March 2015
www.indiasafe.com
Price ` 100/-
(118 pages including 6 for cover)
127
Access Control Trends
2015 India Fraud Survey Convergence of
IT & Access Interview Ashish P Dhakan MD & CEO, Prama Hikvision India Pvt. Ltd.
Securing Substations
I N D I A S A F E
M A R C H
2 0 1 5
I N D I A S A F E
M A R C H
2 0 1 5
March 2015
www.indiasafe.com
Price ` 100/-
(118 pages including 6 for cover)
127
Access Control Trends
2015 India Fraud Survey Convergence of
IT & Access Interview Ashish P Dhakan MD & CEO, Prama Hikvision India Pvt. Ltd.
Securing Substations
CMYK
Security-Vision-Systems
From access control to 360° video security MOBOTIX MOBOTIX AG • Tel.: +91 80 2664 2096 • E-Mail: sales@mobotix.com • Bangalore 560068, India, #812, 37th Main, 14th Cross, J P Nagar Ist Phase
SOLUTIONS SECURITY
mx_Ad_ProdRange_in_141126_210x270.indd 1
5
CMYK
26.11.14 14:14
CMYK
6
CMYK
CMYK
7
CMYK
CMYK
8
CMYK
CMYK
9
CMYK
CMYK
10
CMYK
CMYK
11
CMYK
CMYK
From the Editor-in-Chief
Volume XI • Issue 7 • March 2015 (118 pages including 6 for cover) Editor-in-Chief Lt Col Pritam Singh Mehta (Retd.) Associate Editor Santosh Pathak
Dear Readers, Greetings from IndiaSAFE! The customary annual ‘post-budget bashing’ of the government by opposition parties was conspicuously subdued this year, with most choosing to be cautiously guarded in their comments after the presentations of the Rail and the Union Budgets for 2015-16. However, since no hidden agendas have been identified once the fine print has been read, most aspects of this year’s budget are being hailed as pragmatic, reformist and growth oriented by financial analysts, and particularly by corporate India. Strongly supporting the government’s ‘Make-in-India’ plea, Finance Minister Arun Jaitley announced a series of cuts in customs and excise duties. Indian manufacturers feel that at last the efforts of the electronics hardware industry have made an impact, and reduction on Special Additional Duty (SAD) for all components except Populated PCB is a welcome step that will boost manufacturing, while the reduction on CVD on components for Tablet, Pacemaker and Digital Still Image Video Camera will make Indian manufacturers more competitive. Manufacturers also feel that the implementation of GST will make it easier to do business. To further boost it’s 100 Smart Cities campaign, the government has allocated 1,200 crore for the Delhi Mumbai Industrial Corridor (DMIC) project while all told, investment in infrastructure will go up by 70,000 crore in the year 2015-16, over the year 2014-15 from the Centre’s Funds and resources of CPSEs. A city cannot be truly smart unless it is first safe, and about 10-15% of the total cost for the infrastructure will go in security systems. This is definitely good for the surveillance industry and will provide a significant market. An additional allocation of 1,000 crore to the Nirbhaya Fund highlights the government’s commitment to support programmes for women security, advocacy and awareness. Though the Union Budget lays down the direction and pace of India’s economic policy, its implementation in letter and spirit are equally and vitally important. The expectations of this budget are high, but they are seemingly matched by the government’s commitment to see them through. Till we meet next month stay safe and happy reading!
India MAGAZINES Registered Office BBC Complex, 150 Kilokri Near Maharani Bagh New Delhi - 110014 Ph: +91 11 32471910 Telefax: +91 11 42828080 E-mails: editor@indiasafe.com spathak@indiasafe.com Website: www.indiasafe.com Ad-Sales Madhu Mullick adsales@indiasafe.com Brand Promotion Jayati Mehta Circulation Pulak Halder, Priyanka Lal Design S S Rawat Portal Design & Maintenance Sudipta Das Printed, Published and Edited by Lt. Col. Pritam Singh Mehta (Retd.) on behalf of India Magazines from BBC Complex, 150 Kilokri, Near Maharani Bagh, New Delhi-110014. Printed at Infinity Advertising Services Pvt. Ltd., F-90/9, Okhla Industrial Area, Phase-I, New Delhi-110020.
With warm regards,
All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher.
Lt Col Pritam Mehta (Retd) Mob: +91 9811413696
(The views expressed in this magazine are those of the authors and do not necessarily reflect those of IndiaSAFE.)
FORM IV 6. Names and addresses of individuals who own the newspaper and partners or shareholders holding more than one per cent of the total capital. • Lt Col (Retd) Pritam Singh Mehta, 252, ATS Greens Village, Sector-93A, Noida, UP - 50% • Mr Anil Kant, 2nd Floor, House No. 400, Sector-16A, Faridabad, Haryana - 50% I, Lt Col (Retd) Pritam Singh Mehta hereby declare that the particulars given above are true to the best of my knowledge and belief. Date: 01 March, 2015 Signature of Publisher
Statement about ownership and other particulars about IndiaSAFE 1. Place of publication: New Delhi 2. Periodicity of its publication: Monthly 3. Printer’s name: Lt Col (Retd) Pritam Singh Mehta Nationality: Indian Address: BBC Complex, 150 Kilokri, New Delhi-110014 4. Publisher’s name: Lt Col (Retd) Pritam Singh Mehta Nationality: Indian Address: BBC Complex, 150 Kilokri, New Delhi-110014 5. Editor’s name: Lt Col (Retd) Pritam Singh Mehta Nationality: Indian Address: BBC Complex, 150 Kilokri, New Delhi-110014
12 CMYK
CMYK
4K
4K reasons.
AXIS P14 Network Camera Series The 4K Ultra HD resolution offered in the AXIS P1428-E Network Camera is one strong reason why you should take a closer look at the AXIS P14 Series. But there is much more to it. Choose among seven models with the resolution you need, up to 4K and additional features such as I/O connectors and built-in OptimizedIR.
Visit www.axis.com/products/p14_series or email contact-sap@axis.com for more info.
Distributed by:
axis_ad_p1428e_indiasafe_210x270_en_1502.indd 1
13
CMYK
16/02/2015 12:45:46 PM
CMYK
march 2015
CONTENTS www.indiasafe.com
38
interview
Ashish P Dhakan MD & CEO, Prama Hikvision India Pvt. Ltd.
white papers
41
94
The Convergence of IT Security and Physical Access Control
Securing Substations and Meeting NERC CIP-014
reports
60
82
Access Control Trends 2015
India Fraud Survey
National Roundup • CP PLUS Accessories for Video Surveillance 19 • Gunnebo India Appointments
25 Wavesight at Adani Mundra Port in Gujarat
20 Sparsh's Smart DVR
26
21 Hikvision Secures Uka Tarsadia University, India
27 Aspa Elects New Governing Body
22 NETGEAR ProSAFE WC9500 Controller
• AllGoVision Appointment • Avigilon Acquires More Video Analytics Patents
28 Zebion’s Intrusion Alert Systems 29 ‘ZEBRONICS’ Debuts in Security Equipment Business
• Ganesh Jivani Recognized 23 • NEC’s Deployment for Surat City Police
30 SIS Wins Mumbai Project 31
24 IHS – Access Control Growth in India 26 14
• CCTV Cameras to Monitor Noida • Mumbai to Get 6,000 CCTV Cameras
CMYK
CMYK
15
CMYK
CMYK
march 2015
CONTENTS www.indiasafe.com
Product showcase 45
• Kentima’s New Launches
52 SMITH Flow’s SmartTrap+
• NUUO Crystal™ Professional
53 Exacq Integrates with CEM
46 VIVOTEK’s New Network Cameras 47
54
• AXIS Q8414-LVS Network Camera • Bosch New Fire Detectors
• AVIGILON Control Center Mobile 2.0
55 Dahua iHCVR
48 Pivot3 Infrastructure Appliance
56 DIGIEVER NVR to Upgrade
49 Samsung HD Fisheye Cameras 50
• Altronix New Outdoor Solution
57
• LENSEC Perspective VMS
™
• ISCON FocusScan Handheld Imager
• Aimetis NVR with Analytics • Fike Cloud-based FAMS
58 Galaxy Remote Access Reader 59 Dallmeier 2K Module Camera
51 Surveon Enterprise NVR5000
application/ Case Studies
98-107
international updates
64-81
110-113 16
CMYK
CMYK
17
CMYK
CMYK
Fostering Innovation for Global Security Challenges 14 - 16 APRIL 2015 Sands Expo & Convention Centre Singapore www.interpol-world.com BO RD
ER
M
AN
AG
SU
EM
PP
LY
EN
B CY
ER
SE
R CU
ITY
T
CH
AI
N
SE
SAFE CI TIES
C
U RI TY • •
Source from over 250 international solution providers Connect and cultivate business relations through networking events
• Get updated on innovative solutions and technologies • Exchange
ideas at INTERPOL World Congress
Your business and networking engine!
Register online at www.Interpol-world.com now Event Owner
Interpol AD_Visitor Promotion_FA.indd 1
Supported By
Supporting Knowledge Partner
18
Held In
CMYK
Managed By
14/12/14 9:54 pm
CMYK
National Roundup
Introduces
Accessories for Video Surveillance C
P PLUS introduces accessories for video surveillance devices which are indispensable, and facilitate the much required flexibility and extensibility to the video surveillance system without loss of signal and video quality. The accessories include a range of video baluns – active and passive video transceivers. A video balun is a good choice for long cable runs. Coaxial (RG59) cable is usually the best medium for transmitting video; however, video traveling on RG59 is limited to about 600 feet before video quality degrades. Video baluns allow signal to travel over Cat5E for several thousand feet. Additionally, Cat5E cable is less expensive and easier to pull. Passive video baluns work in 8001000 feet range. Active video balun transceivers can extend the range to 6,000 feet, but they require power (12V DC) with UTP port RJ45. A passive vid-
eo balun can receive and transmit video signals over UTP (CAT 5) wire without using the power supply. Another advantage of transmitting video over Cat5e cable is that it has multiple pairs of wires – typically 4 pairs of 22 gauge wires, so you can use one Cat5e cable for 4 security cameras. CP PLUS video baluns support most of the video devices such as cameras, monitors, DVR cards, recorders etc. These baluns are available for 1, 4 and 16 channels, and can be applied in the following areas: ● Industrial and corporate security. ● Banks and schools.
