourth consecutive year, we started our new �inancial year with our �irst event by paying homage and tribute to the brave �ire-man of India on 14th April 2013 being observed as National Fire Service Day. We as a Fire & Security Association of India (Gujarat Chapter) had associated with Ahmedabad Fire & Emergency Services for the Event on 14th April 2013 to pay homage & tribute to the Fire-Of�icials of our Country who have laid down their lives for us & our Nation. The Programme was held at Memnagar Fire Station Ground & was inaugurated by Ahmedabad Mayor Shri. Asit Vora alongwith Dy Mayor-Ahmedabad Smt Darshnaben Vaghela, Chairman Standing Committee Shri Bhupendra Patel, Ahmedabad Municipal Commissioner Shri Guruprasad Mohapattra, & other dignitaries from Ahmedabad Municipal Corporation & Ahmedabad Fire & Emergency Services. Live demonstrate of Fire & Rescue was held during the event which was attended by more than 10,000/people of Ahmedabad City. On this Occasion we at FSAI-Gujarat Chapter paid tribute to 10 Fire of�icials by awarding Cash-Voucher to the selected Fire Of�icials who have rendered their sel�less services to save human life & property of Ahmedabad City & Gujarat State during last year. The selection of the same has been done by Ahmedabad Fire & Emergency Services. This award were Sponsored by M/s Ramana Safety & Systems I Pvt. Ltd., We are thankful to Ahmedabad Chief Fire of�icer Mr. M. F. Dastoor for giving us all the support in this event. We are thankful to all the FSAI Gujarat members who were being present for the event. We are also thankful to our Sponsorer for their support. The Fire and Security Association of India (FSAI) is the trade body and a chamber of commerce of the Fire Protection, Safety and Security Engineering services industry in India. This Association is a NonPro�it Organization representing Electronic and Physical Security and Fire Product Manufacturers, Speci�iers,
70 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Installers, Integrators and Service Providers. Constituted in the year 2002, Fire and Security Association of India is the largest organization with more than 1500 + members, forming an integral part of the Association from different parts of the country. FSAI is a nonpro�it making organization which aims to establish Life Safety and Security as an important human obligation in the economic development of the country. Headquartered in Chennai, and having 11 chapters across the country in Mumbai, Delhi, Bangalore, Chennai, Hyderabad, Kochi, Gujarat, Pune, Kolkata, Coimbtore & Vishakhapatnam Chapter. The Association is active at various levels – from Individual Practitioners to Organizations, Government Bodies and Media Houses. FSAI take pride in being partners with the Central and State Government bodies in formulation and implementation of safety and security policies. FSAI organizes various Networking Meets across the country to enable all Industry Professionals to meet under the same roof and strategize market reach and approach in a uni�ied manner. FSAI offer opportunities to connect with Experts and Heads of Government Agencies by inviting them as special guests for these Networking Meets. FSAI has a history of partnering with organizations that share a vision of a safe and secure India and hence with the assistance of sponsors we give them a unique experience of being part of public/ private awareness Campaigns.
FSAI –Gujarat Chapter
FSAI – Gujarat Chapter have organized various seminars about Fire and Technology and Network Meets / Workshops Also completed 20 Schools awareness programmes on Fire & Safety in Gujarat with covered around 23000 students from various schools. We at FSAI Gujarat Chapter have planned to conduct this year 4o schools awareness programmes . www.ind-safety.com
EVENT PROFILE
National Fire Service Day Event at Ahmedabad - 14 April 2013
www.ind-safety.com
INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
71
EVENT PROFILE
FIRE AND SECURITY ASSOCIATION OF INDIA FSAI –Gujarat Chapter FSAI – Gujarat Chapter have organized various seminars about Fire and Technology and Network Meets / Workshops Also completed 20 Schools awareness programmes on Fire & Safety in Gujarat
with covered around 23000 students from various schools. We at FSAI Gujarat Chapter have planned to conduct this year 4o schools awareness programmes .
Shri Pankaj Dharkar – President, Fire & Security Association of India
Shri Nimit Sheth - Secretary, FSAI, (Gujarat Chapter)
Mr. Pankaj Dharkar is an Engineering graduate of 1980 batch with distinction and Specialization in Air-conditioning and Refrigeration. He is working as an MEP Consultant, heading M/s Pankaj Dharkar & Associates, having of�ices at Ahmedabad, Mumbai, Delhi, Surat, Indore, Chennai & Bangalore. PDA venture came into existence from 6th Sep 2006.During his rich experience of 32 Yrs in the �ield of MEP, he has to his credit, of designing & installation of more than 2850 Projects.
Mr. Nimit Sheth is a Post Graduate in Management with Diploma in International Trade. Presently he is Secretary – Fire & Security Association of India (Gujarat Chapter) & Managing Director of Ramana Safety & Systems India Pvt. Ltd. He is a competent Consultant, Surveyor and Auditor in the �ield of Fire-Protection & Emergency Evacuation. He is Chartered Member of NFPA, FSAI, Gujarat Safety Council, National Safety Council. He has done Consultancy & have conducted Survey and Audit for various Government Org., Psu’s, Institute, Industries & Corporate for their �ire-protection, emergency evacuation & safety-security hazards.. He has presented papers on various Fire-SafetyEmergency Evacuation Technologies in various conference, seminars, magazines & newspapers. For more contact : Email:- nsheth@ramanasafety.org, Mobile - +91-9825017827
72 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
www.ind-safety.com
EVENT PROFILE
The CAO & FM Roundtable 16th Feb - 2013, Channai, Hyatt Hotel
Mr. Manish Gokhale talking on Energy Ef�iciency
Dr. Mahendra Raju, Additional PF Commissioner, the Key Note Speaker
Esteemed Panel Members
74 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
A
lliance of Infrastructures & Facility Managers (AIFM) of India is a self sustaining body recognized nationwide for its meaningful role in the Infrastructure & Facilities Management Community. The members of AIFM have the capacity of sharing expertise with other facilities management professionals nationwide. AIFM’s initiatives in India includes Conferences, FM Meets, Workshops, Research, Training, Education, White Paper’s, FM Memberships, Vendor Memberships etc. to name a few. AIFM organized a successful meet for the Facility & Admin Mangers from Chennai & Southern India in The Hyatt Regency, Chennai on 23rd Feb 2013. The conference was well attended by more
than 75 senior Facility & Admin professionals, and was appreciated by one & all for the Knowledge that was shared, and the discussions that took place during the conference. The Keynote speaker, Dr. Mahendra Raju, Additional PF Commissioner for 11 States in Eastern India, spoke about how the Facility Management function is becoming a Strategic role in the corporate sector, and also the support Government is ready to lend for the development of the function. The conference had senior speakers from Cholamandalam Group, Mphasis an HP Company, Tata Consultancy Services, Cushman & Wake�ield, Schneider Electric, Godrej Interio, Frost & Sullivan etc. to name a few. For further details on AIFM and its initiatives in India E-mail : mandeep.wasu@aifmi.in Website : www.aifmi.in
Esteemed Panel Members
Senior FM’s all ears to the Knowledge being shared
www.ind-safety.com
FROM FIGHTING BLAZE
TO SAVING
ENERGY , OUR PUMPS AND SYSTEMS ARE THE
MASTERMIND. Xylem is a world leader in producing efficient pumping systems. The newly introduced Lowara fire fighting booster sets come with European Standard EN 12845. Each set, fitted with Lowara pumps, provides greater reliability to meet the requirements of fixed fire sprinkler systems. Bell & Gossett HVAC Packaged Systems serve several applications in the residential and commercial building sectors. They are trusted for their reliability, flexibility and maximum energy savings.
JUICE/03-13
Lowara l Bell & Gossett l Sanitaire l A-C Fire Pump
www.xyleminc.com, www.xylemindia.in indiasales@xyleminc.com, indiaservice@xyleminc.com Call: +91 9974803861
TECH UPDATE
Identification using Finger Vein Pattern
F
inger vein authentication is a new biometric method utilizing the vein patterns inside one’s �ingers for personal identi�ication. Finger vein authentication veri�ies a person’s identity based on the lattice work of minute blood vessels under the skin. Vein patterns are different for each �inger and for each person. Further as they are hidden underneath the skin’s surface, forgery is extremely dif�icult. These unique aspects of �inger vein pattern recognition set it apart from other forms of biometrics.
About Author Kiron Kunte has over 35 years of design and solutions experience, in Security, Telephony and Networking infrastructure. He is a graduate of IIT Bombay, a Fellow of the Institute of Engineers and has a post-graduate diploma, from Bombay University, in Systems Management. He is professionally certi�ied in the design and engineering of Data Centres, IP Telephony, Video surveillance and Structured Cabling solutions. He heads Norik Konsult, a practice that offers advisory, design and system planning help to upgrade or build a new Telephony, Security and Networking infrastructure. For more information contact: www.norikkonsult.com
76 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
The Principle
Vein authentication uses the vascular patterns as personal identi�ication data. Veins and other subcutaneous features in the human hand present large, robust, stable and largely hidden patterns. The deoxidized haemoglobin in the vein absorbs light having a wavelength in the nearinfrared area. When an infrared ray image is captured only the blood vessel pattern containing the deoxidized haemoglobin are visible as a series of dark lines. Based on www.ind-safety.com
TECH UPDATE
this feature, the vein authentication device translates the black lines of the infrared ray image, and then matches it with the previously registered pattern of the individual. The pattern of blood vessels is captured by transmitting near-infrared light at different angles through the �inger. The light is partially absorbed by haemoglobin in the veins and the pattern is captured by a camera as a unique 3-D �inger vein pro�ile. This is turned into a simple digital code which is then matched with a pre-registered pro�ile to verify an individual’s identity. Even twins are said to have different �inger vein patterns! Because the veins are inside the body, invisible to the eye, it is extremely dif�icult to forge and impossible to manipulate. The gruesome possibility that criminals may hack off a �inger has already been discounted as the blood would �low out of a hacked off �inger, making authentication impossible.
The Technology
Capturing the image Finger vein recognition works by shining invisible nearinfrared light through the �inger. The infrared light is absorbed by the haemoglobin of the blood in the veins. Since haemoglobin strongly absorbs infrared light, the best images are obtained by shining light through the �inger. The light source is placed above the �inger, with the sensor below as seen in �igure 1. The result is an image of the unique pattern of veins which can be captured by a sensor placed below the �inger.
Fig. 2 Typical �inger vein reader For some applications users may prefer to place their �inger on the device rather than inside the device. In such a case a “side-illumination” technique is employed as can be seen in �igure 3. This technique combines the advantages of using transmitted light with the advantage of having an open and user friendly device (�igure 4).
Fig. 3 The side-illumination technique
Fig. 1 Capturing the �inger vein pattern
78 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Such a device could be incorporated into a wide range of applications. To enable the �inger vein device to cope with a wide variation in �inger size and operating environment the light source intensity is adjusted www.ind-safety.com
TECH UPDATE
adaptively. This enables the optimisation of image contrast and detail, and the minimisation of noise — an important issue due to the very high sensitivity of the image capture CCD.
Fig. 4 Typical Embedded Finger Vein reader
Authentication
There are four stages in �inger vein authentication: s Capture of the �inger vein image pattern s Normalisation of the image s Feature pattern extraction from the image s Pattern matching and outcome decision
Figure 5 shows a block diagram of these stages. In stage 1 the sensor captures �inger vein images, as described above, and passes them to the CPU memory. The CPU in turn dynamically adjusts the brightness of the infrared LED to optimise the image quality. In stage 2 the �inger vein image is normalised to accommodate geometric changes in position or angle of the �inger. This is done by detecting the outline of the �inger in the image, and rotating the entire image to normalise the slope of the outline. Distinctive features of the �inger vein pattern are extracted in stage 3. This is an essential step for eliminating variations in the captured data due to changes in body metabolism or imaging conditions. The result is a standard �inger vein template which is suitable for passing to the matching algorithm. In stage 4 the captured �inger vein template is matched against a previously stored reference template. If a suf�iciently close match is found then the user is authenticated. In the example above, the reference template is stored in a smart card. If a capable enough smart card is used then the matching can take place on the card itself. Alternatively, the reference templates can be stored in the �inger vein device itself or on an attached PC, or elsewhere on the network.
Figure 5 Block diagram of �inger vein authentication
80 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
www.ind-safety.com
INDUSTRIAL SAFETY REVIEW
81
APRIL 2013
TECH UPDATE
The authentication unit includes a CPU core for all sorts of signal processing, video I/O for capturing data from the image sensor, LED power controller, and I/O controller. The authentication outcome �lows through the I/O controller. Security applications such as door locking are activated by the signal from the controller.
Features – Advantages
Finger vein authentication technology has several important features that set it apart from other forms of biometrics as a highly secure and convenient means of personal authentication. s Resistant to criminal tampering: Because veins are hidden inside the body, there is little risk of forgery or theft. Involves live body identi�ication hence a dead persons �inger will not be authenticated. s High accuracy: The ‘False Rejection Rate’ (FRR) is less than 0.01% for the, the ‘False Acceptance Rate’ (FAR) is less than 0.0001% and the ‘Failure to enrol’ (FTE) is 0%. s Unique and constant: Finger vein patterns are different even among identical twins and remain constant through the adult years. s Contactless: The use of near-infrared light allows for non-invasive, contactless imaging that ensures both convenience and cleanliness. s Ease of feature extraction: Finger vein patterns are relatively stable and clearly captured, enabling the use of low-resolution cameras to take vein images for small-size and simple data image processing. s Fast authentication speed: One-to-one authentication takes less than one second. Moreover, the authentication device can be compact due to the small size of the �ingers.
Technology Acceptance and Trends.
Finger vein products have been successfully adopted by major corporations in the �ields of �inancial, physical and logical security in Japan and other parts of Asia. In Japan, �inger vein
82 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
products have enjoyed great success in the �inancial sector. Physical security systems (standalone or connected by server and used with a smartcard, PIN code or by itself) have also sold widely in Asia. Large buildings that house multinational �irms have adopted �inger vein technology for biometric entry access. Trends Beyond embedded applications for portable IT devices such as cellular phones, �inger vein authentication will in the future likely expand into applications such as opening automobile doors with a simple grip of the handle. This technology will be applicable to home, of�ice or car doors and will usher in a secure future without keys. The expansion of �inger vein authentication applications is the miniaturization of this technology. Miniaturization enables �inger vein authentication technology to be embedded in a greater variety of devices and is thus the driving force behind the expansion of �inger vein authentication applications. One of the principal mechanisms behind miniaturization of �inger vein authentication technology is the miniaturization of the image sensor.