● Traffic monitoring systems. ● Government and educational institution CCTV monitoring. ● Commercial and retail CCTV. ● Security systems. ● Parking lots. ● Underwater camera systems. “CP PLUS accessories are not merely accessories, they are significant value additions and extend the integration with other systems and induce flexibility. They support a range of devices and are compatible not only with the CP PLUS range but also with others,” said Yogesh Dutta, COO, CP PLUS.
Gunnebo India Appointments Sabyasachi Sengupta as New Country Manager and Managing Director; Som Gangopadhyay as Deputy Managing Director and Executive Director-Sales and Marketing
G
try to reinforce our dominant unnebo India, a suband Marketing. position in all the business sidiary of the SwedishCommenting verticals signaling the next based Gunnebo Security on these appointwave of growth.” Group, has appointed Sabments, Sacha de Sabyasachi Sengupta has yasachi Sengupta, Executive La Noë, Chairman been associated with GunneDirector Finance as the new Gunnebo India bo since 2008 as an Executive Country Manager and Managand Senior Vice ing Director. Simultaneously, Sabyasachi Sengupta President Region Som Gangopadhyay Director. Having worked with Gunnebo has elevated Som Gangopad- Asia-Pacific says, “Over the last five organizations like ABB Ltd., ICI India hyay, currently Senior VP Bank Security years, we have recorded very impressive Ltd. and Novartis India Ltd. he brings and Secure Storage to Deputy Managing growth in India, especially within the with him over 24 years of diverse busiDirector and Executive Director-Sales Banking sector. Going forward we will ness experience across different funcMarch 2015
19
www.indiasafe.com
CMYK
CMYK
National Roundup
tional areas. Som Gangopadhyay joined Gunnebo in 2009, and has been a key player in driving the success of the Bank and Secure Storage business in India. Som has had 23 years of rich experience within marketing and sales in organizations like Philips India Ltd. and Canon India. In India, Gunnebo offers solutions across six key business verticals: Bank Security & Secure Storage, Cash Handling, System Integration, Global Ser-
vices, Entrance Control and Fire Products. Today India is not only Gunnebo’s second largest growth market, but also boasts of the company’s second largest employee base and largest manufacturing unit at Halol, Gujarat. The Halol manufacturing facility will house the Group’s global R&D center to develop and innovate new products and solutions and enhance the existing solutions. The company caters to a wide range of customers across sectors including banks
such as the Reserve Bank of India, State Bank of India, almost all nationalized and private/ public sector banks, multinational, co-operative and rural banks, has partnered with key infrastructure projects such as security deployments in the phase 1 and 2 of Delhi Metro; Government & Defense sectors; manufacturing units such as Reliance Industries, Tata Group, Nokia, and Essar Steels etc, IT & BPO sector like ANZ, Fidelity and Yahoo etc., and much more.
Sparsh's Smart DVR Designed for Professional Security Needs S
parsh has come up with yet another innovative smart and intelligent DVR range called ‘Smart Series.’ Based on Texas Instruments’ DaVinci processor; the Smart DVR has almost all the features that one could ask for while looking for a complete solution at the enterprise level. The feature like custom HTTPS/ SSL certificate makes it a perfect enterprise grade product. Smart DVR offers user configurable main and sub-display that allow an operator to view one or more channels on a special monitor that is assigned to selected cameras or video inputs from higher security areas. One can select between TV out and VGA/ HDMI as main or spot out. Covert channel support is
another striking feature which enables silent recording of the camera without displaying live feed of the camera. It is very useful to keep an eye on security operators. The VMS based graphic user interface with distinctive and attractive icons explains the device without words. All important features are placed on the taskbar. This feature-rich DVR has intelligent and interactive alarm input/ output interface and the alarm status is displayed on the status bar. The connected alarms are shown in green indication, and whenever any trigger is received the status changes to red color with alarm pop-up on display. The interactive alarm interface makes it even easier for operator to keep track of the applications working with the sensor alarm. Advance event management feature strengthens the secuMarch 2015
20
rity, management efficiency, and compatibility of the systems. When critical events such as theft occur within the owners’ premises, this DVR’s/ hybrid DVE alarm event recording is triggered generating instant notification via email/ SMS to allow owners the ability to take whatever proactive response they deem necessary. The Heart Beat Keep Alive mechanism keeps a check on the DVR-camera system by sending images over e-mail and to the FTP server. It works as health check-up for camera to ensure its operation and uptime. The playback and storage capabilities make the DVR truly ‘Smart’ as it gives detailed information about the HDD connected like HDD status, smart health report of HDD and so on. In case the HDD is not reliable or faulty, the DVR gives a message to replace the disk during power up itself. It also offers seamless storage over NAS and
www.indiasafe.com
CMYK
CMYK
National Roundup
FTP. The Smart DVR boasts of 32x playback, multi-channel synchronous playback as well as event based search during playback. The DVR uses reliable H.264 compression technique to minimize bandwidth and storage requirements. It provides dual stream video compression, real-time recording, audio
support, 3G and Wi-Fi support, and offers HDMI and VGA output up to 1920x1080p resolution besides TV output. The Smart DVR series features high quality 960H resolution and is available in 4, 8 and 16 channel variants. The Smart DVR addresses a variety of challenges effortlessly and is priced very economically, making it a
truly smart buy. This is the result of the latest innovation of Sparsh Lab, dedicated to providing world-class technological solutions for the security industry. It has over 50 qualified and experienced engineers and technicians, continuously working on developing, testing and implementing production.
Hikvision and Forward-Thinking Protect India's Uka Tarsadia University R
ecently, Hikvision’s assistance was enlisted to secure Uka Tarsadia University’s newer Maliba Campus in India. This solution was notable for a number of reasons. However, first and foremost, providing a secure environment for the 4200 students and 200 faculty members on this campus was paramount. Uka Tarsadia University is located in India's northwestern coastal state of Gujarat. Due to the location, historical footnotes, and other environmental factors, Gujarat is one of India’s primary economic hubs. Since Uka Tarsadia University is considered one of this state’s elite centers of learning, it was vital for this facility to be safe. In this vein, Indian-based installer Master’s Mind Technologies was contacted to help the university: ● Build a state-of-the-art CCTV system. ● Future-proof the solution. ● Provide an easy learning curve for university IT administrators. ● Provide top-shelf support for the solution.
Starting from scratch
K
etan Patel, owner of Master's Mind Technologies noted, “This solution was unique in the sense that the Maliba Campus was a blank slate – the campus did not have any existing CCTV solution when we began.”
both Patel and the university’s IT department determined that, despite the size, instead of a more economical analog CCTV system, an IP solution would better serve the university’s overall needs. Additionally, it would help future proof the solution in coming years. This was due to a number of factors.
High-tech components and performance
D
ue to the massive distances between academic departments and
March 2015
21
outdoor surveillance points, fiber-optics were run between these locations and connected to each other using PoE switches. While fiber-optics are expensive, multiple PoE switches helped reduce the costs associated with installation. Importantly, this setup allows
state-of-the-art video transmission, as well as providing an easy platform for any future upgrades that the university may request. However, the lynchpin of the solution is a pair of Hikvision camera models: the DS-2CD2112-I 1.3MP IP66 network mini dome camera and the DS-2CD2012-I 1.3MP IR mini bullet camera. The DS-2CD2112-I IP66 network mini dome camera was primarily tasked with the interior of the campus. Patel
www.indiasafe.com
CMYK
CMYK
National Roundup
stated, “This camera’s 720p real-time video is much better than analog, which obviously serves the school’s security goals to a higher degree. Furthermore, Hikvision's support really allowed us to customize this camera to our specific needs.” Out-of-the-box, the DS2CD2112-I is equipped with a 4mm standard lens which provides 75° of coverage. However, due to the specific dynamics of many of the school’s classrooms, a wider field of coverage was needed. In conjunction with Hikvision engineers, Patel instead placed a 2.8 lens on the DS-2CD2112 to provide 90° of coverage – enough for the
entire classroom. Furthermore, while some indoor facilities are lighted overnight, the majority of classrooms are not. In this instance, the up-to 30m of IR visibility was invaluable for proper surveillance in off-hours. Ironically, outdoors, the vast majority of the environment is lighted, thus reducing the need for the DS2CD2012-I 1.3MP IR mini bullet camera’s identical 30m IR range. However, the unit's 1.3 megapixel high resolution is vital for university IT personnel to quickly identify a possible threat, regardless of time of day. Additionally, the DS-2CD2012-
I's IP66 rating is critical to withstand India’s notoriously punishing weather conditions.
Master's Mind Technologies promising future
C
iting a need to both reduce the learning curve for the university’s IT department (the operators of the CCTV system), as well as reduce costs, Patel used Hikvision’s iVMS software to create a PC-based solution. Instead of NVRs, IT administrators are able to view up-to 135 cameras per PC, allowing the entire network to be fully viewed on 4 PCs.