Conclusion
s Some biometric characteristic like �ingerprints are volatile or not fake resistant. s In some, the collection is not user friendly. s Finger vein recognition is not volatile. It is also fake resistant and user friendly. s The unique aspects of �inger vein pattern recognition set it apart from other forms of biometrics. s Finger vein authentication is less expensive than iris scanning or face/voice recognition. s The false rejection rate is much lower than with �ingerprints. s Finger vein recognition outperforms both �ingerprint and iris scan recognition systems in the aspects of high security and reliability. www.ind-safety.com
TECH UPDATE
National Fire Services Day
T
he motto of Fire Services asserts “ WE SERVE TO SAVE.” A translated idea of original motto in Sanskrit that is “ TRANAY SEVA MAHE.” Based on this motto there are three priority wise objective concepts. s Primary Objective: SAVING LIFE. s Secondary Objective: SAVE National and Public PROPERTY. s Tertiary Objective: Salvage and Preservation. 1) Primary Objective : SAVING LIFE. This is the most essential part of Fire Service, which requires personnel to be well trained. In case of �ire the SMOKE evolving from �ire that is the main culprit for taking toll of life contrary to the �ire itself. It is the SMOKE that kills �irst by asphyxiating. Fire Service personnel are vigorously trained to withstand HOT and HUMID conditions full of SMOKE as found in �ire �ighting situations and to search for casualties by following proper SEARCH PROCEDURE methods. Modern technology has given products like PVC, FOAM textiles and furnishings that evolve noxious smoke, which have toxic effect. They are a boon for human comforts but if catch �ire they prove as instant killers. Apart from Fire Service there are disasters, building collapse, drowning rescues etc that require immediate life saving.
property. In order to check this loss Fire Service has to keep abreast of latest technological developments in �ire-�ighting so as to curb and check this damage. There are different wings and training programs teaching practical �ireman-ship for mitigating �ire loss. Uttar Pradesh Fire Services takes care to extinguish �ire at its seat such that property does not get spoiled or damaged because of water used by the Fire Service for �ire �ighting. 3) Tertiary Objective : Salvage or preservation Humanitarian services and salvage services. Services like Ambulance service; offering First Aid helping humans’ and animals in distress to
safety are provided by Uttar Pradesh Fire Services. At the �ire scene a wing is busy in preserving property from �ire, smoke and water due to �ire�ighting. They remove un-burnt property away from �ire, provide drainage arrangements and do not allow water logging on �loors, ventilate etc. Every Year 14th April is observed as Fire Service Day in India as a part to pay homage to those brave Fire Fighters, who sacri�iced their live in line to their duty on 14th April, 1944. Industries observe this day / week as Fire Service day / Week and conducts Training, Drills and Rehearsals to demonstrate the Preparedness to combat emergencies. The Ship in which accident took
2) Secondary Objective : SAVE National and Public PROPERTY. Fire and Smoke damage and destroy immense National and Public
84 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
www.ind-safety.com
TECH UPDATE
place named S S Fort Stikine having capacity of 7000 Tons belonged to Ministry of War and Transport. The ship left Birkinhead – UK on 24th February, 1944. Convey of 20 other ships with cargo for Karachi and Bombay was loaded. The Karachi Cargo Contained RAF Planes, General Stores, Explosives and Ammunitions. Bombay Cargo was 1395 Tons of Explosives and Ammunitions and Service Stores. The ship reached Karachi on 30th March, 1944 where a part of Cargo was discharged, leaving void 2, 86,000 cu. Feet in her hold. The new Cargo loaded was cotton, timber, lubricating oil, resin, sulphur and other combustible material. The ship then left Karachi on 9th April, 1944 and reached Bombay on 9th April, 1944. No explosives or ammunition were off loaded until the ship has been alongside for 24 hours. ACCORDING TO THE BYE LAWS OF B.P.T [ Bombay Port Trust]
s A Ship carrying explosives is not allowed into docks, but under Rule 88 of the Defense of India Rules, this Bye-Law is suspended in case where Military Of�icer has given a Certi�icate of “GRAVE EMERGENCY”. Such a certi�icate was issued for S S Stikine The ship was anchored at Victoria Dock Bombay and the Memorable Day, throughout the morning, she was active as cargo hooks swayed a load of commodities from the S S Fort Stikine. Firemen were at Fire Stations as usual shining their brass to keep their �ire engines shining.
On 14th April, 1944, at 1400 hrs A Whiff of smoke noticed from No.: II hold of the ship. Frantic series of short blast of whistles were heard warning of �ire board. The ship crew started pouring musky water
86 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
in the ship hold. Fire Engines from Alexandra Dock and Air Force Squad arrived immediately and started hose streams in smoking hold to control �ire spread. The �iremen though aware of the dangerous situation, there was no panic. The prompt arrival of the Fire Engines seemed no reason to think that the �ire could not be controlled. Soon it became apparent that the �iremen were loosing ground. A call was put through to Mumbai Fire Brigade control for Additional appliances. At 14.30 hrs, a large part of Fire Service was on pliers. Total 32 Water Jets came into action pouring gallons of water into ship hold to quench the �ire. The Fire was still gained. There was something preventing the water from reaching the seat of �ire. The deck head under the �iremen’s feet grew hotter and hotter. The water stream played over the deck head turned into steam. It was now clear that the �ire was out of control. Slides and Deck became CHERRY RED, blenching thick black and brown smoke. Flames shot mast high but sound never reached �iremen’s ear. 1605 Hrs. ~ Ground Rumbled and EXPLOSION, S S Fort Stikine Blew Up with its gallant �iremen and �ire engines disappeared from the face of earth. No. of ships destroyed nearby. At one stroke, the key port of Bombay was taken out of war.
1636 Hrs. ~ SECOND EXPLOSION, Explosion was heard miles away. Entire Dock upto few kms was in �lames. 14 other ships standing aside destroyed. 336 people burned. All nearby/around people and animals died. Many Fire Fighters died or disabled. The Number of persons who died in the Explosion will never be known and �igures are con�licting. NFPA Handbook listed
731 dead whereas other sources said 1500 Died/Missing and more than 3000 Injured. Couple of months after the Disaster, 3083 people had requested claims for damage by Fire or Explosion to their property. 11735 had put up Claim for uninsured properties. 466 Uninsured people claimed as compensation for personal injuries. The Compensation paid out 850 Lakhs as damage by �ire/explosion. Marine Insurance was 150 Lakhs. Paid for uninsured properties was 300 lakhs and personal injuries was 13 lakhs with miscellaneous policies of 4.5 lakhs. Government of India declared this day of 14th April every year to be observed as Fire Service Day in recognition of the valor and sacri�ice of the courageous FIRE FIGHTERS who laid down their lives in Line of their Duty. Industries conduct Fire Fighting Training Mock Drills, Fire Drills or Emergency Drills every year on this day to pay homage and create awareness and knowledge about handling emergencies in their fellow workers. Fire Service observes Fire Service Day on 14th April every year to commemorate the Fire Service Personnel who laid down their lives during public service. The message of �ire prevention is carried to the public by means of demonstrations, �ilm shows, Cultural Programs, distribution of pamphlets, Seminar and lectures. The help of mass media like �ilms, television, Radio and newspapers plays an important role in the successful execution of FIRE PREVENTION MESSAGE. Fire Service Department also organizes lectures/ demonstrations in schools and colleges and in Places where the management requests on �ire prevention. Fire prevention education plays a VITAL role in saving the lives and property of people. www.ind-safety.com
TECH UPDATE
AVP Solutions: Changing the dynamics
A
Mr. Ajitabh Puri - Director, AVP Solutions - India
88 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
VP Solutions, a leading provider of automation and security products, was setup on the belief of providing world-class services globally. Since its inception AVP has grown and has always kept its customer’s trust and exceeded their expectations. Our unmatchable IP based range of product which includes IP cameras, NVR, Storage solutions clubbed with remarkably experienced team is committed to safeguard your family, business and assets. We have been serving our clients for over a decade and have served from individual customers for home security to biggest corporate giants. We have come a long way in terms of technology updates. We have 100% customer satisfaction ratio and our trademarked solutions have no competition. We have experience and well trained staff which keeps your premises under scanner 24/7. Our company is built on strong corporate values with no gimmicks or a salespitch. We have several USPs which make us different from others in the market and help us in maintaining the chief position in the market today. 1) Exclusive Range of IP Cameras – Full Range of Products – FIXED, ZOOM, PTZ. We have Real-time Cameras which function without any gaps or jumps in recording in the following resolutions – CIF, 2CIF, D1, 4CIF, 720P, 1080P, 1.3 MEGAPIXEL, 2 MEGAPIXEL, 3 MEGA PIXEL, 5 MEGAPIXEL, 8 MEGAPIXEL.
2) NVR – NVR stands for network video recorder. WE at AVP have dedicated Hardware based NVR’s which do not require any software for recording and do not run on Windows. We insure full resolution recording on these devices and are built for 24X7X365 operation, Worry and Stress Free. Again we have a variety of NVR’s – 4, 8, 16, 32 upto 400 Channels, these systems come with built in storage space of 2 Hard Disks to 16 Hard Disk with each Hard Disk upto 4TB. We even have Dedicated HD Recorders built just for HD Recording. If you are tired of your windows based recording software crashing, use our standalone hardware NVR which are meant for 24x7x365 operation.
3) Extra Storage for Recording – In today’s date with the Higher Resolution Cameras internal storage is not enough to record in Megapixel at real-time for a longer time therefore our Systems come with ESata port which can daisy chain additional 4 Hard Disks of 4TB externally yet physically be connected to the NVR. If however more storage is required then we have Network Storage Device (NSD) which can accommodate 16 Hard Disks of 4 TB each. This device can be on the same network or a remote network located anywhere even away from the NVR or IP Cameras. NSD can also perform as a mirror backup onsite or offsite in a remote location. www.ind-safety.com
Holiday Inn Resort, Goa Wednesday 8 - Friday 10 May 2013
,17(*5$725
/($'(56+,3 6(5,(6
1HWZRUN ZLWK ,QGLD¶V OHDGLQJ
6HFXULW\ 6\VWHP ,QWHJUDWRUV
The Inaugural Integrator Leadership Series, scheduled from 0D\ at Holiday Inn, Goa is the most LQÀXHQWLDO SODWIRUP WR HQJDJH ZLWK FRXQWU\¶V WRS 6LV 7KH VXPPLW HQDEOHV \RX WR HVWDEOLVK UHODWLRQVKLS ZLWK key decision makers, giving them an opportunity to H[SHULHQFH WKH ODWHVW LQQRYDWLRQV LQ WKH VHFXULW\ LQGXVWU\ )XOO\ KRVWHG ,)6(& ,QGLD ZLOO VSRQVRU WKH DLU WUDYHO DQG ¿YH VWDU DFFRPPRGDWLRQ RI DOO LQYLWHG 6LV (QKDQFH \RXU FRPSDQ\¶V LPDJH DQG SUHVHQFH DW the Integrator Leadership Summit through different VSRQVRUVKLS RSWLRQV For more information: visit ZZZ LIVHFLQGLD FRP or &RQWDFW 3UDVKDQW %DKO 6DQMHHY 5DR : 1LYHGLWD $GKLNDU\
Organised by
Produced by
INDUSTRIAL SAFETY REVIEW
89
APRIL 2013
TECH UPDATE
4) Software For Central Monitoring – Our Software is uni�ied for all our products. Unlike our competitors we do not have separate software for IP Products. Our Free central monitoring software can monitor all types of products from our basket – IP Cameras, NVR, DVR, NSD, Network Displays, Esata, Encoders, Decoders, Video Matrix and more. Our Software does not require a per channel license and has features such as active health reports and alarms with pop up as con�igured. Has EMAP function, has remote con�iguration function to control all backend functions of the devices and their upgrades. Our software can also directly import recording from any device directly in AVI format which once burned on a CD can be played on any DVD player in the world. Competition charges per channel license, does not have so many features and lacks importing into a universal format like AVI 5) Software for Video Analytics – this is our paid software with a per channel license for recording and Advance Video Analytics. Our charges are lower and algorithms are strong from others.
6) Decoders/Encoders – These are devices which convert IP Video from cameras to Analog Channel, required when the video feed needs to be connected to another sources or into a third party outdated video matrix. Also used in Central Monitoring Stations when single camera needs to be connected on a single display. Encoders convert analog cameras into IP so if you have good analog cameras already installed then just use encoders to get upto date. 7) Video Matrix – Central Monitoring Control Rooms not only require software for workstations to monitor and control but also hardware to have dedicated devices on larger screens. Our Video matrix is scalable and can take multiple formats/forms of input signals. One matrix can be used to get feed from NVR, IP Cameras, DVR, Encoders/Decoders, HDSDI cameras and DVR and many more.
90 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
8) OEM – Being an Original Equipment Manufacturer helps us customize products for large scale projects.
Our wide variety IP Cameras, uni�ied solution and �lawless recording facility make us the best choice in the market. AVP has been in the market longer than 90% of the competitors and understand market requirement and client’s expectations. Our strong research and development team leaves no stone unturned and has been continuously developing solutions well before our OEMcompetitors. Our professional team has always listened to its client requisites and delivered unparalleled solutions. Our presence in Pan India, Nepal, UK, UAE, Singapore, with Professional Engineers and Dedicated Project Managers make us reliable company for big corporation who have of�ices across the globe and want a uni�ied company who can handle their security globally. Our dedicated Project Managers make your experience unique wherein we assign one person to you for all of your pre-sales and postsales queries and support. If you are tired of your security service provider not performing service for multiple cities and if they are hard to reach then we have a solution, with a dedicated person assigned to you who will listen to you, line up solutions for you and support throughout plus make a Service contract for your satisfaction. Above all we put our customers. We work till you are satis�ied and make your experience like never before. Honesty, forthrightness and trust are few of the values we abide by and our company is built upon. We have been the leader and always have come up with new technology before any of our competitors. Robust Research and development team, highly quali�ied professionals, unmatched solutions, strong background and �inancials make us a highly pro�icient organization which keeps your house and of�ice under your eye all the time so that you can sleep well. We thank you our clients for making us a brand we are today and promise to deliver the best all the time and exceed our client’s expectations so you live a stress-free secure life. www.ind-safety.com
TECH UPDATE
Biocon secures its R&D facility with Solus
B
iocon is an emerging global biopharmaceutical enterprise headquartered in Bangalore. Its product and research services range from pre-clinical to clinical development through to commercialization. It has markets in India and abroad ranging from US to Europe. With an employee strength of nearly 6000 and presence across multiple locations in India, Biocon indeed needed hi-tech electronic security solutions for itself.
Need - Problem Scenario Analysis
Biocon’s existing security system had all sorts of access controllers provided by various vendors. This in turn, was creating teething problems for the company as their stand-alone systems per order framework had now become a monumental problem with respect to integration into a centralized system. Being a bio-pharmaceutical enterprise, Biocon followed stringent safety protocols which demanded unique designing of software – be it for doors’ interlocking or integration with ERP solutions. Consequently, vendors were invited to submit their proposals for the diverse and varied needs Biocon had. And Solus, because of its technical �inesse, relative technological superiority and its ability to provide customization as per Biocon’s needs on the �ly helped it win this deal.
Solus Implementation : Accessing Control on Future
Solus provided the following solutions to help Biocon tide over its above-mentioned problems/needs. s Solus Access Control System (SACS) – Later upgrade to iSACS s Solus Attendance Management System (SAMS) s Integration with - MS Dynamics - Ad - Biocon Portal s Regular as well as customized door interlocking s Integration of pre-existing access control systems to have a centralized system in place s Fire Drill Management System Solus provided the following from its product portfolio in successfully completing this gargantuan project to the mutual satisfaction of all stakeholders concerned:
92 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
s s s s s s s s s
Locations – 5 Reader Controller Panels - 300 Readers - 1200 Controllers Access control cables EM locks Exit buttons Tripod turnstile Egress switch
Conclusion
The professional competence shown by Solus in executing each and every aspect of the project was well appreciated by Biocon. All the products used (and mentioned above) were in-house designed and manufactured. These are built in conformance with the highest level of industry standards. Solus’ solutions have this intrinsic feature of being designed not just to help address the current scenario problems but also with a clairvoyant look into the probable needs of the customer so that the installed system can be smoothly adapted to face new challenges and workloads. This hallmark of Solus work ethic is what has made it stand apart from its industry peers – both indigenous and foreign, alike. www.ind-safety.com
TECH UPDATE
Fire-Safety & Emergency Evacuation
T
he objective of this write-up is to have a general understanding of �ire-safety with emergency evacuation & have a look at the risk retention, risk transfer & hazards involved and evolve at best �ire protection, safety & evacuation system for any premises. Fire -Safety is an applied art of de�ining a layered system of Fire Prevention with early Fire Detection, Suppression & thereby protecting valuable Human Life with Early & Proper Evacuation & saving its Property & keeping continuity of the necessary operation without any damage to the premises. It has to be effective, simple, economical & reliable. The Safety System design thus is based on good practices & heuristic science. Any premises & its various establishments / areas and its human resources & valuable content has its own importance for the development of our Nation & World at-large. So the protection of any premises from the point of view of �ire & safety is of immense important & necessary. The consequences of poor �ire & safety practices and a lack of emergency planning may have serious consequences in the event of any disaster at that premises, where the important humanresources, large quantities of valuable properties & Continuity of operation could suffer and it can have huge human, �inancial and economic losses both to the people at-large and its owner, its resident, Our Country & World at-large.
Methodology & Design Basis
During the course of �ire safety survey, the team needs to interacted with various important personal of that premises from its owner / developers, to its security guard, www.ind-safety.com
its residents, safety-security-�ire in-charge etc. and take concern opinion of all concern stake holders and the risk perceived. The data/ information must be gathered based on the study of the premises and observation of each and every risk probable area/spot in the premises. Every environment de�ines its �ire risks and hazards and precautionary steps are to be taken in accordance to the same. Fire Protection & Safety Science is a science of “Layered Defense”. One can have several layers of �ire protection & safety including active �ire protection systems, �ire detection & alarm system passive �ire protection systems & signage/ information system, emergency evacuation, disaster management systems/products on the hardware side with appropriate training/ �ire safety plans/evacuation plans/ emergency plans & electronic back-up & digitalization of data on software side. A premises is a seat of power to its owner in democratic setup. It represent the pinnacle of power within jurisdiction suggesting hierarchy, dignity and grandeurs while in the context of democratic society it remains to be more accessible, equitable and modest. It calls for protocols, formalities and hierarchy while as a living environment it expects for safer, secure & cleaner premises alongwith recluse, familiarity and spontaneity. Most of the systems in any premises consists of many subsystems that function in the entirety of their own within themselves yet at the other plane they support mutually for a collective mandate. This calls for an approach that allows each subsystem to exist in its own world and environment independently yet be a part microcosm of a larger world and
Shri Nimit Sheth - Secretary, FSAI, (Gujarat Chapter) E-mail : nsheth@ramanasafety.org
con�irm to its overall structure to feel one. So the Installation of Comprehensive Fire & Safety systems with Emergency Evacuation is of immense importance for Safety of Human Lives, Protection of Property, Vital Documents, Data’s & Records, its Infrastructure & Continuity of Operations.
Some basic facts of “FIRE”
s Fire is a calamity, which strikes without any advance warning, and wreak an unimaginable havocs. s Most people think that �ire happens to other only and they wait till the disaster strikes. s 85% of world �ires have started when nobody was around in that area/premises during the initial moment of �ire. s 70% of times the �ires starts from enclosed spaces (with higher risk of �ire hazard or ‘�ire hot spots’). s More that 75% of �ire start as electrical �ire and then multiple combined �ire. s Fire multiplies very fast in �irst few minutes & it moves from ignition phase to blaze phase very quickly. s Human physiology as they aren’t �ighting trained people, they usually try to escape leaving the small �ire which then takes place to turn into large proportion. s Fire destroys home / establishments every 90 seconds around the globe. INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
93
TECH UPDATE
CIO‘s Priorities : Security Automation
S
implifying the use, so that users at lowest level of operations make effective use of the technology, may help CIO’s to achieve some of their main priorities connected with business risk mitigation and Value addition from IT such as Information security, business continuity, Improving IT function effectiveness and Cost reduction listed as key priorities for CIO’s in recent survey results. Evolving technologies such as Wireless, Zigbee and 4G apart from traditional TCP/IP to enable connectivity between �ield devices and application software along with choices of smart controlling and operating options like smartphones and tabs other than PC’s making security automations effective and exciting than ever as these systems are increasingly used by large no of user groups in an organisation. Security automation is an important area to bring in simpli�ication �irst to involve more users groups to extend responsibility to all than only one department. Below are 3 steps that may signi�icantly simplify the usages of technology, speci�ic to electronic security automation to increase effectiveness of IT function among users along with overall lifecycle cost reduction for the organisation.
1. Unification of Security Access Systems
Often in a fast growing organisation, security solutions, specially access control systems for a new facility or project, are decided by project teams having project managers, consultants and PMC’s. No wonder, for them project delivery capability of vendor and project budgets always have greater importance over right product selection, specially when CIO’s vision for product selection with overall objectives are missing. By the time the need to standardise is realised and implemented, its already late and CIO’s or IT teams are left with challenges to deal
94 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
with separate islands (facilities) using different technologies for cards, readers, controls and softwares. Either due to reinforcing vision or due to technology upgradation, Uni�ication for security automation is being exercised by most of growing organisations in India or even by MNC’s in each business sector, be it Large organisations like Wipro, iGate, Airtel, Crisil, HDFC, Tata Power, Financial Technologies or Mid size implementations like Bangalore Airport, Delhi Metro or ZS Associates. Solus has been closely connected for designing and implementing these uni�ication projects for some large customers. Here are some experience excerpts from all those organisations planning to unify their enterprise security systems at multiple locations in isolation to a one uni�ied solution. When Uni�ication is due to be exercised, Steps should be in order of Software > Controllers > Readers > Cards. Often organisations jump to do the seemingly easiest part �irst like replacing less relevant hardware like cards and readers �irst, leaving uni�ication project later and delays bene�icial realisation of the project. A Well designed Integrated Security Access Software like iSACS can collect data from multiple small purpose built softwares implemented at different sites and can provide meaningful MIS and alerts as �irst step needed for uni�ication, but this leaves certain limitation at operations to manage these multiple small softwares and databases and indirect control over systems controllers; hence its recommended to have replacement of at least application software and system controllers in One go. Since controllers do support multi technology cards, changing readers and then cards can be �inal and last step post stabilisation www.ind-safety.com
TECH UPDATE
of software and controllers replacement. With uni�ied software and controllers, major objective of uni�ication like common usage practices, common MIS database are achieved; the only challenge left is credential interoperability across sites which is important only when intra-site travelling of employees is high. Multi technology (also called combination) readers and cards are the tools for easy migration at this last step of uni�ication. Here, Dual technology readers (current and to be used in future) available from most of reputed manufacturers like Solus, should be used to conveniently replace existing old technology readers. This approach ensures no disruption for users. Once all readers are replaced, a card reissuance (new technology) can be initiated. As Card reissuance often is a timetaking process, it can be done simultaneously along with reader replacement but in such situations, use of combicard is recommended (having both older and new technology) on same card. While selecting Cards & Readers, Go for Open Sources technologies on ISO Standards like Des�ire or Mifare. Using proprietary technology controlled by card makers may lead you to pay high costs lifelong without any signi�icant gain only because its complex to change your cards and readers during recurring needs. Uni�ication projects in a live site are far different than green�ield projects and require
www.ind-safety.com
specialisation, hence experience matters. Data migration from older system to new, along with functional audit within stipulated time frame (mostly between Friday to Monday) needs experienced and skillful execution. Small mistakes here can create operational mess, hence the need for careful attention while selecting a right partner here.
2. Thoughtful Automations
Information security that also ensures business continuity is always measured equal to strength of weakest link in the security implementation chain. Quite often, executors at ground like security guards are neglected in high end and high budget automation plans. Unlike the Western world, in India we have talented pool of trained security staff available (and will continue to be) at reasonable price, at times far lesser than complex or large size automation implementation; hence the automation and use of guards will continue to coexist. Considering this fact, objective of automation should be restructured towards optimum use of both, rather than replacing one by the other. Small assistances such as timely Intelligent alert along with information about next steps to be taken on alert can simply turn deployed guards into the strongest wall rather than the weakest link. Automation can take up routine and mundane activities like surveillance and regular guarding and free up guards for more meaningful work such as to deal with alerts & suspects. This makes
INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
95
TECH UPDATE
guard’s job easy and interesting, hence, more accountable. Below are few thoughtful automation examples collected from different users (evolved during their experience of managing operations) which resulted in greater bene�its through thoughtful automation. Access Control system at large enterprises are designed to automate process of gaining physical access in the facility by employees, visitors and others. System is preset with security sensitivity of different doors, but often its known to only system software not to the deployed guards who can really prioritise their attention for such sensitive doors, A simple reader color coding concept displaying security sensitivity information of the door right on the door itself, may be on installed on RFID Readers. This is simple to implement and does not require complex training once used uniformly. ( Courtesy : Solus Labs) Photo Display System is another similar concept to verify identity of card holders at doors while they gain access. Display of electronically stored information on ID card like photographs on a common screen helps a single security guard to take care of multiple doors in zone and sense any untoward activity proactively. This hybrid use, discipline of electronic security along with human intelligence is proven very effective on operations and cost. (Courtesy : iGate Computer Systems Ltd.) Random Check in a campus scenario is very useful tool for security guards to control intruders in a company campus, they can instantly verify validity of access card of any suspect on installed Random check readers across open campus. ( Courtesy : Wipro Technologies) Linking Employee attendance, with access control such that unless Employees punch in their attendance in connected Biometric readers they can’t gain access at any facility doors, enforces positive discipline among employees. ( Courtesy : ZS Associates) Visitor Management & Guard Tour linked with access control such that an approver can approve limited time access
96 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
to a third party visitor along with biometric authentication quickly over a remote network. ( Courtesy : Airtel) These are few of such concepts among several other bene�its that can be derived from uni�ication and security automation investments at later date at no or fractional costs. Again choosing a capable and agile partner here is the key here who can enable such thoughtful innovations evolved normally during business operations quicker. Normally such �ine requirements are learned and evolved with repeated usage with time, hence, cannot be de�ined in a project RFP. Unfortunately such desired solutions bring maximum bene�it but are shown least interest by large size MNC security implementation vendor- they either deny it directly or quote discouraging customisation costs.
3. Managed Services Outsourcing
Once systems are uni�ied to a common software and automated to meet business processes, they can readily be outsourced for maintenance-this brings in expert’s services at lower costs. You need not invest in retraining of internal people for this specialized and important job, hence, managed services offered by a capable OEM should be a good choice. Option of moving implementation to cloud can also be reviewed here that may help bringing greater support ef�iciency. Managed Services Partner selection is again important. Most project sales companies don’t give equal importance to after-sales like new projects (major revenue stream) as most of the time their key resources are engaged in key project executions. This also results in inadequate training of �ield engineers who are the key to ef�icient after-sales support. So, it is advisable that companies with signi�icant local presence, remote service infrastructure with CRM and automated ticketing systems, training focus on support engineers, presence at remote locations should be considered with a desired service level agreement in place for executing automation as well as integration of electronic security systems. www.ind-safety.com
TECH UPDATE
The new ‘Push Video Alarm System’ for Home/Shop security
I
ndia’s leading electronic security provider Zicom has launched inTouch, a Push Technology camera which is a breakthrough innovation in Video and Intrusion Alarm System (VAS). Targeted for the safety of working couples with kids, senior citizens at home and for monitoring remotely, inTouch also �inds its application in retail stores as a business intelligence tool coupled with safety and security features. Zicom’s inTouch, the new Push Video Alarm System is a step beyond the traditional CCTVs as it pushes a live video feed into a portable mobile whenever an event occurs. Simply put, a client receives a push noti�ication. The Push Video Technology is the result of developing a network camera that offers a vastly improved, a much clearer video quality, broader view angles, and taking forward existing functions, thus giving physical security a much needed dimension. That means whenever an incident takes place, users get instant accurate noti�ication of an event helping them reduce the damage, if any, and salvage a situation. Push Video IP cameras are vastly different from the traditional CCTVs as they apply push technology into video surveillance systems making it possible to send out instant noti�ications and provide real-time playback. Which means following an incident, e.g., a break-in into your house or store, you will get an instant play of that through Push Video on your mobile device within 5 seconds. By viewing playback video, you can then decide as to what prompt action has to be taken. Zicom’s new Push Video Alarm system has a built-in PIR sensor for human detection which is a more reliable form of motion detection rather than using the motion detected in the camera picture, which can cause false alarms. Pre-
98 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Catch a thief before he does the job--there and then! alarm recording allows you to see the entire course of an event rather than searching for footage in a vast storage of data. Push Video lets you move freely and do your normal, daily activities instead constantly worrying about the security of your near and dear ones, your home and your stores. Now it’s up to you to take a call as to which events need to be covered by the system! Push Video is the solution of today.
Ideal for:
s A store around 1,000 sq ft s Up-market locality s Stores selling high value products such as jewellery, expensive watches, mobile phones, designer boutiques, high end salons etc s Stores located in crime sensitive areas s Owner-managed stores s Owners of retail chain s Those who have acute requirement for Alarm System/Video alarm rather than Surveillance s Those who require improvement in customer service and employee productivity s Stores that may need remote managed services for alarm management.
People who currently own an Alarm System Experience false alarms due to the conventional alarm system, but prefer not to spend more on it, but would prefer using the Video Alarm System
Product USP for Retail Small format Stores
s Get the combined bene�its of Video and Intrusion in one single unit s Incident Noti�ication is active and instant s DIY (Do It Yourself) —Plug and play, auto con�igurable s On-board recording with expandable memory up to 32 GB s Immunity from False Alarms due
to video veri�ication s Trigger an Alarm remotely (Hooter*) using your portable device, e.g., Android/Smart Phone s Low cost low investment Security System which also helps in business monitoring such as customer service and productivity s Easy installation s No need to spend on expensive CCTV system when the need is that of basic security s When connected to Zicom Command Centre (ZCC) , you get 24X7 monitoring services facility
Home Owners USP
s Get the combined bene�its of Video and intrusion in one single unit s Watch your loved ones—children, parents, anytime, anywhere, at will and at your own convenience. Record all the home activities s Record all the home activities
Zicom USP
s Pioneer in electronic security business s Most Admired Security Brand s Push Video Technology is �irst of its kind offering, and thus there is �irst mover advantage in Push Video Technology s Experts in Multiple Security Solution s 24X7 Service through Zicom Command Centre s 24X7 Toll Free Online Support s Easy access to purchase s Retail Presence s Pan-India presence in over 400 cities s Over 1 million customers
Zicom Command (ZCC):
Centre
s All Incident Management with Video Veri�ication s Response Management based on SLAs signed with the customer s Incident based Video Hosting on Zicom Server. www.ind-safety.com
TECH UPDATE
Airtel selects Solus to Secure its Network Pan-India.
A
irtel, the behemoth of the Indian telecom sector, headquartered at New Delhi, operates in 20 countries across South Asia, Africa and the Channel Islands. It ranks amongst the top 5 mobile service providers globally in terms of subcribers. In India, the company’s product offerings include 2G, 3G and 4G services, �ixed line, high speed broadband and enterprise services.
Need
Airtel’s needs on the facet of software security solutions were manifold: s It needed a centralized solution where work�low could be built where multiple centers’ heads could approve onsite and offsite visits. s It needed a design whereby the same card could be used by both employees and vendors to enter MSCs. s Post-approval, it needed the templates to be moved to the reader in order to keep the existing infrastructure in place which consisted of Proximity cards. s It needed the templates to be stored in controller in lieu of reader and also, biometric readers to be installed at its facilities.
Associated Problems
From the technical perspective, Airtel faced a host of accompanying problems which included the following: s Multiple vendors for management of data centers and MSCs. This consequently meant that the vendors had to take multiple approvals each time any maintenance work was required which indeed was a cumbersome process for both Airtel and the vendor. s All the DCs weren’t bio-metric access controlled. s Across multiple locations, Airtel was facing the issue of both card and �inger enrollment. s There was no existing record of the number of visits by employees/vendors. Due to absence of audit log across its various installations, it faced a persistent and potentially, debilitating data security threat. wqw
Implementation - Solus’ Approach
None of the other contemporaries of Solus were able to provide a long-term technologically viable solution to meet these multi-faceted problems of Airtel as to the later’s satisfaction. However, Solus, with its tremendous con�idence in its products and services’ quality rose to the occasion and devised a solution which won the vote of con�idence of Airtel. Undertaking this herculean task, Solus implemented the following: s No of locations for installation -116
100 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
s Work-�low based customized SACS and SVMS s Biometric readers on WIEGAND and serial-based modes – 350 s DAC 02 and DAC 04 controllers – 800 Card readers s Web clients to enroll �ingerprint without using thick client
Conclusion
This particular scenario, where no other Security Software Solutions provider could step up, Solus rightly identi�ied it as the opportunity where it could not only announce its arrival on a grand scale but also could further hone its expertise in hitherto unexplored technical domains. So, it was indeed a symbiotic deal between Airtel and Solus which produced the end-result of a happy customer and a service provider with an enhanced pedigree and technical acumen. Solus is indeed happy to have undertaken this journey into unchartered territory which has helped it grow up to be the premier Indian manufacturer and service provider in the electronic security solutions industry. www.ind-safety.com
TECH UPDATE
Current technology enables smooth migration to high frequency access control systems & next-generation mobile solutions
D
ramatic leaps forward in technology capabilities and security requirements, combined with the trend to converged access solutions on smartcards and NFCenabled mobile devices, are moving many organizations to upgrade their access control systems. Migration pays off in a much higher level of security for people and property, as well as operational ef�iciencies and costeffectiveness, especially for organizations that add other applications to their contactless access control cards and mobile platforms. Fortunately, as technology advances, it also becomes more affordable. Today, a personal computer is a fraction of the cost it was when the technology was �irst introduced. At the same time, it has dramatically greater speed, and more memory and advanced capabilities. The same is true in the security industry. Likewise, for a price that is comparable to older access control technology, a company can have a system with more robust security that also serves as a platform for everything from cashless vending to logical access. Although migration does involve change, advanced technology is a bene�it here also. With multi-technology cards and readers plus �ield-programmable cards and systems, disruption to the day-to-day work�low is limited and manageable. And the bene�its serve both employees and the organization, not only in the immediate term, but also for years to come through a more secure and user-friendly environment that will serve as a platform for future applications. The goal of this paper is to help security professionals �ind the best solution for the unique needs of their organization, and ensure that they take full advantage of the opportunities that migration affords. To that end, the paper addresses aspects of migration that every organization should consider. This includes: Why Greater security may be one objective, but how much greater? What level does an organization need and what other bene�its can be gained in the process of increasing security?