NETGEAR Builds Stronger SMB Networking with ProSAFE WC9500 Premium Wireless Controller Extends its reach in the small to medium sized networking segment, with new features, stronger performance and enhanced convenience for users and administrators ETGEAR®, Inc. has launched the ProSAFE WC9500 Premium Wireless Controller. This high-performance controller supports the complete range of NETGEAR business-grade ProSAFE Managed Access Points. It’s a scalable, centralized solution for dense environments, supporting up to 200 access points per controller in a stacked arrangement. The ProSAFE WC9500 Wireless Controller is an all-new, fully-featured, high performance wireless controller that manages the complete NETGEAR
N
line of eight (8) ProSAFE “Businesses, hospitality sites and education faManaged Access Points, cilities are looking for networking solutions that ofincluding single-band and fer the ability to scale as the company grows, without taking a hit in performance. When they need to dual-band. Designed with add more users or connect more access points or simplicity in mind for support a new branch office, network managers want management and ease of solutions that can support denser deployments and use in dense deployments, possible future applications and devices. Keeping it offers enterprise-grade this in mind we have launched the WC9500 Wireless functionality and capabilController. This Wireless Controller supports larger ity but without the cost deployments in stackable scenarios.” and complexity of big IT. – Subhodeep Bhattacharya The WC9500 is a scalRegional Director, India & SAARC, NETGEAR able, secure mobile access solution that can support a growing rent clients across 600 access points in organization with a stacked arrangement of three controldozens of users, lers. It’s the perfect solution for medium with up to several to large-sized organizations with high thousand concur- bandwidth multimedia needs, such as March 2015
22
www.indiasafe.com
CMYK
CMYK
National Roundup
growing businesses, K-12 schools, colleges, medical complexes, and hospitality sites with in-room access points. With its Ufast™ protocol, the WC9500 delivers ultra-fast access point discovery, Layer 2 and Layer 3 fast
roaming, a captive portal for guest access, a fully distributed architecture, and ease of configuration and dynamic RF management in dense environments. A pay-as-you grow licensing model of 10 access point licenses ensures that the
organization only pays for what is needed. Moreover, the WC9500 is 802.11ac wireless-ready, providing investment protection for future applications or devices.
Ganesh Jivani, CEO, Matrix Comsec Recognized as one of India’s top 30 Innovative CEOs by INC
T
he coveted Inc. India magazine has recognized Ganesh Jivani, CEO of Matrix Comsec with the award of India’s top 30 innovative CEOs. This comes as recognition of Jivani’s astuteness and strategies that have been the strong pillars of Matrix success. Its two decades of operations, Matrix has been consistently growing in terms of revenue and market share. “It is a great honor to be counted as one of India’s top 30 Innovative CEOs,” said Jivani, “At Matrix, we are on a mission to prove Indian engineers can design and build world-class technology products. If necessity is the mother of
invention, creating technology products from India offer ample opportunities for innovation. I thank Inc. for thinking of such an award and finding me deserving of it. The award has provided Matrix a platform and motivated me to continue challenging status-quo and keep pushing the technology boundaries.” Inc. India Innovative 100 award is a first of its kind initiative to recognize the top 30 Innovative CEOs. The main objective of Inc. India was to identify and recognize CEOs who have led their companies to growth at home and expansion abroad with bold ideas and determined executions. The Innova-
tive 100 Awards were judged on four parameters of uniqueness of idea, reliability, scalability and tangible business impact.
NEC Provides Face Recognition Technology to Surat City Police N
EC India Pvt. Ltd., a leading Network and IT solution provider, and NEC Corporation, together with Innovative Telecom & Softwares Pvt. Ltd., have announced the deployment of NEC’s face recognition technology for Surat
City Police (Gujarat). NEC’s NeoFace® Watch for Live CCTV surveillance and NeoFace® Reveal for forensic criminal investigation will be deployed for Surat City Police, an important step forward in Surat’s safe city initiative. March 2015
23
Speaking on the announcement as a major advancement, Rakesh Asthana, Police Commissioner of Surat City said, “We have found NEC’s face recognition solution to be the most appropriate solution with respect to face detection and
www.indiasafe.com
CMYK
CMYK
National Roundup
Speaking on this strategic partnership with Surat City Police, Koichiro Koide, Managing Director, NEC India said, “Safety is one of the most important aspects that goes into the making of a smart city. Koichiro Koide, MD, NEC India along with Rakesh Asthana, NEC continuously innoPolice Commissioner of Surat City vates to create and deliver investigation, and it will help Surat Po- safe city and smart city solutions. Our lice resolve crime cases in a very speedy face recognition technology has been through stringent performance evaluamanner.” ® NeoFace Reveal is a software solu- tions and an extensive proof-of-concept tion for forensic investigation that pro- process by the Surat Police, and has pervides law enforcement and crime labora- formed highly in terms of speed and actory agencies with the ability to enhance curacy. We are committed to the Surat poor quality latent face images, search City Police in this partnership towards against their mugshot databases, and lo- enabling a safer city, and we look forward cate potential suspects, while NeoFace® to future collaborations.” Both technoloWatch integrates with existing video gies have been deployed successfully in surveillance systems and matches faces numerous government agencies throughin real-time against a watch list of indi- out the world, including the US, UK and Singapore. viduals to trigger an alert.
“Along with the Surat City police have evaluated multiple face recognition solutions from various parts of the world and found NEC to be the most accurate, fastest and the best criminal investigation application amongst all,” said Moin Shaikh, Director, Innovative Telecom & Softwares Pvt Ltd, who has implemented the Surat Safe City Project. NEC’s face recognition technology has achieved the highest performance evaluation for the third consecutive time in the recent Face Recognition Vendor Test (FRVT) 2014 performed by the U.S National Institute of Standards and Technology (NIST). Test results revealed NEC’s search accuracy as well as the speed of its face recognition algorithms for image search outperforming competitors significantly. The NIST report is considered an industry benchmark for assessing how accurate a face recognition software solution is in one-to-many searching in various circumstances.
Difficult Market Conditions Persist for Access Control in Parts of Asia Electronic door access control growth in India, Australia and Malaysia was challenging in 2014, with little projected relief in 2015
I
n 2014, IHS projected the Indian market for access control would expand at a compound annual growth rate (CAGR) of 13.7% from 2013 to 2018. However, IHS has revised its original forecast downward to about 13.1%. One reason for the lower growth projection is related to electronic locks. The adoption of electronic locks in India has been slower than expected, but IHS expects growth to
pick up rapidly in 2017 and 2018. Part of the woes for the Indian market for access control can be attributed to falling productivity, lack of financing, and numerous regulatory issues that have dampened investment, thereby halting growth in the manufacturing sector. Overall, the Indian market for access control remains difficult to enter, with price pressure and suppliers in China and other countries March 2015
24
www.indiasafe.com
CMYK
CMYK
National Roundup
reducing overall margins. For Australia, the original growth forecast has been halved. Even when including electronic locks, IHS doesn’t anticipate growth to exceed 2.2% through 2016 for access control. Although there is uncertainty, IHS expects the Australian market to continue to grow during the next five years, but at a much slower pace than originally projected. Largescale projects for commercial, residen-
tial, infrastructure National Broadband Network (NBN) and education facilities should aid growth; however, government spending cuts and a decline in mining and manufacturing will no doubt slow the access control industry growth in the country. Similar to India, the market opportunity for electronic locks in Malaysia is projected to be limited in the short term, which is why IHS has slowed its original
growth projection. Furthermore, slower growth through 2016 can be attributed to the current state of global oil prices and the upcoming introduction of the goods and service tax (GST). Overall, the Malaysian market outlook for access control remains optimistic over the next five years. IHS expects rapid investment in infrastructure and spending, with the barriers to growth being price and competition with lower-cost brands.
Wavesight Wireless Radios Deployed at Adani Mundra Port in Gujarat A
dani Ports & Special Economic Zone (APSEZ) – a part of India’s leading infrastructure conglomerate the Adani Group – is India’s largest multiport operator. APSEZ is the only private sector port operator with presence across six ports in India. The company’s aim is to increase annual cargo handling capacity from 112.8 million MT in 2014 to 200 million MT by 2020. Located in Gujarat,
APSEZ’s Mundra Port is Adani Group’s crown jewel and the largest port in India. Adani has also obtained approvals from Government of India for setting up another multi-product SEZ and Free Trade Warehousing Zones in Mundra. It also operates Asia’s largest coal import terminal of 60 MMTPA.
The requirement
A
Working with Wipro - Wavesight wireless radios have also been deployed at Adani facilities at Tiroda near Nagpur (Maharashtra) and Kawali near Kota (Rajasthan)
March 2015
25
PSEZ contracted Wipro – a leading technology and integration company in India to plan and deploy IT infrastructure including CCTV network across the port. The challenges at the port included providing connectivity to a large number of cameras spread across the port and at a distance of 1520 Kms from the control room. The laying of fibre and the maintenance of the equipment over the vast area of land was proving to be complex, difficult and expensive
www.indiasafe.com
CMYK
CMYK
National Roundup
The solution
W
orking with Wipro and with the help of network planning tools including Google Earth
– Wavesight developed a wireless network to connect the cameras using 16 WaveMax N capable for handling bandwidth requirements over
distances of 20 Kms. Optimised for lower levels of latency, Wavesight Wireless radios proved to be cost effective, reliable and consistent.
AllGoVision Appoints New Marketing Manager A step in its ongoing drive for Greater Market Reach and Wider Geographies Globally
A
llGoVision, a specialist in Open Platform Video Analytics Software, headquartered in Bangalore, India has hired Niladri Sekhar Jyoti as its Mar-
Niladri Sekhar Jyoti
keting Manager. As a member of the Marketing and Business Development team, Niladri will be primarily managing the marketing and communications for AllGoVision. In addition, he will be supporting the channel development efforts of the company to expand across the globe beyond its current presence in the Indian, Middle East and Asian Markets. Powered by years of in-depth research and product innovation AllGoVision, today, is one of the most reliable and accurate solutions available in the market. Niladri would be spearheading AllGoVision’s drive to create that awareness to customers and channel partners world-wide. “AllGoVision is a comprehensive
video analytics solution with 25 plus basic and advanced features. The right product, as it already is, coupled with right marketing efforts will give us greater depth in the existing markets as well as widen our geographies and add more value to intelligent video surveillance and business analytics segments,” noted Ashwin Amarapur, Director of AllGoVision, India, “Niladri’s comprehensive understanding of sales and marketing will greatly benefit us in terms of our product promotion and greater reach.” Before joining AllGoVision, Niladri has played key roles in Sales and Marketing at various organizations like Alstom India, TaxSpanner.Com, TridentInfosol etc.
Avigilon Acquires More Video Analytics Patents A
vigilon announced recently that it has acquired 96 more patents for video content analysis software. This comes around a month after it acquired all of Objectvideo’s patents and licensing agreements. Avigilon is a major supplier of video surveillance equipment.
Objectvideo supplied patents and licensing agreements for video content analysis software. Avigilon has grown quickly in recent years to become the eighth largest supplier of network video surveillance equipment. It is one of the few Western March 2015
26
companies to have gained share in 2013 in the face of fierce price competition from Chinese competitors. These purchases are a shrewd move by Avigilon. A major challenge for video surveillance equipment suppliers is ensuring that their solutions continue to
www.indiasafe.com
CMYK
CMYK
National Roundup
have unique features versus the competition. Competing on price simply leads to lower margins. Offering solutions that include advanced video content analysis software is one way to differentiate these solutions from the competition. An increasing proportion of video
surveillance devices are forecast to feature embedded video content analysis (VCA) software. In some cases, it will be offered as a ‘free’ feature. In other cases, there will remain a charge. However, it is forecast that shipments of embedded VCA recording channels (free and charged) will increase by an average
of more than 70% a year over the next few years. Many different video surveillance equipment vendors will supply them. Avigilon now owns the patents for many of the algorithms supplied. It therefore has great power to dictate the terms of supply to the very companies with which it competes.
Aspa Elects New Governing Body New members get leadership roles to help shape a new vision for the Authentication Industry Association “It is a privilege to be chosen to lead this Association in a new avatar and at the helm of high growth. Since our relaunch few months back, we have added many new members offering diverse authentication technologies and are integrating their valuable suggestions to be more comprehensively representative of the common interests as an industry body. Today, nearly every industry such as pharmaceuticals, FMCG and others faces the menace of dealing with high-tech, sophisticated counterfeiting. Our Government seems proactive on taking a holistic approach to consumer protection and public welfare. ASPA as an industry body is aligned to support them in protecting brands and safeguarding consumer interest and our member companies are fully geared up to help industries meet this challenge.” – UK Gupta President, ASPA
I
n its first-ever elections since its relaunch last year, Authentication Solution Providers’ Association (ASPA) has elected Umendra Kumar Gupta, Chairman and Managing Director, Holostik India Limited as its new President. One of the founder full members, Gupta has also served as the Association’s President during 1998-2006 and then again in 2008-2010. He is the only Indian holographer to receive the coveted ‘Brian Monaghan Award for Business Innovation’ from International Hologram Manufacturers Association for his outstanding contribution to the development of the hologram industry.
tor, Gopsons Paper Limited as two additional co-opted members. Immediate Past President Manoj Kochar, Director, Holoflex Ltd., will continue to be on the governing body as an ex-officio member. Since its re-launch in October 2014, ASPA’s membership strength has increased by nearly 25%. The Association recently celebrated its 16th anniversary in December, and aims to become the singular voice of the authentication solution providers in Asia and around the world. ASPA works closely with global authorities such as International Hologram Manufacturers Association (IHMA), Counterfeit Intelligence Bureau (CIB)
The governing body also includes Arun Aggarwal, CEO, Kantas TrackPack, who will serve as “I am thrilled to be a part of such the General Secretary a progressive Association that is and Treasurer of ASPA; young and mature at the same time. Luv Shriram, ManagAs the industry morphs continuing Director, Shriram ously to address the changing needs Veritech; and Deepak of brand protection, ASPA took the Gupta, Director, Shree bold and proactive decision to re-align its focus with Lamipack. The elected a vision of becoming a global voice of the authenticagoverning body has tion solution providers. And now, it is even more exciting to see the Association offering new members like also invited Nityanand us an opportunity to take on leadership roles to help S. Shenoy, President shape its vision and future.” and Managing Direc– Nakul Pasricha tor, PRS Permacel; and Vice-President of ASPA Mukesh Goyal, DirecMarch 2015
27
www.indiasafe.com
CMYK
CMYK
National Roundup
and Interpol, as well as industry bodies in India such as FICCI CASCADE, CII, ASSOCHAM and Indian Institute
of Packaging. Recently, two ASPA members were also appointed to represent Asia on the IHMA Board. ASPA Code
of Conduct mandates that its members adhere to the highest level of quality and ethical standards.
Launches
Intrusion Alert Systems Designed to Intercept Burglars in the Act P
enforcements authorities instantly to nab the culprit while still in the act. At a media launch event in Le-Méridien Pune, Zebion’s Director and CEO, Yogesh Dagale explained, “With the incidence of break-in and thievery on the rise in virtually every setting (residential and commercial), Argoz opens a new chapter in society’s fight against crime.” Another Zebion Director, Abhishek Lodha added, “Argoz inPune Mayor, Dattatreya Dhankawade, inaugurating Argoz, a new-age intrusion stantly relays inalert device from Zebion, a rising electronics company from Pune. Seen here with the mayor is Zebion’s Top Management – Yogesh Dagale (CEO), formation about Abhinandan Dagale (COO), Abhishek Lodha (CFO) and Saurabh Dey (CMO) a break-in at the stant notification facility as soon as un- very moment the crime occurs. This emauthorized trespass occurs, either by di- powers the property owner to exercise alling out to the owner’s mobile number the best option available. While the most or through a smart app. The dial out can obvious reaction could be to inform the be followed by an SMS and the owner police, one could also inform friends, can nominate secondary, tertiary or neighbours or the society office.” more numbers in case the primary contact number is unavailable. No false alarms The Argoz intrusion detection sysebion’s extensive consumer retem can have an attached hooter or sisearch has revealed that the single ren. However, many would prefer not biggest hurdle to widespread adoption to startle the burglar, rather engage law of intrusion alert systems in the past has une based electronics company, Zebion, have launched a contemporary range of intrusion alert devices named Argoz, suitable for homes, offices and warehouses. These devices have an in-
been a bothersome rate of false alarms. Consequently, the company spent 24 months in the development of an innovative new design that involves twin half-cupped sensors and a combination of both infrared and microwaves to provide a dependable, error-free intrusion detection system. Lodha said, “Our Dual Detection Twin Field (DDTF) technology devices are only triggered by humans with a body weight over 30Kgs and a height of over 3.5 feet. So you never have to suffer the anguish of receiving an alert only to find later it was caused by a pet.”
Four variants
N
amed after the mythical Greek God Argos, who had a hundred eyes and could see everything, Argoz comes in four variants for different environments and needs. While Ar-
Z
March 2015
28
www.indiasafe.com
CMYK
CMYK
National Roundup
goz Regular has a coverage range of 18 feet, suitable for one large room, Argoz Plus and Argoz Via can have a series of extender units bringing a large area under watch such as a villa, large apartment, multi-level store or multi-story office. The most advanced model Argoz Grand is based on IP
technology and comes with a built-in camera. It grabs a photograph of the coverage area as soon as intrusion occurs and sends it to the owner’s cell phone through a mobile app. Argoz Grand enables the owners to remotely surveil their premises when the intrusion occurs.
Easy installation and maintenance
D
agale pointed out that all Argoz products are incredibly easy to set up and work on the DIY principle, “Argoz is effortless to setup and needs no technical knowledge. It requires very low maintenance.”
Announces
Entry into New Business Verticals and Product Portfolios Ambitious business plan begins with entry into security and surveillance equipment; three other verticals to follow within the year
T
op Notch Infotronix, India’s leading supplier of products and accessories for Computers, Consumer Electronics and Communication under the brand ‘ZEBRONICS’ has announced its new independent business unit for the surveillance and security equipment business. The nearly two decade-old Zebronics brand is now known for the industry’s widest line-up of products for computers, peripherals and consumer electronics with over 25 product categories and more than 350 unique SKUs. The Zebronics range of products, has become a byword for offering product innovation, great features and engineering, all at affordable prices. Just some months back, Zebronics had also set up an full-fledged R&D center at Chennai to develop products that are hardy, resilient and suited to Indian conditions. The Company has had a CAGR of around 30% through the last three years, in spite of the slowing down of the desktop market. Zebronics now targets a
100% growth this year and a mega Rs 1000-crore brand in the next two years. Rajesh Doshi, Founder and Director said, “We decided that a horizontal diversification of product portfolio would be our best bet for achieving the inorganic growth target we had set ourselves, and to more fully utilize our resources and capabilities as we reach our twentieth year. We looked at the many new opportunities. The surveillance equipment portfolio is the first of our major announcements that can be expected this year. We find that there is a huge vacuum at the affordable end of the market and lack of organized players who can back up with a good brand name, quality products, and full warranty support. Zebronics is already an established brand with 12,000 partners carrying our products into big cities and small towns alike. That will form the backbone of our new business unit.” The Company acknowledges that while its speaker business is on the growth path, the growth in traditional March 2015
29
PC accessories had stagnated in the past 2 years which was adversely impacting its channel partners. The new product line is being introduced based on partner feedback that they would like to expand beyond traditional peripherals. According to 6Wresearch, the Indian video surveillance market is expected to reach $952.94 million by 2016, with a CAGR of 32.49% from 2011-2016. While analog based surveillance systems have accounted for major market-share so far, IP-based surveillance systems are growing with relatively higher CAGR of 41.78% from 2011-2016. Zebronics expects that about 15% of its revenue will be generated from the surveillance business in the first year (2015-16) itself. The product portfolio announced by Zebronics includes 15 new products in the categories of cameras, DVRs and video door phones. There are 4 analog and 8 HDCVI cameras with IP cameras to be announced soon. The DVR range consists of analog 4/ 8/ 16 channels and HDCVI 4/ 8/ 16 channels.
www.indiasafe.com
CMYK
CMYK
National Roundup
There are 3 video door phones from 4.3” screen to 7” screen with touch features. The CCTV power supply has two variants – indoor and outdoor. The surveillance business will operate as an independent business unit with its own sales force and a business head is already in place in the form of Ashok Jha who is an industry veteran of 10 years, having worked as country head for leading surveillance organizations of India. The products will be targeted mainly at SMB retail and commercial establishments, and the home segment but are also suited for a variety of uses such as government, transportation, banking and finance. Strategically, this foray marks a radical shift in Zebronics’ business. While their current channels (numbering over 12,000) have focused on the youth and end-consumers with mainly entertainment products, Zebronics is now introducing a completely new operating paradigm targeting the institutional consumer (mainly SMBs) and the ‘responsible’ homeowner. Elaborating on the
plans to educate the consumer and their channels to take on the challenge of addressing new segments, Doshi said, “We are rolling out our channel education program right away, at least 10 training workshops will be held across various cities in the next few months. Furthermore, a measure of our confidence is the fact that all our security products will carry swap warranty right from the beginning.” “This marks a transformational moment for Zebronics. We are now looking at other verticals and sectors where we can make a difference, sticking to our core philosophy of value for money backed by innovative engineering, appealing design, reliability and service support,” continued Doshi. He also spoke of aggressive plans for the massmarket consumer electronics sector with flatscreen TVs and handheld devices and tablets, announcements for which are to follow within the year. Reflecting its wider business, Zebronics also introduced a new brand identity and Company logo, which signi-
fies its new growth aspiration and transformation, and celebrates the culture of innovation built over the company’s nearly two-decade history. Established in 1997 and headquartered at Chennai, Zebronics has one of the industry’s widest line-up of products for computers, peripherals and consumer electronics, totalling 25 product categories and more than 350 SKUs. Zebronics range of products encompasses chassis/ cabinets, speakers, tablet PC, PC power supply, headphone, keyboard & mouse, LED monitors, UPS, gaming accessories, TV tuners, add-on cards, computer accessories, laptop accessories and a full line of surveillance-security products. Zebronics has received more than 22 awards during 2012-2015, including India’s no 1 peripheral brand and No 1 Indian speaker brand. Zebronics has 31 branch offices and over 100 service centres covering all major cities. The company employs over 850 people and operates through a network of about 12,000 channel partners throughout the country.