102 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
When When is the right time to migrate? Due to concerns about budget and the impact on work�low, organizations often delay any changes, but there are several key indicators that help determine when to migrate. How What’s the best process to manage the workforce impact and make ef�icient use of the migration investment?This includes installing multi-function readers and options for re-badging the workforce.
What Of all that’s available, what does the organization need today and what might it need over the lifetime of this new system?
WHY MIGRATE ?
Although the reason to migrate may be obvious to security professionals, this may be an area in which they’ll need to do the most work in educating decisionmakers within their organizations. New Technology Offers Stronger Security Like all technology, newer systems tend to be more secure and sophisticated. For 15 or 20 years, low frequency (125 kHz) cards, often known as proximity cards, or just prox cards, were the standard in the security industry, offering ef�icient and effective access control. At their simplest, these cards allowed a person access to a building. Whoever had a company-issued card in their possession could enter the building; this could be an employee who was issued or card or a perpetrator who gained access using a lost or stolen card. Over time, companies began adding visual security, such as a photograph to the card to provide a basic form of authentication. Best security practices would require employees to wear their photo ID/access cards and that security staff are trained to challenge anyone without proper identi�ication. www.ind-safety.com
TECH UPDATE
These prox cards are now subject to cloning. There are devices available that allow someone to make a duplicate card, giving them unfettered access to a building. Unless the building also has security cameras or someone witnesses this person entering the building, there would be no way to know an unauthorized person had access. In contrast, high frequency cards provide a higher level of security than traditional prox cards. This is accomplished by using diversi�ied keys and mutual authentication to deter anyone from gaining unauthorized access to the card or reader, and encrypted data storage to add an incremental level of protection to the information on the card. In addition, some vendors may be able to provide a proprietary format to large organizations, including monitored card numbers to provide an additional level of security. Although cloning doesn’t always happen even when a company has old technology, there are many reasons someone would be motivated to clone a card. These range from gaining access to highvalue information or assets to a disgruntled former employee seeking retribution. An investment is required to migrate but there is also a return on that budget commitment. The ROI may be tangible, such as through improved insurance premiums due to better risk management. It could also be intangible, such as the cost savings associated with not having a disaster – something that could impact the organization’s workforce or customers, and present long-term legal and reputational issues that would take years to overcome.
Take Advantage of the New Standard for Access Control As high frequency cards, also known as contactless smart cards, have
104 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
proliferated, the industry has also begun moving to a new benchmark in smart card technology that delivers highly adaptable, interoperable and secure access control solutions. This smart card technology leverages open industry standards to support a broad continuum of application requirements on both traditional cards and NFC-enabled mobile platforms, while giving users the assurance that their investments in today’s technologies can be leveraged in the future. HID Global’siCLASS SE® platform delivers these new capabilities. The platform’s iCLASSSeos™ credentials feature a universal, standards-based card edge and are portable for use on NFC-enabled smartphones so that customers can utilize smart cards, mobile devices, or both within their physical access control system. Seos cards deliver improved security through state-of-theart cryptography and a secure messaging protocol that uses a new data representation and operates within the boundary of HID Global’s Trusted Identity Platform™ (TIP). They feature multi-layered security, full privacy support, and other features that prevent cloning and tampering, among other bene�its, and are portable to NFCenabled mobile devices -- an access control model that further improves security. Other high frequency technology brands used in physical access control are iCLASS® contactless cards and MIFARE ™. MIFARE cards are available as both MIFARE Classic and MIFARE DESFire EV1, and many customers are choosing the new MIFARE DESFire EV1 card in order to take advantage of the more advanced security features compared to MIFARE Classic. These cards can identify the individual, authenticate their access
rights via encrypted keys that are unique to each organization and each card, and can store data for cashless vending or the management of personnel records. For an organization that is still using Weigand or magnetic stripe access control technology, it may be tempting to upgrade to a low frequency system. While this will provide a higher-level of security,it still leaves an organization vulnerable and with minimal or even no cost savings. Over the past several years, the government has been driving advancements in security technology as Homeland Security requirements are implemented. Most obvious to the average person is the Transportation Security Administration (TSA) requirements. For example, TSA requires that pilots are re-badged every three to four years to ensure that their access control is the latest security and that these professionals with a high level of security access are reviewed and recerti�ied. While the high level of security required for airline pilots may not be needed by all organizations, high frequency systems are now available at a price comparable to low frequency. Any organization that is ready for a new access control system should move to a high frequency system. This will maximize the investment and minimize the organization’s risk, which is the primary reason to have an access control system.
New Technology Next-Generation Access Solutions
Enables Mobile
In addition to traditional migration options, users now also can migrate – and/or completely transition – to the next generation of access control platforms based on a new secure, standards-based, technologyindependent and �lexible identity www.ind-safety.com
TECH UPDATE
data representation that HID Global calls the Secure Identity Object (SIO™). SIOs are a key part of HID Global’siCLASS SE platform with iCLASSSeos credentials, and operate within the company’s TIP boundary. All keys and cryptographic operations are protected inside the smartphone’s secure element – usually an embedded tamperproof integrated circuit, or a plug-in module version called a subscriber identity module (SIM). The use of the smartphone’s secure element within the TIP boundary creates a secure communications channel for transferring information between NFC-enabled phones, their secure elements, and other secure media and devices. This ensures that NFC-enabled smartphones and their transactions can be trusted within the accesscontrol managed network using the iCLASS SE platform and Seos credentials. These mobile credentials can be issued over the air to NFC-enabled smartphones using a convenient, cloud-based provisioning model that eliminates credential copying and makes it easier to issue temporary credentials, cancel lost or stolen credentials, and monitor and modify security parameters when required. New applications also can also be easily pushed to the phone, as well, so that multi-factor authentication becomes a contextual, real-time managed service with the iCLASS SE platform.
New Technology Enables New Applications
It is also now possible to use credential solutions that leverage the technology investments that have been made in the government sector. In addition to Personal Identity Veri�ication (PIV) cards de�ined by the Federal Information www.ind-safety.com
Processing Standards Publication 201 (FIPS 201) for use by federal agency employees, two additional credentials have been de�ined: the Personal Identity Veri�icationInteroperable (PIV-I) card for government contractors, and the Commercial Identity Veri�ication (CIV) card for commercial users – with the goal of taking advantage of the infrastructure created by the Federal government’s PIV program. With PIV-I and CIV, identity technology developed for the government sector can now be used in commercial applications where it will enable organizations to implement the highest levels of security including strong authentication at the door. Each of these identity cards supports strong authentication mechanisms, and is used both to gain physical access to controlled facilities and logical access to controlled information systems. CIV cards are particularly attractive in an airport security environment, where they can be used alongside sibling PIV cards that are already being carried by federal TSA employees there. Airport management will be able to create a single access control system that supports both airport employees and federal agencies that are also operating there. The CIV credential delivers cost savings for commercial entities along with the �lexibility to choose from a long list of compatible and interoperable products. Additionally, PACS can be upgraded to CIV by simply augmenting existing panels and door controller functionality, without rip-and-replacing the existing infrastructure.
iCLASS SE Platform Offers Important Benefits The iCLASS SE platform delivers many bene�its : Open Standards for
Portability, Extensibility and Interoperability: s Extensibility: SIOs are de�ined using open standards including Abstract Syntax Noti�ication One (ASN.1, a joint ISO/IEC and ITU-T standard). This data de�inition allows for an in�initely extensible object de�inition. The de�inition can support any piece of data, including data for access control, biometrics, vending, time-andattendance, and many other applications. In contrast, many other �ixed-�ield structures used in today’s access control card and reader systems remain stagnant, stuck in a �ixed de�inition. Extensibility brings signi�icant value to the developer community that utilizes the technology. Since an SIO interpreter takes care of mapping data to supported devices, all the developer has to focus on is generating and transacting (reading and writing) secure objects. The days of the vending-machine developer having to learn about intricate credential-technology sector terminology and key rules are over. s Portability: SIOs can reside within any TIP Node, or any location where the SIO will be generated and interpreted by TIP Nodes. Thus, not only can SIOs reside on HID’s iCLASSSeoscredentials, they also are portable and can reside on smartphones with NFC capabilities, other memory cards containing other card technology, microprocessor-based cards like NXP’s SmartMX, computer disk drives, and many other formats. This means that solutions can be developed that operate on multiple device types with varying security capabilities. The same object stored on one device can later be ported to another device with ease, and without strict constraints. INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
105
TECH UPDATE
s Near Field Communication (NFC) Card Emulation: Enables migration to HID access control on mobile devices. s Licensable SIO Generators and Interpreters: Provide an expansive ecosystem through SDKs and embedded products. s Open Supervised Device Protocol (OSDP) Support: Recently established as a standard by the Security Industry Association (SIA), OSDP with Secure Channel Protocol (SCP) provides bidirectional communications and security features to interconnected devices. HID Global has made signi�icant contributions to the speci�ication, and support for OSDP adds key capabilities to the company’s products including central management of readers for lower operational costs and faster and easier con�iguration. s Upgradeable Hardware Connection: Allows all Wiegandbased communication readers to later expand communication capabilities to OSDP, Hi-O and other bi-directional communication protocols. s Supported by mobile access control ecosystem: The iCLASS SE platform is supported by a larger mobile access control ecosystem of interoperable products and technologies offered by HID Global and its partners, including NFC-enabled locks from HID Global’s parent company, ASSA ABLOY. s Other credential support: The iCLASS SE platform works with credentials from leading manufacturers Trusted Security and Privacy: s Device-independent SIOs deliver trust-based security. This security protects objects created and bound to one device from being copied to another device, thus protecting sites against cloned
106 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
s
s
s
s
s
s
s
s
card attacks. The use of state-ofthe-art cryptography and a secure messaging protocol creates a trust-based communication platform that delivers robust security. HID Global’s TIP also ensures trusted identity within a secure ecosystem of interoperable products. Privacy:iCLASSSeos delivers full privacy support for enterprise and government organizations whose identity management policies are driven by regulatory compliance requirements. Data associated with a given card can’t be divulged or cloned since no traceable credential identi�ier is exchanged during card sessions. Multi-Layered Security:Ensures data authenticity and privacy through the multi-layered security of HID’s SIO. Out-of-Box SIO Compatibility: Ensures highest level of protection. EAL5+ Certi�ied Secure Element Hardware: Provides tamperproof protection of keys and cryptographic operations. SIO Data Binding: Inhibits data cloning by binding an object to a speci�ic credential. Expanded iCLASS Elite™ Program: Extends private security by protecting uniquely keyed credentials, SIOs, and programming update keys. Velocity Checking: Provides breach resistance against electronic attacks. Active Tamper: Protects against physical tampering of the reader.
Simplicity: s Solutions can be easily upgraded:This allows for changes in technology and applications on any combination of smart cards, microprocessor cards and NFCenabled smartphones. s Provides a single, mediaindependent and mobile-ready
solution for all applications and environments: This ranges from physical and logical access control to biometrics, cashless vending, customer loyalty programs, transit, and many other uses. s Users also can create, use and manage secure identity for the iCLASS SE platform using the company’s recently announced HID Secure Identity Services™:This comprehensive suite of web-based services helps customers address every aspect of provisioning and managing personalized, secure credentials, both today and in the future. s Includes extensive usability/ performance features: s SIO media mapping: Simpli�ies deployment of third-part objects to multiple types of credentials. s Multi-mode Frequency Prioritization: Increases transaction performance and improves card management. s Combined Bi-directional Host Communication and 125 kHz Support: Simpli�ies the reader portfolio offering and expands the use of Prox and higher security connections. s Additional Models: RP10 and RP30 provide multiCLASS functionality in new form factors, creating more �lexible installation options. s Flexible Hardware Connection: Pigtail or terminal strip connections are included on all reader models. s Field Programmable Readers: Provide secure upgrades for migration and extended lifecycle. s RGB LEDs: Delivers increasing capability to notify users and troubleshooters regarding system state. s Reader/Card Anti-Passback User Noti�ication: Provides clear feedback to the user while assisting troubleshooters. www.ind-safety.com
TECH UPDATE
s Read Progress Noti�ication using LEDs: Provides clear feedback to the user about new credentials entering the market that require more lead time (e.g. FIPS 201compatible credentials).
Multiple Applications are Available in a Single Solution
An additional reason to consider migrating is the bene�it of combining multiple applications into a single solution. Open anyone’s wallet and it seems there is a card for everything, from the grocery store to the parking garage. Industry is no different. Many organizations are using various card technologies, from magstripe to smart cards, to manage everything from building access to snack-vending machines. These can all be combined in a single card, providing centralized management for the organization and ease-of-use for employees. High frequency smart cards offer combined physical and logical access control in one card, which can be issued only to those employees requiring this additional level of security or to the entire employee population. Rather than having two separate cards -- or requiring an additional device such as one that generates an RSA token -- everything can be in one unit.This can be accomplished with a contactless smart card or a combination card that combines contactless and contact technologies in one. With a contact chip, it’s possible to perform functions such as encrypt �iles or add a veri�ied signature to an e-mail. In addition, there are new applications that can be added to contactless access control cards to do everything from turning on the air conditioning so that resources are managed better to tracking company vehicles via GPS. The smart card is a portable key to a myriad of technologies. As such, it can streamline processes, improve www.ind-safety.com
work�low and cut down on the number of cards an individual has to carry. Following are a few of the more common applications that can be added to a smart card:
s Biometrics – biometric templates such as �ingerprints, iris or hand geometry, or vein patterns are securely stored on the card. s Building automation – lights and climate-control systems are turned off and on as needed based on when employees are present. s Cashless payment – provides a range of bene�its from a simple cash replacement at point- of-sale to full management of employee bene�its such as discounts, free entitlements, and hospitality or loyalty accounts. s Secure print authentication – eliminates waste and manages printer use by printing documents only when an employee has presented their access control card to the print device. s Time and attendance – enables quick throughput of employees during shift changes by eliminating time-consuming manual interactions. s Medical records management – a multi-function credential including this function can be issued to students at a university or employees in high-risk jobs to provide immediate access to their medical records. Hospitals also issue cards to serve as a record during a patient’s stay. Also, as mentioned earlier, multiple physical and logical access applications can also now be embedded into NFC-enabled smartphones and other mobile access platforms for improved convenience and security. The ability to put a secure credential on NFC-enabled phones for permission-based access control makes smartphones an ideal platform for carrying multiple
types of physical and logical access credentials. The remainder of this paper will focus on the questions established in the introduction: when, how and what, which explains the options within high frequency cards.
WHEN TO MIGRATE
Merger or Acquisition Mergers and acquisitions often involve rebranding and/or the merging of administrative and other systems. Usually at some point in the process, the organization will need to issue new credentials. With the cost of new technology being competitive with legacy systems, this would be a perfect time to migrate to a more secure, sophisticated and capable system. Standardization to a Single Card or Mobile Access Control Solution Due to rapid growth, decentralized administration systems and/or multiple physical locations, an organization may end up with several different access control systems. Since new technology offers the ability to issue or change credentials remotely, it’s now possible to integrate access control into one system that is centrally managed. Standardizing all locations and employees on one system can increase security and improve resource management. Going a step further to mobile access control delivers the bene�its of over-the-air remote provisioning and management of secure identity credentials. New Locations If a company is moving or adding a building to its existing infrastructure, new credentials will have to be issued for that location. This is an ideal time to look at access control for the entire organization. It may be INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
107
TECH UPDATE
time to standardize all locations into one system.
Reissuing of Credentials on Smart Cards or Mobile Access Platforms As new employees join, many organizations manage costs by purchasing additional cards that work with their old technology. Some organizations may also need to change their cards due to a new brand image (i.e. new logo) and at that point decide to upgrade to newer technology, either with traditional plastic cards or using digital credentials mobile platforms. So, at some point, either due to a growth spurt or other tipping point, it will make more sense to move to current technology.
One Card or Mobile Access Solution for Multiple Functions Organizations that want to add time and attendance or cashless vending functions for their employees will need to issue some type of card for this. They can migrate to a contactless smart card that combines access control with these other functions. This way, employees only need one card to manage every function in their workplace, and administration of these functions is centralized into one ef�icient and cost-effective system. Organizations also may want to migrate to the convenience, �lexibility and security of carrying digital keys and credentials on smartphones and other devices, which provides the impetus for moving to a mobile access control model. Improved Risk Management Either due to insurance requirements or to improve riskmanagement costs in general by reducing liabilities, moving from an outdated system to a current one can dramatically improve the security in an organization.