SIS Wins Largest Surveillance Project in India S
IS EmerGeo Solutions Inc. (EmerGeo), a leading provider of crisis management and situational awareness software, announces that Sai Infosystems (SIS) has landed an ambitious project of setting up a 6,500 closed circuit television (CCTV) camera network across 1,500 locations in Mumbai. The project will also implement 12 mobile surveillance vans, which will attend to alarms raised by the system.
This Rs 766 crore (~$140M US) project is the largest surveillance project in India and SIS will be responsible for the design, implementation and operation of the system for 5 years. The project will improve traffic management, help detect and investigate criminal activities and aid during natural disasters and major events. City surveillance is an important element of SIS’ Safe City initiative – aimed at inMarch 2015
30
www.indiasafe.com
CMYK
CMYK
National Roundup
tegrating a complete set of urban security and crisis management technologies and providing the support and services needed to build resilience to any threat. Installation of the cameras was recommended by the Ram Pradhan Committee after examining the role of police and the administration in the wake of the 26/11 Mumbai attacks.
EmerGeo develops emergency management software solutions and provides consulting services and support to government and industry around the world. EmerGeo’s Fusionpoint™ and emergency mapping applications are used to log, track and communicate critical information required by emergency and security personnel. By lev-
eraging open web standards and a data fusion engine, EmerGeo’s software allows customers to configure a relevant common operating picture tailored to each emergency role. Dispatch, crisis management, mapping, surveillance cameras and other system data come together in a configurable web dashboard for decision-makers.
Noida Authority to Install 600 CCTV Cameras to Monitor Crime in Noida N
oida Authority has decided to put the city under 24x7 surveillance and control crime by installing 600 CCTV cameras in various areas of Noida. Sandeep Chandra, in-charge of Noida's Traffic cell said, “This is for the first time that such a project is being carried out in UP and it is very important for us. Our prime focus is to install CCTV cameras in all the identified areas of the city
and the installation process will begin in two months.” Areas have been identified on the basis of the crime rate there and cameras will be installed on priority basis in these areas – Sector 62, 12-22 crossroads, the stretch of Atta to DM residence, Brahmaputra Complex in Sector 29, the route between Sector 25 to 26, Mahamaya Flyover, Sector 6 main
road, Sector 105 Hajipur underpass and the road from Sector 41-50. Cameras will be installed on buildings and busy roads. All the feeds will be accessible on LCD TVs in the offices of the high-ranking police officers. Chandra added, “Apart from this, these cameras will also help us keep a check on traffic violators and minimize the number of accidents.”
Mumbai to Get 6,000 CCTV Cameras M
aharashtra government has recently signed an MoU with Larsen & Toubro (L&T) worth Rs.949 crore for setting up CCTV based surveillance in the city. The Chief Minister of Maharashtra, Devendra Fadnavis signed the MOU. As per the MOU, 6,000 CCTVs will be installed across the metropolis and suburbs by September 2016. The project was first proposed post 26/11 terror attacks on Mumbai and has been delayed since then. Bids have been called for four times but the project could not move as companies did not respond to tenders. The current government formed a
high power committee to push the project and the contract has been signed on the occasion of completion of 100 days of the state government. On the occasion the chief minister emphasized that the vision of the project is to implement a holistic and integrated video surveillance system to enhance safety and security. Fadnavis said, “CCTVs will guarantee safer city to its citizens. It will not only support Mumbai police to maintain law and order but will also help in improving traffic management. It will also aid in deterring, detecting and dealing with criminal activities. Work will be carried out in three phases.” March 2015
31
The first phase will cover installation of CCTVs in south Mumbai, and is expected to be completed by November this year, while north and east Mumbai will be covered by April next year in second phase.In the third and final phase, central and west Mumbai will be covered and its work is likely to be finished by September 2016. As per the presentation made on the occasion, the city’s coastline will also have 20 thermal cameras to record any possible movement in the sea. Besides, two command centres will be set up – first at Mumbai commissioner’s office and the other in Kalina in suburban Mumbai.
www.indiasafe.com
CMYK
CMYK
32
CMYK
CMYK
33-34 ART CARD-I FRONT INFINOVA
33
CMYK
CMYK
35-36 ART CARD-I BACK ADIT 34
CMYK
CMYK
37
CMYK
CMYK
Interview
Ashish P Dhakan MD & CEO, Prama Hikvision India Pvt. Ltd. IndiaSAFE: Briefly elucidate the global entity called Hikvision in current perspective? Ashish P Dhakan (APD): Hikvision is the world’s largest supplier of video surveillance products and solutions. The company specializes in video surveillance technology, as well as designing and manufacturing a full-line of innovative CCTV and video surveillance products. The product line ranges from cameras and DVRs to video management software. Since its inception in 2001, Hikvision has quickly achieved a leading worldwide market position in the security industry. Hikvision possess the world's largest R&D team and state-of-the-art manufacturing facilities; both allow Hikvision’s customers the benefit of world-class products that are designed with cutting-edge technology. As further commitment to its customers, Hikvision annually reinvests 7% of its revenue into R&D for continued product innovation and improvement.
IndiaSAFE: As per IMS, Hikvision has maintained its leading market position. How do you foresee your position this year? APD: For the third consecutive year,
Hikvision has been ranked as the world’s largest CCTV and video surveillance equipment provider in 2013 with a dominant 10.9% market share. This is up by more than a third, from 8% in 2012. In a year of significant achievements, Hikvision maintained or gained position in every market segment. Its most striking success was becoming the top hardware NVR manufacturer from not being in the top 10 in 2012. In addition, Hikvision maintained its position as global DVR leader for the fifth consecutive year, gained two places to become the world’s No. 1 supplier of security cameras with an 11.9% market share, and rose one place to be No. 2 in network security cameras with a 13% share of the market. As for the VMS category, it achieved third having risen from fifth place in 2012. This outstanding performance across the board serves, once again, to prove Hikvision’s continuing dedication to innovation and excellence in all aspects of video surveillance products. It’s also evidence of the success of Hikvision’s marketing strategy and in-depth local customer services. As the global CCTV market continues to move towards HD as the de facto standard, Hikvision has brought March 2015
38
forward a full range of HD IP products, including the family of easy-to-use IP solution and Smart IP solution, that has been highly acclaimed by our partners and customers since its introduction to the market. Hikvision is growing very quickly in all segments, continuing to outperform the market as a whole, and this is also testament to our expanding sales channels and loyalty of our customers.
IndiaSAFE: In your view what is this consistent No. 1 position attributed to? APD: Hikvision products are more reliable and stable, and our approach is customer centric, wherein we will develop market oriented products to serve our customer needs.
IndiaSAFE: Please comment on the current Indian security market. APD: The video surveillance market in India has increased tremendously in recent years due to rising concerns for security and safety. The growth will be driven by demand for video surveillance systems in sectors such as hospitality, banking & financial, government & transportation, education, and retail.
www.indiasafe.com
CMYK
CMYK
interview
One of the high-growth opportunities is the government initiative to secure cities and monitor public movements. The market for video surveillance in India is projected to reach $2.4 billion by 2020. In India's video surveillance market, analog video surveillance market has captured major market share. Over the next six years, the market for IP surveillance is expected to increase due to increasing IP infrastructure and demand for remote access.
IndiaSAFE: What products have you recently launched in India? APD: We have launched many products which have been well received among our customers, including HDTVI analog solution, Smart IP solution, Easy IP solution, DS-2CD63 series IR fisheye network camera (6 MP), IVMS-5200, mobile enforcement products, and portable DVR. Hikvision DS-2CD6412FWD is a versatile network camera which is characterized by its miniature design and HD image quality, offering flexibility and ease of installation even in very limited spaces. It can be applied for discreet and covert surveillance such as at ATMs, access control, and luxurious stores etc. Recently we launched mini fisheye network camera DS-2CD2942F to the SMB market. With its panoramic view, high cost-efficiency, ultra-compact design and comprehensive feature set, it brings a new level of security to convenience stores, hotels, restaurants, offices and other installations.
IndiaSAFE: Kindly explain the R&D activity at Hikvision? APD: Several major factors contributing to Hikvision's success are its previous OEM experience with some well-known global companies, which pushed Hikvision to strengthen its product development capability, as well as strict focus on
its quality control and production process. The company’s high penetration in its domestic market provides Hikvision with a clear direction of product innovation. Over these years, Hikvision’s R&D, and quality and process control have achieved international standards. In 2009, Hikvision started to work with some consulting firms to enhance its internal efficiency of R&D, quality control, and production. Since then, the company has introduced Capability Maturity Model Integration (CMMI) to greatly improve its process management of product research and development. CMMI is a process improvement training and certification program and service administered and marketed by the Software Engineering Institute (SEI) at Carnegie Mellon University. With them, We are able to have a set of unified protocols to well manage different departments and have the same language to conduct crossdepartment communication. To optimize new product development and maintain technological leadership, Hikvision employs a matrix management structure for its R&D department, which allows them to succeed in cross-department project cooperation between its resource teams and product teams. Hikvision’s product teams are categorized by its product lines, including DVR/ NVR, network cameras, analog cameras, vertical-specific VMS and others while the resource team is divided by several key technologies – hardware, image processing, video/ audio codec, compression, networking, streaming media, FPGA applications, video data storage, embedded applications, software structure and others. At Hikvision, a specialized project team, from groups of resource teams and the corresponding product teams, is usually formed to develop a new product. This means each group of March 2015
39
resource teams has to be responsible for several product development projects and must be able to work on multiple projects simultaneously. It is worth mentioning that software is the core value of Hikvision product development. Although we sold mostly hardware, software is the key inside hardware. Hikvision has a powerful software capability. A large amount of work is on the software side, even in hardware manufacturing. Hikvision’s R&D team also has to meet the sales target, along with the sales team. The product should be market-oriented and clearly meet the needs for the customers. The KPI for each product line is to meet certain sales targets. R&D also takes the responsibility if their products don’t meet the real market demand. Product usability requirements are quite high in overseas markets. Many Chinese products are usually weak in this part. This year, Hikvision put a lot of R&D resources in product user interface, client software, and mobile app to elevate the ease of use in its products. Hikvision also started to outsource the language-related design and the external design of its latest network cameras, including aesthetic outlook and internal software design, two or three years ago. The product usability of Hikvision's products now is greatly improved. Hikvision also follows the ‘integrated supply chain’ concept, proposed by Huawei Technologies. The supply chain includes suppliers (manufacturing partners), Hikvision (the company), and Hikvision's clients. We invite all these parties together for joint product evaluation and collaboration, advised by our consulting company. We also ask our suppliers to join our product development. They provide suggestions on how to make those products meet interna-
www.indiasafe.com
CMYK
CMYK
interview
tional standards and how to optimize the structure/ system. Hikvision has developed a comprehensive and strict management system in process. In Hikvision, the quality control department is independent from R&D and production department. These three departments are positioned equally to complement and evaluate each other. Quality control, a complete system from R&D design, manufacturing to service, is categorized into reliability verification, test, process control, productivities, and after-sales service. With this system, Hikvision is able to provide further assurance for customers – Design Quality Assurance (DQA) and Manufacturing Quality Assurance (MQA). DQA is under the R&D product testing department mainly for product reliability verification. Hikvision has more than 2,000 people on their R&D team – the largest in the security sector. Around 350 engineers on the R&D team, which accounts for over 15 percent of the team, are responsible for product testing. The product testing group is in charge of software tests, hardware tests, and reliability tests, which all play an important role in product development and guaranteeing product quality. The tests include anti-interference, anti-radiation, extreme temperature, vibration, drop, water-proof, electrostatic surge and electrocution prevention, salt spray, and antiwind/ dust tests, etc. The product testing group conducts tests in many different testing laboratories, such as a 960-square-meter (10,333 square feet) stability and pressure testing laboratory, two image quality testing rooms, and a large laboratory for integration, monitoring, and management systems testing. In total, all of the laboratories combined occupy 1,300 square meters (13,993 square feet).
Manufacturing Quality Assurance MQA is divided into four categories: raw materials quality control, productive process, tests, and outgoing quality control. Boasting over 100,000 square meters (1.1 million square feet) of manufacturing space, Hikvision's production facilities are underpinned by state-of-the-art manufacturing equipment and resources. As an example of this point, in 2011, Hikvision introduced Siemens' fully-automatic SMT equipment for production lines, ensuring world-class technical capability. Hikvision also has dual dustless workshops for precise component assembly of camera lenses. Occupying 800 square meters (8,611 square feet), the workshops measure up to the highest cleaning standard – a class of 100,000. In addition, to ensure high product quality, all the products need to pass the high-temperature aging test and the company also developed foolproof equipment, such as auto focus tester and auto testing software, to efficiently reduce human errors and poor visibility during production. To meet its huge sales volume target, Hikvision purchased a SAP system from Germany to avoid any problems in materials preparation cycles which may lead to downtime of the production line. With the barcode, the whole production and quality control process can be traced: each machine can be analyzed for the specific time for production, and identification of every supplier and operator.
IndiaSAFE: Are Hikvision upper- and mid-segment products technologically at par? APD: Hikvision products are certified by top notch certification bodies wherein they have the following certifications: ONVIF, PSIA, UL, CUL, FCC, CE, CCC, C-tick, RoHS, WEEE and ISO March 2015
40
standards. Hikvision’s wide range of products has been installed in major key projects around the world which have served the purpose of our customers efficiently and effectively.
IndiaSAFE: How do you provide technical support? APD: We at Hikvision have a dedicated technical support team and steadfast customer service which help us to support after sales service efficiently and effectively. We are serving our customers with help of our toll free tech support number 1800 222 699.
IndiaSAFE: How much effort do you invest in training? APD: We have executed 45 cities Hikvision training program which has acclaimed huge response from our channel partners. Hikvision technical experts trained our participants on the topic ‘Easy steps to design an IP surveillance solution.’ We have offered Hikvision Training Participation certificates to our participants, and overall the participants are happy and satisfied.
IndiaSAFE: What are your comments on the government’s 100 smart cities plan? APD: It’s a good initiative. Quick measures to develop Visakhapatnam in Andhra Pradesh, Allahabad in Uttar Pradesh and Ajmer in Rajasthan as smart cities are virtuous indication for the 100 smart city plan.
IndiaSAFE: What is your message for the readers of IndiaSAFE? APD: IndiaSAFE is a great tool to get updates about the latest technology and industry happenings. Keep up this good work for the coming years as well.
www.indiasafe.com
CMYK
CMYK
white paper
The Convergence of IT Security and Physical Access Control By Ranjit Nambiar – Director Sales, South Asia, HID Global
Using a Single Credential to Secure Access to IT and Physical Resources Executive summary
O
rganizations are increasingly adopting a model in which multiple access control use cases and identities can be supported on a single card or smartphone, thus eliminating the need to remember passwords, or carry multiple cards. This convergence allows smart cards or smartphones manage network and physical access, accessing cloud-based applications, and enables other applications including cashless vending, time and attendance, and secure print management. There is growing demand for provisioning IT and physical access control system (PACS) credentials to a single card or smartphone, using a single set of processes. Beyond convenience, the convergence of credentials onto a single card or device can greatly improve security and reduce ongoing operational costs. It also centralizes identity and access management, consolidates tasks and enables organizations to quickly and effectively use strong authentication throughout their infrastructure to protect access to all key physical and IT resources.
The new, integrated credential management model moves organizations in four important directions: beyond cards to smartphones; beyond readers to ‘tapin’ access convenience; beyond Public Key Infrastructure (PKI) technology to simplified solutions for higher security; and beyond legacy PKI to true converged strong authentication access control. This white paper looks at the drivers, challenges, deployment options and results associated with a converged IT and physical access control solution, and describes the value of a seamless user experience when using cloud-based applications and services, accessing data, and opening doors. It also explains the benefits of unified enrolment processes and workflows spanning multiple identities across multiple IT security applications and the PACS.
Understanding the drivers for convergence
H
istorically, the focus for organizations has been on creating a strong perimeter to secure access to their physiMarch 2015
41
cal and IT resources. Legacy access control relies on a user presenting an ID badge to gain entry into a building, and once inside, using static passwords to authenticate to IT resources. Given the nature of today’s Advanced Persistent Threats (APTs) and all the internal risks associated with Bring Your Own Device (BYOD) adoption, these methods of securing access are in sufficient. Organizations require the ability to better control access and employ strong authentication throughout their infrastructure as part of their multi-layered security strategy. Unfortunately, choosing an effective strong authentication solution for enterprise data protection has traditionally been difficult. Most available solutions are inadequate in their security capabilities, the costs and complexities they introduce for the organization, or the user experience. Employees want the convenience of being able to use a single card or mechanism to quickly and easily access the resources they need to conduct business. To accomplish this, organizations
www.indiasafe.com
CMYK
CMYK
white paper
must deploy a solution that can be used to secure access to everything from the door, to data, and to the cloud. They must combine the traditionally separate domains of physical and IT security, and management of users’ identities and access into one credential.
The value of converged access control
T
ruly converged access control consists of one security policy, one credential, and one audit log. In some organizations, user management is already fully converged, with a single corporate policy that defines acceptable access and use of resources, a single master user repository, and a single logging tool for simplified reporting and auditing. This approach enables enterprises to: ● Deliver convenience: replaces onetime password (OTP) tokens and key fobs, negating the need for users to carry multiple devices or re-key OTPs to gain access to all the physical and IT resources they need. ● Improve security: enables strong authentication throughout the IT infrastructure on key systems and applications (rather than just at the perimeter). ● Reduce costs: eliminates the need to invest in multiple access solutions, centralizing management and consolidating tasks into a single set of administration and help desk pro-
cesses around issuance, replacement and revocation.
Exploring multiple deployment options
W
ith a converged access control model, the credential can be delivered in a variety of form factors such as a smart card (e.g., ID badge) or even a smartphone. Depending on the enterprise’s requirements and existing infrastructure, there are several ways to architect the solution. The following are the three most common models:
(PIV) card, which leverages smart card and biometric technology (a digitally signed fingerprint template) and also supports multifactor authentication methods. Rather than relying on a shared, secret key for authentication, a pair of public and private keys is used and these keys are linked such that information processed with one key can only be decoded or validated using the other key.
Legacy contactless
E
nables an existing card-based physical access control system utilizing technologies such as iCLASSSeos®, iCLASS SE®, standard iCLASS®, MIFARE™ and MIFARE DESFire™ to be extended to authenticate to enterprise networks and applications. Software is deployed on the end user’s workstation, with a contactless reader connected to or embedded in it. The card can be ‘read’ without needing to be physically inserted into the reader device. This is convenient for users, who can take the same card they have been using with a door reader and tap it to a personal computer or laptop in order to gain access to their computer and to corporate and cloud applications. This approach doesn’t employ PKI, which binds public keys with user identities through a certificate authority (CA). PKI strong authentication is a key element of logical access, digital document signing and highly secure access control for sensitive areas (i.e., power stations, data storage, nuclear power, water and petrochemical facilities and other critical infrastructure). A digital certificate including the user’s public key is placed on a Personal Identification Verification March 2015
42
The legacy contactless approach eliminates many of PKI’s key management challenges, but it also supports a more limited range of use cases and doesn’t deliver the same security strength as PKI-based solutions. The contactless, non-PKI model is being deployed in hospitals, schools and other environments, where multiple users need access to the same workstation in quick succession. It is also being used as a bridging solution where mandates require workstations and applications to be protected by strong authentication.