108 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Change in Security Requirements As a result of new legislation or regulatory requirements, an organization may be required to increase their security. HIPAA (Health Insurance Portability and Accountability Act), for example, has strict requirements for accessing medical records, and may necessitate the use of a smart card to enter secure areas or access IT networks that store patient information. Other examples include the Sarbanes-Oxley Act for public accounting (SOX) and FIPS 201 (Federal Information Processing Standards Publication) specifying personal identity veri�ication (PIV) requirements for government employees and contractors. Similarly, if a company gets a new client that requires a high level of security, such as a government contract, it may need improved access control. A new building tenant may also trigger the need for greater security, either to protect the parent organization or to comply with the tenant’s legal or regulatory requirements. They also might want to add new visual security technologies that are now available to prevent counterfeiting. These include optically variable inks (OVI) and holograms – tools the government uses in currency and credentials. Security Breach The reality is that sometimes it takes a security breach to move an organization to make the investment in a new access control system. Ideally, an organization should migrate before there is a problem, especially if the system is still low frequency, which can be easily cloned.
HOW TO MIGRATE
Flexibility is key when considering a migration partner. The right partner can create a solution that
makes the technology work for the organization, and doesn’t force the organization to settle for any limitations of its technology. Due to multiple physical locations or a large employee population, the best way to migrate to a new access control system is in phases. It is a dif�icult, or often impossible, for all the readers and badges to be changed simultaneously or even over the course of one day. Fortunately, high frequency smart cards and readers have the technology that allows a secure, phased migration from an old to a new system. The important thing is to work with a vendor with technology that assures interoperability with legacy and future systems.
Multi-Technology Cards Multi-technology cards bridge the gap between just about any legacy system and today’s secure contactless technology. A single smart card can securely house up to four different access control technologies, including Weigand, magstripe, low frequency, high frequency, or a contact chip. If an organization is moving from Weigand to high frequency access control, the new cards can contain both technologies so employees can enter locations with old and new readers. If an organization is using magstripe cards for cashless vending and high frequency technology for access control, it can combine them so employees only have to carry one card. Multi-technology cards work well if an organization only wants to upgrade security for a speci�ic department or group of professionals. For example, an organization with buildings protected primarily by low frequency cards could issue a combination high/low frequency card to executives, IT professionals or others who need access to more www.ind-safety.com
TECH UPDATE
sensitive areas. The low frequency readers can remain at all the standard building entrances, but a high frequency reader (possibly with biometrics) can be installed at the entrance to a secure laboratory within the building. By doing this, those employees with the higher levels of security clearance can use their badges to enter the secure areas, but the low frequency chip in their cards will still let them use the standard access points in the building.
Multi-Technology Readers Another way to handle migration is to install readers that use both the old, low frequency and new, high frequency technologies. This provides a high level of �lexibility for an organization to develop a migration plan that serves its unique requirements. High frequency readers can provide access to multiple types of credentials, including the ones you are moving from and the ones you are moving toward. For organizations that want to upgrade from low to high frequency, for example, the company can replace all of their low frequency readers with combination low and high frequency readers. Then, rather than switching out all of the cards at once, high frequency cards can be issued as replacement cards or for new employees. This will offset the cost of swapping out all of the cards at once. Any organization can replace all of the low frequency cards with high frequency cards after a transition period, and by then the cost impact will be lower because many of the employees will have the new cards already. When choosing readers, ensure that they support the older technology such as125 kHz HID Prox or Magstripe, as well as the latest RFID technology in theiCLASS SE platform and iCLASSSeos credentials. www.ind-safety.com
Additional readers in the market are able to support more than just one type of high frequency technology. For example, HID’s high frequency migration readers provide compatibility with both iCLASS contactless and DESFire EV1 credentials. This provides the support for both cards simultaneously and more potential to support new credential technologies introduced in the future. Multi-technology readers are also helpful to grant access to employees that may be on a different campus and different technology. A global organization may have a campus in North America based in iCLASS contactless, and one in Europe based on MIFARE. By installing aniCLASS SE reader on their North American campus, European employees can gain access there with their MIFARE badges. Just like the multi-technology cards, the readers can also work well if an organization needs higher security in speci�ic departments or areas. In this case, a biometric reader for example can be used to access more sensitive areas as the reader may offer multiple levels of security such as card, �ingerprint and personal identi�ication numbers (PIN). When an organization is using multiple card technologies, aniCLASS SE reader can be set to dictate which technology will be read �irst. Once the migration is completed, the reader can be con�igured to ignore the old cards, thereby offering security at the level of the new technology. Typically, large installations with multiple or multi-national facilities with mixed-technology card populations are excellent candidates for multitechnologyiCLASS SE readers. An iCLASS SE reader offers the ability to use existing cards, deploy multi-technology cards, and transition to new, contactless, smart-
card technology without having to change the access control system cardholder database.
Integrated Solutions Depending on the size of the population, it can take several days or several weeks to migrate. If necessary, a parallel system can be in place for months. Some technologies require more setup and take longer to integrate due to programming or needed equipment. End-user organizations should work with an integrator/channel partner that understands their situation and has options to match. The right partner can create a solution that makes the technology work for the organization, and doesn’t force it to comply with any limitations of its technology.
iCLASS SE Solutions for NextGeneration Systems and Mobile Access Control HID Global’s latest iCLASS SE readers and iCLASSSeoscredentials support the interpretation and authentication of the company’s SIO data representation. Moving to nextgeneration access control capabilities is a very straightforward process with the iCLASS SE platform. Readers are technologyagnostic and designed to simplify migration. Customers can order a single reader that will accommodate technology needs both today and tomorrow. Users can optionally follow a migration strategy to the iCLASS SE platform’s �lexibility and extensibility bene�its that simultaneously enable interoperability between both iCLASSSeos and other credentials. For optimum security, however, it is necessary to completely transition to the new iCLASSSeos credentials, either on traditional cards or, for even more robust protection, on NFC-enabled smartphones. Cards are delivered with pre-provisioned INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
109
TECH UPDATE
SIOs to simplify deployment, and users have multiple reader-to-panel communication options, including RS485 OSDP, CANBUS Hi-O, and Wiegand for legacy control panel compatibility. Reader and credential upgrade options don’t require a physical change to the device. Interpreter packages are available that support speci�ic card technologies and can be applied in the �ield and after the initial installation. Cryptographic operation changes or upgrades can be applied to both readers and credentials after the initial installation and card deployment. Also, customers optionally can manage their own cards and credential keys. To migrate to a mobile access control model for optimum security using the iCLASS SE platform, there are some basic requirements. First, NFC-enabled handsets are required. This can be achieved via handsets with an embedded Secure Element, the use of the SIM, or an add-on device such as a microSD. Second, there must be an ecosystem of devices (i.e., readers, locks, and other hardware) that can read and respond to the digital keys stored in NFC-enabled smartphones, such as those that are part of HID Global’siCLASS SE platform, as well as those in the broader mobile ecosystem of interoperable products and technologies offered by HID Global and its partners, including NFC-enabled locks from HID Global’s parent company, ASSA ABLOY. Third, there must be a way to issue and manage digital keys within the TIP boundary. Organizations can issue digital cards and keys to smartphones and other mobile devices via an internet portal, similar to the traditional model for purchasing plastic credentials, only connecting the mobile device via a USB or Wi-Fi- enabled connector. Alternatively, digital credentials
110 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
can be acquired over-the-air from a service provider, in much the same way that today’s smartphone users download apps and songs. In the latter case, a common access control Trusted Service Manager (TSM) interfaces seamlessly to the mobile network operator (MNO), its TSM, and the NFC smartphones that will receive the encrypted keys for storage in their secure element. HID Security Identity Services™ provides these capabilities as part of a one-stop, Web-based source for all credential provisioning and management requirements for traditional badges on plastic cards, for tokens, and for digital credentials that can be carried on NFC-enabled smartphones. This will enable customers to provision and manage credentials over the air with the same ease and simplicity as downloading a song from a cloudbased music service. Card services include key management, anti-counterfeiting, custom graphics and full personalization using a wide range of commercial credential technologies, as well as support for meeting all compliance requirements for issuing PIV-I cards used by federal agencies and their contractors. Mobile credentials can also be managed from the same web-based portal in a managed service content, and provisioned over the air to users’ NFC-enabled smartphones.
CONCLUSION
While migrating from old to new systems is always a signi�icant undertaking, it is affordable and manageable thanks to new technology. Companies and institutions have the opportunity to move from 20-year-old physicalaccess controls, to cutting-edge, secure, contactless technology and next-generation �ixed and mobile platforms that not only offer greater security, but can also serve as a
conduit for everything from cashless vending to logical access. Organizations should choose a technology that supports its complete needs today as well as what it will need in the future. And while most organizations are motivated to migrate primarily for security purposes, if additional technology is desirable in the near term or even several years out, it could be more ef�icient to add functionality and capacity to enable future applications. Similarly, while an organization could purchase only the security level needed for today’s environment, it may be better to invest more now, anticipating industry changes towards greater security requirements. Another important factor in maintaining system security during a technology migration project is to be certain it includes a technology termination plan as well. Meaning, once migrated to the new technology, readers must be made incapable of reading the old cards. And, if multi-technology cards have been employed in the process, it is important to “Change” or “Roll” the media keys once the technology migration is complete. This will best enable a secure transaction at the door. The key to overall success in a migration project is �inding a vendor partner that offers innovative, �lexible technologies to make migration seamless. The ideal partner will serve two critical functions. First, they will provide a comprehensive access control solution that addresses current requirements. Of equal importance, their solution will also provide enhanced security, as well as a platform for future applications that meets an organization’s evolving requirements for increased functionality and convenience. www.ind-safety.com
TECH UPDATE
I N D U S T R Y U P D A T E
TECHNOLOGY s
Wireless technology : Playing the crucial role in intrusion detection
112
s
Electronic access control systems : The revamped attitude
116
s
IT/IP trend in access control business
118
www.ind-safety.com
INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
111
TECH TRENDS
Wireless technology : Playing the crucial role in intrusion detection
Wireless security networks are being deployed in commercial environments more today than ever before. As recently as �ive years ago, many believed wireless was best suited for residential applications, but increasingly commercial customers are coming to expect jobs will be �inished faster with little to no disruption to their businesses and their buildings.
W
hether it is a �inancial institution, a retail store or any commercial building, the story is the same: security budgets are tight and customers have a short timeframe to install and update their security systems. With budgets and time constraints increasingly an issue, wireless intrusion technology has become an invaluable tool because of the labor savings of not pulling wire from the security panel out to the sensors. Depending on the dif�iculty of the installation, the savings can be profound. And there are many environments that simply cannot be hardwired. Wireless technology has overcome practical obstacles and is increasingly seeing widespread acceptance. It is now at a point where range and reliability make it more than just practical for commercial installations; in many cases it’s a necessary choice to remain competitive and pro�itable. Wireless security networks are being deployed in commercial environments more today than ever before. As recently as �ive years ago, many believed wireless was best suited for residential applications, but increasingly commercial customers are coming to expect jobs will be �inished faster with little to no disruption to their businesses and their buildings. Advances in technology and applications have brought the industry to the point where commercial wireless is ready for primetime. As commercial enterprises become convinced of the reliability, value and dependability of a wireless approach, they continue to expand the use of wireless to additional locations, facilities and, especially, applications. Some of the most recognizable facilities in the world have adopted wireless security systems for their buildings, providing a testament to the maturity and proven performance of the underlying technology.
Building a Sense of Trust Integrating security pendant or panic button devices wirelessly gives employees the ability to trigger an alarm from anywhere in a facility. Photo courtesy Inovonics.
112 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
When safety is of paramount importance, organizations need to feel con�ident in their wireless partner. Sophisticated communication protocols used by leading wireless providers eliminate false alarms due to radio interference. www.ind-safety.com
TECH UPDATE
Wireless sensor networks using 900MHz technology are a solid choice for commercial security and life-safety applications. Networks using this frequency can process data quickly, and are easily deployed and expandable as system needs change and grow. The most sophisticated 900MHz networks can support several different applications, such as a security system and �ire extinguisher monitoring, at the same time on the same network. Retro�its and new-build commercial properties can both bene�it from a wireless approach that decreases the costs of cable and installation labor. When a security system is upgraded, during a store remodel for example, the installation cost of a wireless approach provides signi�icant savings compared to a hardwired solution. Applications and equipment can be integrated into the wireless sensor network by simply mounting devices where they are needed , this process doesn’t disrupt employees, their work�low or even the architecture itself.
Proving Performance
Wireless devices are often used in remote or hard-toaccess locations, so signal veri�ication is critical. The ability to verify the endpoint is working properly and the transmissions are reaching the head-end as intended gives wireless a performance advantage. It also provides installers and end users the con�idence that their system is as reliable as a wired system. Verifying endpoints is managed by a native process known as system supervision. The endpoint and repeaters send “state of health” check-in messages to notify the receiver of their presence and condition. Transmitters automatically send supervisory messages to the receiver on a regular basis. The check-in does more than verify for the existence and working condition of the endpoint, it also tests for low battery, tamper and inactive conditions. Another advantage compared to a wired system is wireless’ ability to ‘self-heal.’ If the check-in message comes back negative or the environment has changed due to manual recon�iguration, the system will heal itself by �inding an alternate path of communication from any speci�ic endpoint to target destination. This is an automatic feature of wireless systems and requires no con�iguration or activation by the end user or installer. Don’t overlook the self-healing bene�its of wireless networks. That’s a real advantage over wired security systems. If a wire corrodes, is damaged or otherwise rendered inoperable, that’s it. There’s no communication to that point and it has to be repaired. www.ind-safety.com
Ensuring Satisfaction
The best wireless systems are designed to provide maximum satisfaction for their users. Once a wireless network infrastructure is in place, devices can be moved to allow for changing �loor plans and the movement of large obstacles that may interfere with the signal. An example would be those found in warehouse environments. Because it’s a simple matter to add devices, more applications can be added to the intrusion system resulting in more sales opportunities. It’s also extremely cost-effective. Being able to amortize the cost of the wireless infrastructure across multiple applications presents the end user with a more ef�icient way to manage the operating expenses of the facility — and an additional point of differentiation for an installer’s bid. Integrating security pendant or panic button devices wirelessly gives employees the ability to trigger an alarm from anywhere in the building, which is impossible with a wired system. Additionally, pendants can be used as safety buttons for workers in case of an accident. This added measure of security works alongside the intrusion system and enhances the overall value and dependability of the wireless network. Wireless installations enable easy and inexpensive recon�iguration of the endpoints if the physical layout of the environment changes. Museums often install a wireless system to secure display cases that are part of traveling exhibits. If they already have a wireless system securing the entire premises, it’s as easy as adding additional sensors. Or in cases where a hardwired system is primary, it’s just as simple to add the sensors and operate a hybrid security system. Wireless also simpli�ies system upgrades. A majority of locations have an existing security system in place, but successful enterprises are usually performing a number of upgrades somewhere in their facilities. As clients’ needs evolve, organizations can add wireless mesh and its endpoints to an existing system and panel. Clients that are able to adjust their systems as needed are pleased with the ability to have a wireless system in place that provides not only added value but increased customization.