Dual chip card
E
mbeds a contactless chip for physical access control and a contact chip for logical access control on a single smart card. Credentials, such as PKI certificates and OTP keys, can be managed on the contact chip using a card management system (CMS). The dual chip card model is popular with medium to large enterprises with sensitive intellectual property (IP)
www.indiasafe.com
CMYK
CMYK
white paper
or customer data on their networks, because it delivers strong security. It also enables the enterprise to simplify management of their IT security infrastructure and leverage their existing PACS investments because, in many cases, the CMS can be integrated directly into the PACS management system (often referred to as the PACS head-end).
Dual interface chip cards
L
everages a single PKI-capable chip, with both a contact and contactless interface to support both physical and logical access control. The card can be used to support a contact card reader for logical access use cases, such as logging into a computer or signing an e-mail, and PKI authentication for physical access. The dual interface card model is applicable primarily in U.S. federal government organizations. By default, PKI over a contactless interface can be slow for physical access usage. To address this challenge, FIPS 201-2 is expected to allow the use of the Open Protocol for Access Control Identification and Ticketing with privacY (OPACITY) suite of
authentication and key agreement protocols that will add roughly four times the performance for critical tasks. It will also deliver secure wireless communications, which enable the use of PIN and biometrics on the contactless interface. This will further strengthen authentication for both physical and logical access control.
Bringing strong authentication to the door
A
n important benefit of convergence is that it enables enterprises to leverage their existing credential investment to create a fully interoperable, multi-layered security solution across company networks, systems and doors. Strong authentication will increasingly be employed not just for remote access, but also for desktops, key applications,
servers, cloud-based systems and facilities. This requires bringing strong authentication to the door. One of the first places this will occur is in the federal space with users’ existing PIV cards. To use a PIV card to enter a building, the PIV card’s digital certificates are checked against a Certificate Revocation List (CRL), which is provided by certificate authorities. PKI authentication is a highly efficient and interoperable method not only for logical access control to protect data, but also for physical access control to protect facilities, the latter referred to as ‘PKI at the door.’ It is expected that PKI at the door will become more widely adopted as FIPS 201 evolves and there are more products available to support it. There also will be significant opportunities to deploy PKI at the door at lower cost with Commercial Identity Verification (CIV) cards, which are technically similar to March 2015
43
PIV cards, but don’t carry the additional requirements associated with being trusted by the federal government. Unlike federal agencies, CIV card users do not have to purchase certificates from a trust anchor or pay annual maintenance fees, but instead generate their own certificates. While the cards will be a little more expensive to accommodate the extra memory for certificate storage, this modest incremental cost will deliver the valuable additional benefits of stronger authentication at the door. Consider the example of a municipal airport, which can use CIV cards alongside sibling PIV cards that are already being carried by federal Transportation Security Administration (TSA) employees. Airport management can create a single access control system that supports both airport employees and federal agencies that are operating there, while ensuring higher security through strong authentication. Extending strong authentication throughout the physical and logical access control infrastructure will be important to the enterprise. Organizations need a range of authentication methods, along with the flexibility to easily support different users and protect different resources appropriately. With simpleto-use solutions, enterprises can secure access, from managed and unmanaged devices, to an enterprise’s resources. Without having to build or maintain multiple authentication infrastructures, enterprises can use a single solution to secure access to all their resources, from a facility door or copier to a VPN, terminal service or cloud-based application.
What about mobile?
A
s we all know, users are increasingly mobile and bringing their own devices (BYOD) into enterprise environments, using smartphones, laptops and
www.indiasafe.com
CMYK
CMYK
white paper
tablets to access the resources they need. According to ABI, there will be 7 billion new wireless devices on the network by 2015, which is close to one mobile device per person on the planet. Organizations are trying to support mobile access, while looking at ways to leverage their users’ mobile devices as platforms for carrying credentials for physical and logical access control. There have already been pilots, such as one with Arizona State University, that has proven the concept of using a smartphone to carry a physical access credential. Mobile access control requires rethinking how to manage physical access credentials, and make them portable to smartphones so that organizations have the option to use smart cards, mobile devices or both within their PACS. To do this, HID Global has created a new data model for its iCLASS SE® platform called the Secure Identity Object® (SIO®), that can represent many forms of identity information, on any device that has been enabled to work within the secure boundary and central identity-management ecosystem of the company’s Trusted Identity Platform® (TIP). TIP uses a secure communications channel for transferring identity information between validated phones, their SEs, and other secure media and devices. The combination of TIP and SIOs not only improves security, but delivers the flexibility to adapt to future requirements, such as adding new applications to an ID card. It is designed to deliver particularly robust security, and will be especially attractive in a BYOD environment. With a mobile access control model, any piece of access control data can be supported on a smartphone, including data for access control, cashless payments, biometrics, PC logon and
many other applications. The authentication credential will be stored on the mobile device’s SE, and a cloud-based identity provisioning model will eliminate the risk of credential copying while making it easier to issue temporary credentials, cancel lost or stolen credentials, and monitor and modify security parameters when required. Users will be able to carry a variety of access control credentials, as well as an OTP computer logon token on their smartphone that they simply tap to a personal tablet for authenticating to a network. By combining mobile tokens on a smartphone with cloud application single-sign-on capabilities, it will be possible to blend classic two-factor authentication with streamlined access to multiple cloud applications on a single device that users rarely lose or forget. Plus, the same smartphone can be used for opening doors and many other applications. There will be challenges to solve since smartphones and other mobile devices being used for physical and logical access control applications will often not belong to the organization. For example, when a student graduates from a university, he/ she doesn’t hand their smartphone back, in the same way that employees would hand their cards back when they leave a company. It will be critical to ensure the personal privacy of BYOD users, while protecting the integrity of enterprise data and resources. IT departments won’t have the same level of control over personal smartphones used in the workplace, or the potentially untrustworthy personal apps they may carry. IT administrators also are not likely to load a standard image with anti-virus and other protective software onto these smartphones. We will need to find new and March 2015
44
innovative ways to address these and other challenges. Notwithstanding the risks, the use of smartphones equipped with SEs, or equivalent protected containers, opens opportunities for powerful new authentication models that leverage the smartphone for securely storing portable credentials, enabling use cases ranging from tap-in strong authentication for remote data access, to entering a building or apartment. Mobility is driving ongoing convergence, as it forces the physical and IT security teams to work together to come up with a solution. The result can be a solution for easily managing PACS credentials and IT access credentials on smartphones in a cost-effective way, while delivering higher levels of security than cards.
Realizing the benefits of true convergence
T
he ability to combine access control for physical and IT resources on a single device that can be used for multiple applications, improves user convenience while increasing security and reducing deployment and operational costs. It will eliminate the need for separate processes for separately provisioning and enrolling IT and PACS identities. Instead, it will be possible to apply a unified set of workflows to a single set of managed identities for organizational convergence. Organizations will be able to seamlessly secure access to physical buildings and IT resources, such as computers, networks, data and cloud applications. An effective solution will also scale to secure access to other resources, as needed, to support a fully interoperable, multi-layered security strategy that can protect the organization’s buildings, networks, systems and applications, now and in the future.
www.indiasafe.com
CMYK
CMYK
product showcase
Launches New Product Areas During the spring Kentima introduces two new product areas within the business area Security: PSIM and NVR. With these two product areas Kentima creates a distinct and more powerful offering within the security area and simultaneously meet the needs of the market
T
he first product area, which was launched at Intersec in Dubai on January 18-20, is Physical Security Information Management (PSIM). Within PSIM, Kentima focused on the further development of their superior software WideQuick for different applications within the security area; the new software is called WideQuick PSIM. The first version of WideQuick PSIM will be ready for delivery during March 2015. Later this spring Kentima will launch the product area Network Video Recorder (NVR). It has been Kentima´s intention for quite some time to use their substantial knowledge from the product area industrial computers to develop a reliable NVR based on their software
Ethiris VMS. On the market, this is a requested product area and with Kentima´s extensive experience in developing industrial computers, this is the rational way to go. Kentima´s first Ethiris NVR will be ready for delivery in the beginning of May 2015. “Our business area Security provides the market with a distinct and
better offering. In many ways, we are unique in our offering and our customers will gain more advantages by choosing products from Kentima. This is one out of several important steps for us to take at the moment and that will affect our sales positively, in Sweden as well as internationally,” says Kent Nilsson CEO at Kentima.
NUUO Crystal™ Professional Delivers Higher Cost Efficiency with More Advanced Capabilities
N
UUO has launched a new license level for its flagship Linux-based VMS solution – NUUO Crystal™. Designed for middle-scale deployment, the Professional license level provides customers with more enhanced features to achieve higher scalability and seamless integration at a more competitive price. Third-party support has been a key competitiveness of NUUO Crystal™. Besides existing third-party partners, the Professional license level has integrated Lenel’s access control system, OnGuard. When an event is triggered, the surveillance video along with related infor-
mation from OnGuard system will be displayed in NUUO’s VMS interface instantly. Users can match the images with the data in the same interface, dramatically cutting down investigation time. To facilitate troubleshooting for customers located in difficult-to-access areas or closed network environments, the Help Manager is embedded whose diagnostics service will collect the system data of the faulty server for support teams’ further analysis, saving the hassle of traveling to the site, making troubleshooting more time- and cost-efficient. Installers and users can also access user March 2015
45
manuals directly in the interface anytime they need, significantly shortening deployment and maintenance time. The System Navigator service allows users to manage several management servers simultaneously in one interface thanks to its multi-site support. Users can log into different management servers and configure individual servers in the same interface. Images from different management servers can also be displayed in one live view/ playback screen. The single access point to all servers eliminates the need to toggle between different interfaces.
www.indiasafe.com
CMYK
CMYK
product showcase
The Professional license level also comes with additional value-added enhancements. Apart from manual fisheye dewarping calibration which allows users to fine tune fisheye pictures manually to ensure 100% accuracy, users
can customize stream resolutions for storage and live viewing based on their needs or hardware conditions. Hence, users can view real-time streams smoothly on mobile devices while saving lower-resolution footage to save
storage space. PTZ speed support enables users to control the pan/ tilt/ zoom speed of a PTZ camera with a joystick, keyboard or mouse and advanced motion search supports up to 3 channels at the same time.