Overcoming Challenges
During the past decade, wireless has become commonplace in our lives. Most everyone carries a cell phone or uses a wireless Internet connection. The acceptance of this technology has contributed to the changing perceptions about its use for security. Wireless security has advanced to the point where any past concerns about interference, INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
113
TECH TRENDS
Looking to 2011 and Beyond
Depending on the complexity of an installation, the savings realized by deploying a wireless solution can be profound. And there are many environments that simply cannot be hardwired.
reliability or range have been all but eliminated. The wireless communication environment can be a perilous place due to signal crowding, noise, interference and physical obstructions. The rise in popularity of wireless communication devices such as radios, telephones and pagers along with wireless Internet devices that operate in the unlicensed radio frequencies further exacerbate interference issues. Secondary effects associated with these devices such as interference and multipath propagation make it a technological wonder that communication is able to occur at all. For these reasons, wireless products of yesteryear were prone to interference and questionable reliability, and often had to be overengineered. New methods and protocols for handling wireless communication, such as digital transmission, have been developed. These methodologies are able to facilitate the increasing demand on the limited available spectrum. The net result is that even with the greater demands placed on a limited resource, the amount of communication possible keeps increasing along with its dependability. As wireless communication becomes more commonplace, the industry as a whole is seeing the cost of related products declining compared to the immense value provided. Security-industry intelligence is increasing across the board. Networked devices, video monitoring, multisensor endpoints, database access
114 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
and analysis, and more are making the future a reality. Because of clients’ increasing expectations, needs and demands, many existing security systems will need upgrades, an area in which wireless products excel. Wireless networks are becoming smarter and �igure to become invaluable for intrusion and access control systems. Industry in�luencers believe the continued integration of wireless and wired systems is going to be facilitated by the emergence of IP connectivity and intelligent communication with existing panel infrastructure. The move towards an IP-based system is well under way. The current economic recovery may well speed the transition along and bring about change faster than if the recession never happened. It is very likely that we could be looking at a new industry in the 2013 timeframe. The changes in the security industry aren’t con�ined to wireless. Security distributors, dealers/ installers and end users are all evolving along with the new realities of business. This evolution is creating opportunities for more point-to-point wireless problem-solving solutions, wireless component integration into existing networks, and complete, holistic wireless systems. Without question 2009 shook up the way we look at business. This year has been and, going forward, will continue to be about the implementation of strategies and execution of streamlined business practices. These include an examination of the products sold and a close look at how they are applied in the �ield. Thriving security integrators must take note of the changing customer requirements. Commercial wireless solutions, with their industry acceptance and market alignment, open up new revenue opportunities while providing bene�its to the integrator, dealer and end user. Commercial wireless intrusion and access control truly are ready for primetime. While wireless transmission has been used in video surveillance applications for many years — long before the convergence of IP and physical security — its use for electronic access control data is relatively new. As wireless technology improved, hardware shrank and standards became widely accepted, its use as infrastructure for all kinds of security systems became inevitable. Wireless is very strong and getting stronger. The burglar alarm industry went through the transition �ive to eight years ago and now everyone is installing wireless. Let’s take a walk through some of the fundamentals of wireless access control, including www.ind-safety.com
TECH UPDATE
Looking to 2011 and Beyond
Depending on the complexity of an installation, the savings realized by deploying a wireless solution can be profound. And there are many environments that simply cannot be hardwired.
the technology, bene�its of its use and things to be aware of when installing it.
Going Where Wired Cannot
The obvious point here is that wireless access control can be used in just about any place a wireless system can, with some exceptions. There is more to it than that, though. It’s where a wired access control system can’t go that makes this technology shine. Many of you have probably run into a situation involving a gate located far away from any type of infrastructure/building/etc. You may have power, or you may not. Options for securing that gate are limited. Maybe you have an elevator needing access control. You could have a traveler cable installed, but that can be very expensive. Wireless access control systems make both these dif�icult situations a little easier. Fortunately the technology has improved to the point where it is a very viable solution. Another dif�icult application that can be a good candidate for wireless access involves historic or old buildings. For various reasons, including aesthetic preservation or dangerous building materials like asbestos, it may not be practical/legal/allowable to pull cable through walls, ceilings, etc. Wireless access control was made for situations like this. Mustering is another application perfect for wireless access control, typically, organizations must purchase specialized equipment that will allow them to get a record of all people that are grouped in an www.ind-safety.com
emergency [e.g. safety areas following a �ire drill]. Wireless access control can be used to accomplish the same solution using current investment in access control and credentials. Like everywhere else in our industry, the application drives the solution. Whether that application is “traditional” security or something just a little bit different, wireless products give you an extra tool in your arsenal. So let’s talk about some other bene�its to be gained by going wireless. In addition to simply being able to go places wired access control products can’t, another huge bene�it to a wireless access infrastructure is beginning to become evident: low installation costs equaling faster return on investment (ROI). In this tight economy, some customers are �inding it easier to come up with the funding for wireless systems that can offer a greater bang for the buck and equal functionality as a wired system with a much lower total cost of ownership (TCO). With hardware costs running very close to other wired network-based products, the biggest savings are being realized in labor. The labor and materials savings with a wireless access control infrastructure offer a much more acceptable TCO. For a wide range of reasons, every door access control application should consider wireless, if for no other reason than a wireless locking solution takes 45 minutes to install versus an average of eight hours for a wired solution. That produces savings in materials, as there is no wire to install, and labor, as workers are in and out within the hour. The return on investment is immediate with the savings in labor. Additional savings can be obtained by using the wireless door lock with controller built inside that includes an internal proximity reader. The installation would require no cable runs at all. Another ROI opportunity is the removal of any possible damage to cables caused by other contractors or corrosion over time. In some cases, the ROI can be up to 50 percent over a wired solution. Some of the other bene�its of wireless have already been touched on, but are worth repeating. Having to trench to get to a remote location is always an expensive proposition. If that trench has to cross a parking lot, runway or other hard surface, the cost can double or triple. Being able to install a wireless link across those surfaces instead of digging up and replacing them can sometimes offer much more value than just saving money. INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
115
TECH TRENDS
Electronic access control systems : The revamped attitude Once the dealer has demonstrated the true costs to the customer associated with a site-managed system the customer realizes the relatively small monthly charge actually reduces the total cost of ownership (TCO) of an ACS. The true reason site-managed solutions are so prevalent today rests on the fact that MAC has simply not been offered as an option to the customer until recently.
T
he traditional, site-managed access control model where the customer purchases the hardware and software required to manage the electronic access control system (ACS) themselves has been accepted as the only way for more than 35 years. Customers assume that providing the resources to manage their ACS is the only option and do not understand all of the routine daily and regular maintenance tasks associated with managing the everchanging access control software database. The dealer’s sales staff is comfortable with proposing this model and looks forward to the (one-time) commission earned on the sale of ACS hardware and software.
116 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
As a result, security dealers wishing to increase the value of their ACS business should educate their sales staff. They need to start thinking more about the long-term value of the sale from the standpoint of RMR business, and how their own earnings can increase through recurring monthly commissions. At the same time, the security dealer needs to begin presenting the company as a service provider rather than simply an installer. The dealer needs to impress this concept upon both customers and sales personnel. With an effective education program, the security dealer can begin offering the MAC model as the only solution, especially for small ACS projects. Some security dealers and their sales staffs may be concerned about customer objections to a MAC service. They fear losing projects to their competition if they fail to overcome these objections or offer a site-managed solution. However, in reality, security dealers that have already implemented MAC have discovered that the customer actually has very few objections to accepting MAC versus a sitemanaged system. Once the dealer has demonstrated the true costs to the customer associated with a sitemanaged system the customer realizes the relatively small monthly charge actually reduces the total cost of ownership (TCO) of an ACS. The true reason site-managed solutions are so prevalent today rests on the fact that MAC has simply not been
offered as an option to the customer until recently. The sales staff needs to also understand how MAC can greatly improve their own �inancial success. Since a large part of the total sale price of the typical small- to medium-sized ACS project consists of the computer hardware and ACS required to establish and manage the system head-end, it’s understandable a commission-based salesperson would be concerned about reducing this one-time sale. But, considering that in today’s IT-centric environment many customers are now providing their own computer hardware, some of the overall sales price (and resulting commission) has been eroding away for some time. With the traditional, site-managed model, no matter how good a given month has been in terms of commissions earned from closing sales, the salesperson starts all over again from zero the next month. Just as MAC offers ever-increasing RMR to the security dealer’s bottom line, it also adds growing commission earnings to the salesperson’s paycheck.
Establishing Pricing Models
Developing pro�itable MAC pricing models or bundles is more complex than simply setting a monthly service fee applied to all MAC client accounts. Although the needs of most small ACS customers will be similar, as larger systems are proposed, it becomes very important to understand your customer and then set up a pricing strategy accordingly. www.ind-safety.com
TECH UPDATE
Although at �irst glance this appears to involve a signi�icant amount of effort, the good news is that MAC is generating such a buzz and demand is so high that dealers are likely to be able to maintain very lucrative pricing levels and pro�it margins. MAC pricing programs can generally be grouped into three categories: 1) bundled; 2) build your own; and 3) a la carte. The bundled option typically involves clearly de�ining a set of services that normally includes setup, system programming, adds/ changes/deletes of cardholders, and production of very basic activity reports E-mailed to the customer contact. This “�ixed-rate” plan is a good match for small systems of �ive to 10 entry points and limited numbers (100 or fewer) of cardholders, and works well for dealers that wish to offer one price to the customer when high management costs are not anticipated. The build-your-own option charges customers based on a matrix of doors, cardholders and maximum monthly change requests. Besides including the basic activity reports associated with the bundled option, a set number of ad-hoc or customized report requests will normally be included. This option is well suited for midsize clients (10-50 entry points and up to 1,000 cardholders) and ideal for dealers that want to actively manage the customer experience. The a la carte option is really a menu of add-on services to either the bundled or build-your-own options providing for additional services to the customer not already included in the standard billing package. Prices for these services are normally set at a premium to re�lect the more laborintensive nature of special requests. Some examples include remote www.ind-safety.com
locking/unlocking of entry points, granting access to remote sites at the customer’s request, after-hours system management and responding to activity report requests outside of normal business hours. When the dealer also offers photo-ID badge production services to the customer, the creation of additional badges above the number included in a basic package would also be assessed as an a la carte charge. Assistance with developing MAC pricing models is certainly something the security dealer should expect from the vendor they partner with to provide the hardware and ACS products required to implement MAC.
MAC Marketing and Rollout
Once the decision has been made to roll out MAC services, the security dealer now needs to prepare for success. The �irst major step is identifying an ACS provider to become a strong partner with the dealer. Many ACS products can be con�igured for MAC implementation; however, they must incorporate the features described in Part 2 of this series, including database partitioning, and strong operator login and accountability features. The chosen ACS provider should certainly possess a �irm command of how MAC is implemented and marketed, as well as be able to demonstrate this understanding through experiences in successfully assisting other security dealers to grow their businesses in this area. Prior to rollout, targets should be developed and included in a basic marketing plan. This can comprise a well de�ined list of potential clients, �irst from the dealer’s current customer list, then from lists of potential customer applications that will realize the most bene�it from MAC.
It is also important to project the number of new accounts expected each month to assist in determining the needs of the initial MAC center infrastructure and RMR growth. This projection should demonstrate to the sales staff the expected commission earning potential. Comparing the planned growth of RMR against the investment for hardware, software, Internet connectivity and support personnel training will ensure that pricing options will result in an acceptable return on investment (ROI). Marketing implementation devices should include customer presentations, pricing option schedules, system planning checklists and live customer demonstration tools. The good news is a well prepared ACS supplier should have most, if not all, of these items and more ready in template form for the dealer’s use in customizing its own services.
Why Not Get on Board Today?
Many examples of hosted services have developed during the past �ive years. This trend is clear in how businesses are moving the administration and support of mission-critical point-of-sale, accounting and management information services from internal operations to external service providers. This all ties in to the Software as a Service (SaaS) movement, which has created a buzz in the IT industry. Traditional security dealers that developed RMR streams have had a much better time weathering the current economic situation. Now is the time for the security dealer that has been offering traditional, sitemanaged ACS to begin increasing the true value of its access control business through managed access control. INDUSTRIAL SAFETY REVIEW | APRIL
2013 |
117
TECH TRENDS
IT/IP trend in access control business Security devices are now just another part of the corporate culture, and the value proposition for access control is now deeply ingrained into both the building administrator and system users. Building administrators know why they want access control and how they want it used, but they aren’t ready to take on the task of putting it in themselves. This is, after all, a big investment.
T
he biggest technology shift in access control and video security in the last 10 years has not been the move to IP/IT devices, which was and still is a necessity. The real change impacting every new product is customercentric design. Long gone are the days when manufacturers ventured into the night to provide a service that few people understood and even fewer knew they needed. Today the products that gain the greatest amount of usability are not just because of the technology deployed. Dare I say, they are developed around what the customer is asking for. Security devices are now just another part of the corporate culture, and the value proposition for access control is now deeply ingrained into both the building administrator and system users. Building administrators know why they want access control and how they want it used, but they aren’t ready to take on the task of putting it in themselves. This is, after all, a big investment. Manufacturers are now starting to realize that the customer drives the business. Long gone are organizations where the primary driving force is a “cool new technology” developed in someone’s garage that now needs a market. Security market is mature, and manufacturers understand the growing trend to be market-driven. So the question for manufacturers now is, “How do I get closer to what my customer needs?” Some of those answers fall into the IP/IT space. Consumers are forced daily to learn new technologies in the IP/IT market space. Whether it be
118 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Is IT/IP a trend? Yes. Are IT/IP devices and policies the number one trend in the market? Not any longer. They are currently just part of the mandatory feature list. So what is the “next big thing?” It’s the consumer. You are driving the business now. And it’s about time.
a new VoIP phone system, a new wireless system in a campus infrastructure or even just new ways to control information �low on the corporate network, every computer now has a window open to the Internet. The IP/IT market is one of great technological advancements, and there is growing commoditization. The savvy security manufacturer understands that serving the market involves embracing standards and understanding that the end-user can and should know how a security system works. Once one has come to that realization, development can begin on products that not only gain consumer acceptance by using base technologies already being adopted, but also expands the consumer’s options for choosing installation companies. This widens the range of personnel who can administer the system. And the security manufacturers gain by having a much larger resource and talent pool of engineers, marketers and sales personnel to bring the “next big thing” to market. www.ind-safety.com
TECH UPDATE
I N D U S T R Y U P D A T E
TECHNOLOGY s
Detecting combustible & toxic gases in HVAC ducts
120
s
How to select a flame detector
122
s
Maintaining catalytic combustible gas detectors
125
www.ind-safety.com
INDUSTRIAL SAFETY REVIEW | APRIL 2013 | 119
TECH TRENDS
Detecting combustible & toxic gases in HVAC ducts Three key challenges regulate the design of gas detectors for duct applications: Air velocity, dilution, and stratification. Since air flows turbulently through ducts at 2,000 – 6,000 ft/min (23 – 68 mph), sensors must be designed to withstand high ventilation rates.
A
ir handling systems are used throughout industry to provide comfort and health in manned areas. From systems that deliver fresh air in con�ined spaces to HVAC systems in living quarters, exhaust / ventilation systems form part of the essential safety services of chemical process and petroleum facilities. Nevertheless, if unprotected, facility ventilation systems can transport combustible and toxic gases from a source area to other parts of the building, bringing the dangerous substances into non-hazardous areas, like control rooms, living quarters, electrical switch rooms, and equipment rooms. Because of the potential for the inadvertent transport of dangerous substances, government agencies, industry groups and many leading companies have established procedures for exhaust/ ventilation system safety. One important element in the protection of these systems is gas detection. Gas detectors reduce the risks from releases through early detection, indicating a supervisory signal to a constantly attended location and initiating an appropriate automatic protective response. Activation of a sensor, for example, can cause an alarm signal and lead to HVAC shutdown
120 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
and activation of damper controls to prevent the ingress of toxic gas clouds into work spaces. Three key challenges regulate the design of gas detectors for duct applications: Air velocity, dilution, and strati�ication. Since air �lows turbulently through ducts at 2,000 – 6,000 ft/min (23 – 68 mph), sensors must be designed to withstand high ventilation rates. Electrochemical sensors, which rely on the generation of current in an electrolytic solution to measure gas concentration, must be well sealed to prevent evaporation, particularly when exposed to dry air. Other sensors like catalytic and solid state devices must be able to control optimum reaction temperatures in the presence of strong air currents or have protective covers (splash guards, screens, or sinters) to prevent air from impinging directly on sensor elements. A second challenge for gas sensing in HVAC systems is dilution. As air enters the duct network, it typically mixes with circulated air, which dilutes gas concentration several times. As a result, gas sensors tailored for duct applications must be highly sensitive. Low detection limits enable operators to set warning and alarm set points at a few parts per million, as low concentrations of detected gas may be indicative of much higher concentrations in the air stream. Last, strati�ication presents a severe risk for gas detection. Since duct networks contain bends, expansions, contractions, and other features, uniform air �low in the cross section area is hardly ever the norm. Sudden contractions and expansions can create eddies where gases can accumulate, leading to the improper sampling of air. Gas strati�ication appears to have been at the source of an incident on the Brae Alpha platform in the North Sea and the subject of an investigation into the placement of www.ind-safety.com
TECH UPDATE
�lammable gas detection systems in offshore installations. To prevent the risk of failures to detect gas as a result of uneven mixing, detection systems are designed with extended sampling lengths or distributed across the duct width to ensure optimal area coverage. To mitigate the adverse effects of air velocity, gas dilution, and uneven mixing, plant safety professionals suggest detectors be installed in the main supply duct on the downstream side of the �ilters to automatically shut off the supply fans. In some instances, a second set of sensors can be installed on the downstream side of the return in order to increase area coverage within the HVAC system. In general, the detectors should be installed between 6 and 10 duct diameters of straight, uninterrupted run and downstream from any duct openings, de�lection plates, sharp bends, and connections, as these may produce an uneven distribution of contaminants in the air �lowing through the duct. To illustrate detector placement in a duct application, consider the sketch below. As shown, detectors are installed after the fans, �ilters, chillers, heaters and humidi�iers. In this arrangement, if a gas detector senses gas, the fan system will be turned off and the dampers closed, preventing the mixture from being distributed through the air handling system to unaffected areas of the facility. Alternatively, the detectors may be placed in the outdoor air supply to sense if the gas is being ingested into the HVAC inlet. In such case, the detectors would prompt the safety
www.ind-safety.com
system to close the outdoor air damper, permitting the rest of the exhaust/ventilation system to operate without interruption. Maintenance and accessibility are important factors in the design of online gas detection systems. Dust, dirt and other debris can gather in the sensor’s protective screen or splash guard and reduce access to the sensor element, particularly with sensors mounted inside ducts. As a result, gas monitors should be tested and maintained at regular intervals. Maintenance should include inspection of the device to ensure it samples the air stream, calibration and test at low detection limits; the latter one as a provision against the possibility the gas is distributed unevenly across the air stream. With the growing acceptance of ISA 84, a large number of facilities have chosen to increase the safety integrity level (SIL) of safety instrumented functions by increasing redundancy or decreasing sensors’ functional test intervals. For this reason, plant safety personnel have dedicated greater resources to establishing methods that are fast and convenient, employing, for example, set-ups that allow easy access to the instruments or permit remote testing and calibration. Exhaust/ventilation systems are often exposed to the ingress of smoke, combustible and toxic gases from hazardous areas. To reduce their vulnerability, these systems are often equipped with gas sensors, which are installed in a manner that anticipates the adverse effects of ventilation rate, dilution and strati�ication in order to detect gas accumulations in the low parts per million. As shown in the diagram above, sensors can be installed downstream from the �ilters as air comes in from the outside and downstream of the air return. Sensors should be mounted along the duct cross section in order to ensure optimal area coverage and static mixers are introduced to prevent gas strati�ication. Where mixing elements cannot be installed, sensors should be located immediately outside the HVAC duct. INDUSTRIAL SAFETY REVIEW | APRIL 2013 | 121
TECH TRENDS
How to select a flame detector
False alarm rejection is one of the most important considerations for the selection of flame detectors. False alarms are more than a nuisance -they are both a productivity and cost issue. It is therefore essential that flame detectors discriminate between actual flames and radiation from sunlight, lightning, arc welding, hot objects, and other non-flame sources.
P
rocess and plant engineers in the oil and gas industry and a wide range of other hazardous process and manufacturing industries require continuous �lame monitoring equipment to prevent catastrophic �ires. In order to select such detection equipment, users should understand the principles of �lame detection and review the types of detectors available today. Armed with this knowledge they will be better able to match the appropriate �lame detector to process and site performance requirements and to the type of hazard whose consequences the instrument is designed to mitigate.
Typical Flame Hazards
The range of potential �lammable hazards is expansive and growing as materials and processes become more complex. Increasingly sophisticated �lame sensing technologies with embedded intelligence are required to detect the most common industrial fuels: s Alcohols s Diesel s Ethylene s Gasoline s Hydrogen s Jet Fuels s Kerosene s LNG / LPG s Paper / Wood s Solvents s Sulfur s Textiles
Principles of Flame Detection
Most �lame detectors identify �lames by so-called optical methods like ultraviolet (UV) and infrared (IR) spectroscopy and visual �lame imaging. Flames in a re�inery, for example, are generally fueled by hydrocarbons, which when supplied with oxygen and an ignition source, then produce heat, carbon dioxide, and other products of combustion. The intense reaction is characterized by the emission of visible, UV, and IR radiation. Flame detectors are designed to detect the absorption of light at speci�ic wavelengths, allowing them to discriminate between �lames and false alarm sources. 122 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
www.ind-safety.com
TECH UPDATE
Flame Sensing Technologies
There are four primary optical �lame-sensing technologies in use today: ultraviolet (UV), ultraviolet/infrared (UV/ IR), multi-spectrum infrared (MSIR), and visual �lame imaging. They are all based on line-of-sight detection of radiation emitted in the UV, visible, and IR spectral bands by �lames (see Figure 1). Technologies may be selected to suit the requirements of �lame monitoring applications, including detection range, �ield of view (FOV), response time, and particular immunity against certain false alarm sources.
UV Flame Detectors
UV detectors respond to radiation in the spectral range of approximately 180-260 nanometers. They offer quick response and good sensitivity at comparatively short ranges (0–50 ft). Because they are susceptible to arc www.ind-safety.com
welding, halogen lamps, and electrical discharges like lightning, they tend to be used indoors. Thick, sooty smoke can also cause failures due to attenuation of the incident UV radiation.
UV/IR Flame Detectors
When a UV optical sensor is integrated with an IR sensor, a dual band detector is created that is sensitive to the UV and IR radiation emitted by a �lame. The combined UV/ IR �lame detector offers increased immunity over the UV detector, operates at moderate speeds of response, and is suited for both indoor and outdoor use. As with UV detectors, however, the detection range of these instruments may be reduced by heavy smoke.
Multi-Spectrum Infrared Flame Detectors
Multi-spectrum IR �lame detectors use multiple infrared spectral regions to further improve differentiation INDUSTRIAL SAFETY REVIEW | APRIL 2013 | 123
TECH TRENDS
of �lame sources from non-�lame background radiation. These �lame detectors are well suited to locations where combustion sources produce smoky �ires. They operate at moderate speed with a range of up to 200 feet from the �lame source -- both indoors and outdoors. These instruments exhibit relatively high immunity to infrared radiation produced by arc welding, lightning, sunlight, and other hot objects that might be encountered in industrial backgrounds.
Visual Flame Imaging Flame Detectors
Visual �lame detectors employ standard charged couple device (CCD) image sensors, commonly used in closed circuit television cameras, and �lame detection algorithms to establish the presence of �ires. The imaging algorithms process the live video image from the CCD array and analyze the shape and progression of would be �ires to discriminate between �lame and non-�lame sources. Unlike IR or UV �lame detectors, CCTV visual �lame detectors do not depend on emissions from carbon dioxide, water, and other products of combustion to detect �ires, nor are they in�luenced by �ire’s radiant intensity. As a result, they are commonly found in installations where �lame detectors are required to discriminate between process �ires and �ires resulting from an accidental release of combustible material. Despite their advantages, visual �lame detectors cannot detect �lames that are invisible to the naked eye such as hydrogen �lames. Heavy smoke also impairs the detector’s capacity to detect �ire, since visible radiation from the �ire is one of the technology’s fundamental parameters. 124 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
Industrial Process and Plant Flame Detection Requirements
When con�iguring a �lame detection system for a plant and evaluating the various �lame detection technology alternatives available today, it is useful to consider the following �lame detector performance criteria: s False Alarm Immunity s Detection Range s Response Time s Field of View s Self Diagnostics
False Alarm Immunity
False alarm rejection is one of the most important considerations for the selection of �lame detectors. False alarms are more than a nuisance -- they are both a productivity and cost issue. It is therefore essential that �lame detectors discriminate between actual �lames and radiation from sunlight, lightning, arc welding, hot objects, and other non-�lame sources.
Detection Range Response Time
and
A �lame detector’s most basic performance criteria are detection range and response time. Depending on a speci�ic plant application environment, each of the alternative �lame detection technologies recognizes a �lame within a certain distance and a distribution of response times. Typically the greater the distance and the shorter the time that a given �lame sensing technology requires to detect a �lame, the more effective it is at supplying early warning against �ires and detonations.
Field of View
Detection range and FOV de�ine area coverage per device. Like a
wide angle lens, a �lame detector with a large �ield of view can take in a broader scene, which may help reduce the number of �lame detectors required for certain installations. Most of today’s �lame detector models offer �ields of view of about 90° to 120°.
Self Diagnostics
To meet the highest reliability standards, continuous optical path monitoring (COPM) diagnostics are often built into optical �lame detectors, like those manufactured by General Monitors. The self-check procedure is designed to ensure that the optical path is clear, the detectors are functioning, and additionally, the electronic circuitry is operational. Self-check routines are programmed into the �lame detector’s control circuitry to activate about once every minute. If the same fault occurs twice in a row, then a fault is indicated via the 0-20 mA output or a digital communications protocol like HART or Modbus.
Conclusions
After gaining a better picture of the potential �lame hazard, the principles of �lame detection, and the types of �lame detection technologies available today, users will be in a better position to select a �lame detector. De�ining the requirements for an application is also essential, as such factors as the type of fuel, minimum �ire size to be detected, and the con�iguration of the space to be monitored can in�luence the choice of instrument. To this end, it is often helpful to set up a simple comparison chart of process or plant requirements and then review two or three potential �lame detectors against the application criteria. The following chart has been designed to help users begin the �lame detector selection process. www.ind-safety.com
TECH UPDATE
Maintaining catalytic combustible gas detectors
Even the best of safety monitoring equipment requires periodic inspection. There must be a maintenance plan in place with documented procedures, a regular schedule of inspections, repair or replacement activity as necessary, problem reporting, etc.
I
n oil / gas and petrochemical production, re�ining, transportation and distribution facilities, safety is always of paramount concern due to the combustible nature of hydrocarbon-based products. All such facilities must install combustible gas monitoring systems to protect people and equipment. After selecting and installing catalytic bead sensors, maintenance is an ongoing task that requires periodic attention to ensure a safe work environment.
Maintenance Requirements
Even the best of safety monitoring equipment requires periodic inspection. There must be a maintenance plan in place with documented procedures, a regular schedule of inspections, repair or replacement activity as necessary, problem reporting, etc. It is important to train employees to know when inspection is necessary and what type of maintenance procedures must be performed on a speci�ic type or model of gas detector. Catalytic type combustible gas detectors require a routine “check” every 90 days under normal operating conditions. To verify the proper operation of a catalytic gas sensor, it is necessary to apply a known concentration of gas to the sensor. This is usually done manually at the site with gas supplied from a small lecture bottle. As the sensor reacts to the calibration gas, adjustments are made to the monitoring system to bring its calibration into agreement with the known concentration of the calibration gas. This is a simple process and usually requires 1-3 minutes. It is critically important to recognize that the maintenance of catalytic bead sensors varies depending on environmental conditions and levels of gas exposure. In hot and humid environments, such as those in many parts of Asia, the Middle East, Africa and Latin America, they require more frequent inspections to ensure that the sensors are operating effectively. Excessively dusty www.ind-safety.com
INDUSTRIAL SAFETY REVIEW | APRIL 2013 | 125
TECH TRENDS
and/or dirty environments can be a problem as well. If during operation, these sensors are also exposed repeatedly to high levels of hydrocarbon gas in the �ield, it can increase maintenance requirements and reduce the potential life of these products.
Remote Gas Calibrator
At times, catalytic type gas detectors are mounted in dif�icult to reach locations and operate under extreme conditions on compressor stations, drilling rigs, pumping stations, gas turbines and other equipment. Such locations often require expensive catwalks or scaffolding to reach them or equipment shutdowns to perform calibration. General Monitors now offers a unique High Temperature Remote Gas Calibrator (HTRGC) that allows the calibration gas to be applied to the catalytic bead sensor
from more easily accessed locations
and without having to perform equipment shutdowns.
The HTRGC blocks ambient air
and redirects methane or other light hydrocarbon gases to the catalytic bead sensor for calibration or for testing sensor accuracy in various
environments. The HTRGC uses
50% LEL methane or other light hydrocarbon gas, and it operates in wind conditions up to 45 mph and at
temperatures up to 204°C (requires optional high temperature sensor and housing). No electrical wiring
or connections are required with the HTRGC.
S4000CH Combustible Gas Detector Our Model S4000CH Intelligent
Combustible Gas Detector is a microprocessor-based transmitter
designed for use with our catalytic bead sensors. Among its features is one person calibration and it selfcalibrates by simply activating a magnetic switch and applying gas. Understanding
maintenance
proper
requirements
and
procedures is essential to maintain the safety of people and equipment in
hazardous industries. The improper maintenance of gas monitoring
systems of all types can result in expensive repairs or even the loss of life. At General Monitors, your safety
is our �irst priority and our technical experts are available to help you not only develop the best gas monitoring strategy for your facility, but also to
help guide you through the proper installation and maintenance of our gas detectors. 126 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
www.ind-safety.com
PROJECT UPDATE Latest Project updates for Fire Safety & Electronic Security Vendors
PROJECT INDEX Sr. No.
Project Category
Pg.No.
1.
HOSPITALITY
128
2.
ROADS / HIGHWAYS / BRIDGES
129
3.
SHOPPING MALL
130
4.
EDUCATION
131
5.
PORTS & SHIPPING
132
6.
TOURISM
132
7.
RAILWAYS
133
A new initiative by INDUSTRIAL SAFETY REVIEW A professional magazine for people in profession
PROJECT UPDATE
Renu Kakkar, Corp Comm, Apeejay House, 15 Park Street, Kolkata- 700016. Tel : 033-44035455-58,22499000, Fax: 033-22172075, M: 9980946435, E-mail: rkakkar@apeejaygroup.com,
HOSPITALITY
P
lans to construct budget hotels at Amarkantak, Maheshwar, Ujjain, Omkareshwar, Chitrakoot, Orchha, Maihar, Panna, Mandla, Multai, Salkanpur and Mandleshwar. Location : Madhya Pradesh Government of Madhya Pradesh Om Vijay Chaudhary, General Manager-Public Relations, Paryatan Bhawan, Bhadbhada Road, Bhopal - 462003. Tel : 0755-4027100, Fax : 0755-2779476, 2774289, E-mail: ovchaudhary@mptourism.com
P
lans to construct a �ive star hotel after demolishing Government circuit house and PWD Rest house sprawling over 2 acre. land has been handed over to private players under the ‘Public Private Partnership’ scheme. Location :Punjab Punjab Infrastructure Regulatory Authority 5th Floor, Punjab Civil Secretariat, Government of Punjab, Chandigarh, Punjab, Tel: 0172-2740354, Fax: 0172-2740354
T
he hotel group is developing 170 rooms property at Cochin. This will be ready by the middle of the year. Funding is done through internal accruals. Location : Cochin, Kerala Apeejay Surrendra Park Hotels Mr. Vijay Dewan, MD
128 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
T
he hotel group is developing 250 rooms property at Pune. Funding is done through internal accruals. Location : Pune, Maharashtra Budget : Rs. 350 crore Apeejay Surrendra Park Hotels Mr. Vijay Dewan, MD Renu Kakkar, Corp Comm, Apeejay House, 15 Park Street, Kolkata 700016. Tel : 033- 44035455-58, Fax : 033-22172075, M: 9980946435, E-mail: rkakkar@apeejaygroup.com
S
peciality Restaurants, the country’s largest chain of �ine dining eateries plans to increase thier footprint by setting up 15-16 standalone restaurants in metros and tier I & tier II cities. The work has started on some of these projects. Speciality Restaurants Ltd. Anjan Chatterjee, Founder & MD Sambede Lahiri, Manager-Business Development, B/25, Morya Landmark - 1, 4th Floor, Veera Industrial Estate, Off New Link Road, Andheri (West), Mumbai - 400053. Tel : 022-33416700 /6701, E-mail: sambede@hotmail.com
T
he wholly-owned subsidiary of Indian Hotels Company that operates Ginger Hotels is expanding it’s footprint by going ahead to set up 50 Ginger Hotels by 2015. Roots Corporation Ltd. P K Mohankumar, MD and CE Parvesh Verma, Project Head, Ginger Corp Of�ice, Godrej & Boyce Complex, Gate no. 8, Plant no. 13 Of�ice Building, Vikhroli (E), Mumbai 400079. Tel: 022-67773366, ext: 315, Fax : 022-67773377
www.ind-safety.com
PROJECT UPDATE
T
he hotel group is developing 100 rooms property at Jaipur. Funding is done through internal accruals. Location : Jaipur, Rajasthan Budget : Rs. 100 crore Apeejay Surrendra Park Hotels Mr. Vijay Dewan, MD Renu Kakkar, Corp Comm, Apeejay House, 15 Park Street, Kolkata 700016. Tel : 033- 44035455-58, Fax : 033- 22172075, M: 9980946435, E-mail: rkakkar@apeejaygroup.com,
T
he hotel group is developing 350 rooms property at Kolkata. This would be their second hotel in Kolkata. Funding is done through internal accruals. Location : Kolkata, West Bengal Budget : Rs. 500 crore Apeejay Surrendra Park Hotels Mr. Vijay Dewan, MD Renu Kakkar, Corp Comm, Apeejay House, 15 Park Street, Kolkata 700016. Tel : 033- 44035455-58, Fax : 033-22172075, M: 9980946435, E-mail: rkakkar@apeejaygroup.com,
ROADS / HIGHWAYS / BRIDGES
P
lans construction of �lyover from Lala Lajpatrai Marg to G.B. Pant Chowk on Gopalrao Deshmukh Marg (Pedder Road), Mumbai. Location : Mumbai, Maharashtra Maharashtra State Road Development Corporation Ltd A. V. Deodhar, Chief Engineer,
www.ind-safety.com
MSRDC Bandra Worli Sea Link Project of�ice, Opp.Bandra Reclamation Bus Depot, Near Lilavati Hospital, K.C.Marg, Bandra (West)-400050, Tel : 022-26558175/76, 26400190/201, 26433908, 26517900, Fax : 022-26417893
P
lans construction of three Foot Over Bridges in Kalyan City on the Bhiwandi Kalyan Shil Phata Highway on BOT Basis. Location : Kalyan, Maharashtra Maharashtra State Road Development Corporation Ltd A. V. Deodhar, Chief Engineer, MSRDC Bandra Worli Sea Link Project of�ice, Opp.Bandra Reclamation Bus Depot, Near Lilavati Hospital, K.C.Marg, Bandra (West)-400050, Tel : 022-26558175/76, 26400190/201, 26433908, 26517900, Fax : 022-26417893
P
lans to construct railway over bridges under Sambalpur and Balasore division on BOT basis. Feasibility study would be conducted shortly. Location : Sambalpur, Orissa Government of Odisha, Public Work Department N K Pradhan, Chief Engineer Samid Hota, Executive Engineer, Nirman Soudha, Keshari Nagar, Unit V, Bhubaneswar - 751 001, Orissa. Tel : 0674-2396783, Fax : 0674-2390080. M: 9861197797 E-mail: pmuosrp@gmail.com
P
lans construction of bridge across Patchaiyar River of road branching at km.0/2 of Keelasadayamankulam Panankulam (via) Apparkulam road. Location : Tamil Nadu Nabard & Rural Roads. Highways Department Thiru P. Packiam, Chief Engineer (H), Nabard & Rural Roads, Sidco Complex, Electronics Building, Guindy, Chennai-32, Tel : 044-22500158, Fax : 044-22500158,
INDUSTRIAL SAFETY REVIEW | APRIL 2013 | 129
PROJECT UPDATE
E-mail: cenabardandrr@yahoo.com 2) Nabard and Rural Roads, Circle, Tirunelveli-2, Tamil Nadu,
R
e-construction of minor bridge at km 58/10 of Kovilpati-Ottapidaram-Pudukottai - Eral-Mukkani Road. Location : Tamil Nadu Nabard & Rural Roads. Highways Department 1) Thiru P. Packiam, Chief Engineer (H), Nabard & Rural Roads, Sidco Complex, Electronics Building, Guindy, Chennai-32, Tel : 044-22500158, Fax: 044-22500158, E-mail: cenabardandrr@yahoo.com 2) Nabard and Rural Roads, Circle, Tirunelveli-2, Tamil Nadu,
Fax : 022-24096883, M: 09821316943,
T
he work is underway for upgradation of road corridors in Chandigarh. Location : Chandigarh, U.T.) Chandigarh Municipal Corporation Sanjay Arora, Executive Engineer, 1012, Sector 8, Chandigarh (UT), M: 09915711456, E-mail: cp2division@gmail.com
P
lans four laning and strengthening of Chandannagar to Dankuni section of SH 13 (approx. Chainage: km 642+60 to km 663+40). RFQ is invited in this regard from companies to undertake mechanized construction of highway project on EPC basis. Location : Dankuni, West Bengal West Bengal Highway Development Corporation Ltd Shankar Rai Choudhary, Chief Engineer-Roads, 4th & 5th Floor, HRBC Bhavan, Munsi Premchand Sarani, Kolkata - 700021, West Bengal, Tel : 033-22145959, Web: www.wbhdcl.gov.in
B
agged an order from NHAI for two laning with paved shoulder of Karaikudi- Ramanathapuram section NH210 from km 94.000 to km 174.000 in Tamil Nadu to be executed as DBFOT (Annuity) basis under NHDP Phase-lll (Length 80 km). The Concession Period of the project is 15 years including construction period of 2 years. Location :Karaikudi, Tamil Nadu Budget : Rs. 382 crore Sadbhav Engineering Ltd Mr. Vishnubhai M Patel, MD S V Kamat, CEO, 602/702, C Wing, Godrej Coliseum, Behind Everard Nagar, Sion (East), Mumbai – 400022. Tel :022- 24095887,
130 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
SHOPPING MALL
T
hrissur based company is coming up with a centrally air-conditioned shopping mall covering 10,000 sq ft. This mall will cater to all IT requirements of customers. So far around 90% of the project work is completed. The mall will be ready by May 2013. Location : Thrissur, Kerala E Zone ITD Services Jyoti Shankar, Executive DirectorOperations, Centre Point, M G Road, Thrissur - 680004, Kerala, Tel: 09249437166, E-mail: mail@ezoneit.in
T
he real estate arm of Larsen and Toubro Ltd has recently opened Elante - a shopping mall in Chandigarh. The mall has 1.15 million sq. ft of retail space and is part of a 20-acre mixed-use development project that also comprises a �ive-star hotel and an of�ice complex. www.ind-safety.com
PROJECT UPDATE
Location : Chandigarh (U.T.)
L&T Realty Ltd. Mr. Shrikant Joshi, Chief Executive, L&T Business Park,Tower A, Gate No. 5, Saki Vihar Road, Mumbai Campus, Mumbai 400072. Tel : 022-67058990, Fax : 022-67058903, E-mail: shrikant.joshi@larsentoubro.com
Nagpur and Latur regions. Location : Maharashtra Budget : Rs. 458 crore IL&FS Education & Technologies Services Ltd. RCM Reddy, CEO & MD Aishwarya Barde, Sr Manager, Aditya Textile Inds. Compound, Corduroy Building, 2nd Floor, Safed Pool, Kurla Andheri Road, Mumbai 400072, Maharashtra. Tel : 022-67809292, Fax : 022-67809222
B EDUCATION
B
agged an order from School Education Department, Government of Maharashtra for implementation of ICT for 850 schools in areas like Ratnagiri, Sindhudurg and Kolhapur. The work has started. Location : Maharashtra Budget : Rs. 152 crore Birla Shloka Edutech Ltd Mr. Vijay Mishra, CEO Dilip Laad, Project Co-ordinator, Melstar House, G-4, MIDC Cross Road ’A” , Andheri East, Mumbai -400093. Tel: 022-33067777, Fax: 022-28316258, E-mail: marketing@shlokaybg.com
B
agged an order from School Education Department, Government of Maharashtra for implementation of ICT for 2,560 schools of Nasik, Aurangabad, Amravati,
www.ind-safety.com
agged an order from School Education Department, Government of Maharashtra for implementation of ICT for 1,590 schools in Mumbai, Greater Mumbai, Navi Mumbai and Pune. This will be implemented over �ive year period. Location : Maharashtra Budget : Rs. 284 crore Core Education & Technologies Ltd. Mr. Sanjeev Mansotra, Chairman & CEO Rajeev Pandey, Vice President, Lotus Business Park, 10th �loor, Plot No. C-21, Dalia Industrial Estate, Off Link Road, Andheri (W), Mumbai - 400053. Tel : 022-33066800, Fax : 022-33066880, E-mail: rajeev.pandey@core-edutech.com
P
lans to set up Future School of Architecture and Design in Kolkata. Location : Kolkata, West Bengal Budget : Rs. 30 crore Future Institute of Engineering and Management Prof Mousumi Ghosh, Director Asif Chaudhary, Project Co-ordinator, Sonarpur Station Road, Kolkata -700150. Tel : 033- 24345640, 24345615 M: 9830088984, Fax : 033-24345641, E-mail: �iem@teamfuture.in
INDUSTRIAL SAFETY REVIEW | APRIL 2013 | 131
PROJECT UPDATE
private partnership (PPP) mode for a period of 10 years. The capacity would be increased by 8.72 million tonnes (mt). The work will start in 6 months from date of the award of concession. Location :Tuticorin, Tamil Nadu Budget : Rs. 49.20 crore V.O. Chidambaranar Port Trust S Natarajan, Chairman Ashok Kumar, DGM-Cargo Handling Division, Tuticorin - 628004, Tamil Nadu. Tel : 0461-2372864, 2352290 (50 Lines), Fax : 0461-2354274, E-mail: ce@tuticorinport.gov.in
PORTS & SHIPPING
P
lans are on to augment/create worldclass facilities as the Centre has decided to designate it as a transshipment hub. Location : Visakhapatnam, Andhra Pradesh Budget : Rs. 13940 crore Visakhapatnam Port Trust Laxminarayana, Executive Engineer- Projects, Engineering Department,3rd Floor, AOB, Visakhapatnam - 530035. Tel : 0891-2565289, Fax : 0891-2565023
T
he company is setting up a bulk liquid terminal with 19 tanks totalling storage capacity of 60,190 klh. The �irst phase having storage capacity of 15,100 kl (kilolitre) is commissioned recently. Location : Pipavav, Gujarat Aegis Group Sachin Chati, Manager (Projects), 403, Peninsula Chambers, Peninsula Corporate Park, GK Marg, Lower Parel (W), Mumbai - 400013. Tel : 022-25528357, 25544832, 66663666, E-mail: secretarial@aegisindia.com
P
lans for deepening the entrance channel to 16 metre from the present 14 metre. After which the port can allow up to 150,000 DWT (deadweight tonnage) vessels as against current capacity of only 70,000 DWT vessels. The dredging project will be complete by December 2014 Location : Kakinada, Andhra Pradesh Budget : Rs. 650 crore Kakinada Deep Water Port Capt. Jacob Satyanarayana, General Manager (Operations), 2nd Floor,Port Administrative Building, Beach Road, Kakinada - 533 007. Andhra Pradesh. Tel : 0884 - 2365089 &2365889, Fax : 0884 - 2385402/03/04 E-mail: capt@kakinadaseaports.in
P
lans to increase its cargo handling capacity by providing 2 harbour mobile cranes under the public-
132 | APRIL 2013 | INDUSTRIAL SAFETY REVIEW
TOURISM
P
lans construction of Indian Institute of Skiing and Mountaineering at Gulmarg, Kashmir. Location : Jammu & Kashmir www.ind-safety.com
PROJECT UPDATE
Ministry of Tourism, Govt of India Talat Parveez (KAS), Director Tourism, Kashmir Tourist Reception centre, Srinagar-190001 (J&K). Tel: 0194- 2472449, Fax : 0194-2479548, E-mail: dtk@jktourism.org
P
lans construction of tourist information center & tourist facility center at Udhewadi, Khandala. Completion period: 12 months. Location : Pune, Maharashtra Budget : Rs. 1.03 crore Maharashtra Tourism Development Corporation Ltd. Mr. Jagdish Patil, MD Raju Thanage, Deputy Engineer, CDO. Hutments, Madame Cama Road, Mumbai-400020, Tel : 022-22023472, 22044040, Fax : 022-22852182. M: 8879222019, E-mail: rlthanage@hotmail.com,
T
he development of back water circuit in Alappuzha in back water region as a mega circuit in Kerala. The project involve construction of house boat terminals at Arookutty, Thaneermukkom, Pallathuruthy, Nedumudi, Kanjipadam, Thottappally and Kaymkullam; Night Halt Terminals at Vattakayal West and Karumadi Vilakkumaram; development of micro destinations, development of beaches, development of Alappuzha town as the central destination of the circuit. Location : Kerala Budget : Rs. 47.62 crore Govt of Kerala, Tourism Department S Sheeja, PRO, Park View, Thiruvananthapuram, Kerala-695033, Tel : 0471-2560433, 2321132 Fax : 0471-2322279, E-mail: info@keralatourism.org, deptour@keralatourism.org
www.ind-safety.com
RAILWAYS
S
etting up of electric locomotives factory at Dankuni, West Bengal. In this regard the work is underway and includes construction of sheds, structures, water supply arrangement, sewerage, drainage, roads, track, s&t, power supply arrangement, general electrical and ohe works and supply, erection & commissioning of machinery & plant, etc. Location : Dankuni, West Bengal Rail Vikas Nigam Ltd. Rajesh Prasad, CPM-Majherhat, Kolkata, West Bengal, Tel : 033-24247331, E-mail : rajeshpra@rvnl.org
P
lans to revive the old railway station formerly known Ernakulam Railway Goods Station. Plans to have six platforms and three pit lines at the station. Location : Ernakulam, Tamil Nadu Budget : Rs. 100 crore Southern Railways V .J. Accamma, CPRO, General Branch, 1st �loor NGO main Building, Southern Railway, Park Town, Chennai-600003. Tamil Nadu, Tel : 044-25353455, M: 09003160080
INDUSTRIAL SAFETY REVIEW | APRIL 2013 | 133
ADVERTISERS INDEX COMPANY NAME
PAGE NO.
PAGE NO.
HID GLOBAL
A ADIT GROUP
COMPANY NAME
27
29
COMPANY NAME
PAGE NO.
PRAMA HIKVISION INDIA PVT. LTD.
BACK PAGE
I PROLITE AUTOGLO LIMITED
ADITYA INFOTECH LTD.
FRONT GATEFOLD
IBEX GALLAGHER PVT. LTD.
25
IFE (INDIA) FIRE DIRECTORY
99 39
AGNI INDUSTRIAL FIRE SERVICES PVT. LTD.
65
INCEPT
AKTION SAFETY SOLUTIONS
51
INDIA INTERNATIONAL SECURITY EXPO 2013
ALLIED SAFETY EQUIPMENTS PVT. LTD.
30
INTEGRATOR LEADERSHIP SERIES 2013
ANSELL LIMITED
41
AVP SOLUTIONS
33
C CEASEFIRE INDUSTRIES LIMITED CHHATARIYA RUBBER & CHEMICAL INDUSTRIES
EKTA POWER & INSULATION SERVICES
31 17
97
JK EARTHING ELECTRODES
83
LARSEN & TOUBRO LIMITED
13
LIBERTY SHOES LTD
77
LOBA CHEMIE PVT. LTD.
69
MARVEL GLOVES INDUSTRIES
87
MATRIX SECURITY SOLUTIONS
3 COVER & GATEFOLD
103
FLIR SYSTEMS INDIA PVT. LTD.
11
NEWAGE FIRE PROTECTION INDUSTRIES PVT. LTD.
IFC
NSK (INDIA) AUTOMATION PVT LTD
35
G
10
S SAFEX FIRE SERVICES LTD.
20
SAMRIDDHI AUTOMATIONS PVT. LTD
IFC
SCRUM SYSTEM SOLUS SECURITY SYSTEMS PVT. LTD.
7 59 & 61
37
55 & 57
U UNICARE EMERGENCY EQUIPMENTS PVT. LTD.
45
V VANTAGE INTEGRATED SECURITY SOLUTION (P) LTD.
81
VERINT SYSTEMS
23
VIJAY SABRE SAFETY PVT. LTD.
73
X
O 19 OSH INDIA 2013
GUNNEBO INDIA PVT. LTD.
RR KABEL
SURE SAFETY (INDIA) PVT. LTD.
M
63
67
GODREJ SECURITY SOLUTIONS
53
SCHNEIDER ELECTRIC - PELCO
MIRCOM GROUP OF COMPANIES
FIREFLY FIRE PUMPS PVT. TLD.
GLOTECH EXIM PVT. LTD.
RAMANA SAFETY AND SYSTEMS (I) PVT. LTD.
J
N FIRE INDIA 2013
R
85
F FAVOURITE SAFETY PRODUCTS
89
L
E E 4 EVENTS
101
5
91
XTRALIS
15
XYLEM INDIA
75
1 9
P PAARTH VALVES PVT. LTD.
79
Z
PELICAN PRODUCTS AND SERVICES INDIA PVT. LTD.
21
ZICOM ELECTRONIC SECURITY SYSTEMS LTD.
H HD FIRE PROTECT PVT. LTD.
INDUSTRIAL SAFETY REVIEW
43
134
IBC
APRIL 2013