Launches
The World’s First Network Cameras with Embedded PoE Extender – IB8367-R, IB8367-RT and IB8338-HR V
IVOTEK has launched a revolutionary series of network cameras with embedded PoE extenders, IB8367R, IB8367-RT and IB8338-HR. The three cameras are stylish, bullet-style network cameras ideal for diverse outdoor applications. The uniquely-designed PoE extender embedded within the three camera models allows for both PoE input and output and direct connection with other PoE network cameras without an additional power source, thereby facilitating long-distance surveillance system implementation in factory areas, parking lots, crossroads, and outdoor sidewalks. The IB8367-R and IB8367-RT mod-
els, which feature a 2-megapixel CMOS sensor, offer viewing resolutions of 1920x1080 at 30 fps. By contrast, the entry-level IB8338-HR model is equipped with a 1MP sensor, enabling a viewing resolution of 720P at 30 fps. All models feature WDR functionality, a removable IR-cut filter, built-in IR illuminators (effective distance of 30 meters), Smart Stream, and 3DNR. The IB8367-R, IB8367-RT, and IB8338-HR models are capable of capturing high quality images under challenging lighting conditions without sacrificing bandwidth. Moreover, the IB8367-R and IB8367-RT models are especially designed with Smart IR technology, ensuring consistent and superb image output around the clock. To further optimize image quality and enhance sharpness and depth of field, all three models
March 2015
46
are equipped with a P-iris lens, which controls the lens iris with extreme precision using a built-in stepper motor and maintains optimal aperture through effective software control. Steve Ma, Executive VP at VIVOTEK stated, “To sustain the excellence of our product portfolio, we have put great efforts to enhancing the innovation of product form factors and design. With the goal of satisfying our customers’ needs with total solutions, today, we are pleased to launch a series of the world’s first network cameras with embedded PoE extenders. VIVOTEK’s IB8367-R, IB8367RT and IB8338-HR models revolutionize the establishment of long distance network surveillance systems by eliminating excess cables or power devices and significantly reducing the total cost of implementation and bringing more value to our customers.” Alongside the launch of the IB8367R, IB8367-RT and IB8338-HR models, VIVOTEK also introduced a series of similar models without the embedded POE extender that share the same superior features as IB8367-R, IB8367-RT and IB8338-HR.
www.indiasafe.com
CMYK
CMYK
product showcase
AXIS Q8414-LVS Network Camera Stainless Steel Anti-grip Corner Network Camera Ideal for Video Surveillance
A
XIS Q8414-LVS network camera features vandal-resistant stainless steel anti-grip casing and built-in invisible IR LED for high quality indoor video surveillance even in complete darkness. It is extremely impact resistant, supporting the IK10+ 50joules rating as well as the IP66/ NEMA 4x rating for water resistance. The camera comes with 24/7 indoor surveillance and provides excellent image quality both during day and night with capabilities like Lightfinder technology, which enables life-like colors in low-light conditions, and built-in invisible IR LED illuminator for video surveillance in complete darkness. AXIS Q8414-LVS is meant for video surveillance of small rooms in premises like correctional facilities, interview rooms, psychiatric wards, and medical
for an optimal depth of field, resolution, image contrast and clarity. The horizontal angle of view up to 105° covers the entire room without blind spots. Capabilities such as remote zoom and focus facilitate the optimization of the captured view during the installation.
Key features observation rooms as well as elevators and stairwells. The camera has an inbuilt microphone and can be integrated to the network alarm system via its I/O port, making it part of the overall surveillance solution; an important tool to protect and secure the safety of the people in high security environments. The corner-mount network camera provides 1.3 megapixel or HDTV 720p video stream. It features P-Iris control
● It provides superb image quality both during day and night. ● The water resistant casing allows for water hose cleaning; soapy water, or any other multi-purpose cleaning agents. ● In-built high-quality microphone. ● Memory card slot for storing recordings locally. The suggested retail price for Axis Q8414-LVS Network Camera is upwards INR 110,499 excluding taxes.
New Bosch Fire Detectors greatly improve Detection Performance B
osch Security Systems introduces a new family of fire detectors. The new eSMOG feature provides constant monitoring of environmental electromagnetic conditions. This combines unsurpassed reliability with an outstanding detection performance. The AVENAR detector 4000 features Bosch’s proven ISP technology (Intelligent Signal Processing) through
which all sensor signals are processed continually by smart algorithms using neuronal networks. This results in best in class differentiation between real fires and disturbance values. The detector series also includes models with the innovative Dual Ray technology. It uses multiple wavelengths of two detector LEDs to distinguish smoke particles from other disturMarch 2015
47
www.indiasafe.com
CMYK
CMYK
product showcase
bance values. Around 30 percent of false alarms are caused by visible disturbance values like dust, water, vapour or cigarette smoke. Using Dual-Ray Technology, false alarms caused by these values can be reduced significantly. Modern buildings are increasingly equipped with complex technical infrastructure. This trend leads to a tendency of increased electromagnetic pollution which creates challenges for any installed electrical equipment. It is estimated that between 20 to 30 percent of today’s false alarms have an undetermined cause (BRE-Study: ‘The causes of false fire alarms in build-
ings – 2014’). The AVENAR detector 4000 was developed taking these new realities into account. The eSMOG feature provides robustness against electromagnetic pollution and moreover, supplies the installer with information about critical environmental disturbances at the installation site. This allows the system integrator to identify and to resolve critical conditions even more quickly, hence saving time and money. In addition, during operation and maintenance, eSMOG further enhances stability and detection performance by constantly measuring the electromag-
netic exposure of each detector and calculating mid- and long-term averages. These are used to predict the exceeding of threshold values even before possible false alarms can occur. Operators can see the current EMC values and averages on the user interface of the fire panel. This will noticeably reduce installation and maintenance effort. The AVENAR detector 4000 includes optical and dual-optical detectors as well as multi criteria detectors including thermal and chemical sensors. It is now available in Europe, Middle East and Africa, as well as in Asia Pacific and Latin America.
Pivot3 Simplifies Backup and Disaster Recovery With Hyper-Converged Infrastructure Appliance
P
ivot3, a pioneer and innovator in the development of Globally HyperConverged Infrastructure (HCI) solutions, has announced the availability of its Hyper-Converged Disaster Recovery Appliance (HCDRA). The solution is designed as a cost-effective, high-storage efficiency appliance that secures vital company digital assets and quickly deploys business critical applications in a pay-as-you-grow model. Pivot3’s HCDRAs support fast, flexible and reliable backup and recovery of virtualized applications and data, and are based on Pivot3’s Globally Hyper-Converged Infrastructure technology. Pivot3 HCDRAs combine storage and compute resources within the same appliance. In case of a DR event, data recovery can be performed within the same rack of appliances. Critical operations can be resumed without the need for separate
recovery servers making HCDRAs a particularly cost-effective solution. HCDRAs leverage Pivot3’s patented Scalar Erasure Coding technology to deliver extreme storage efficiency, with up to 94% of total installed capacity effectively available for storage in a 16 node array. The result can save customers more than 25% versus conventional enterprise architecture options for backup. Storage efficiency increases with each added appliance while maintaining exceptional fault tolerance capable of withstanding simultaneous failure of an entire appliance and two hard drives. Pivot3’s technology partners deliver simple-to-deploy DR solutions with data center availability software such as CommVault®, Veeam® or ZERTO® running directly on HCDRAs to replicate critical data, providing five-nines reliability and multi-fault protection at a March 2015
48
competitive price point. “Four of our customers have chosen to install their preferred DR software on Pivot3 hyper-converged infrastructure appliances,” said Andy CK Yoon, CEO, CDIT, Korea. “They chose Pivot3 because of the ease of deployment, the high percentage of total storage capacity available for backup and for the fact that they can perform recovery operations from the same box.” Unifying the compute and the storage enables rapid restoration of critical systems without building a farm of idle servers waiting for a recovery event. “We’ve enabled the same systems to act as backup recipients and the solution to restore workloads when needed,” said Michael Richtberg, Vice President of Product Strategy, Pivot3. In the era of continuous business operations, cutting-edge DR solutions
www.indiasafe.com
CMYK
CMYK
product showcase
enable IT to achieve fast recovery time (RTOs) and recovery point objectives (RPOs) for all applications and data. The combination of Pivot3 fault tolerant and highly storage efficient HCDRAs with the customer’s preferred DR software
ensures that IT can deliver on the promise of the 24/7 data center With Pivot3’s Globally Hyper-Converged Infrastructure technology, DR backup and recovery software running on a VMWare eSXi virtual machine can
access all resources from all HCDRAs in a cluster, including: a common pool of RAM cache, aggregated capacity of HDD storage (Pivot3 virtual SAN), and aggregated SSD storage, for maximum back-up performance.
Samsung Megapixel HD Fisheye Cameras Support Situational Awareness Advanced Features Include 5 MP Quality, Intelligent Motion Detection and On-board Dewarp
S
amsung Techwin continues to take the lead in offering high-performance imaging solutions that help improve situational awareness across a broad range of applications. Its newly released SNF-8010 and the new mobile SNF-8010VM Fisheye cameras offer 5 megapixel definition with digital pan/ tilt/ zoom (P/T/Z), intelligent video analytics and on-board SDXC storage up to 64GB, and are increasingly being specified for projects where there is a requirement to monitor activity 24/7 in environments such as banks, offices, retail and warehouses. “Our new megapixel fisheye cameras perfectly complement new or upgraded video surveillance systems with high quality images,” said Tom Cook, Vice President, Sales, Samsung Techwin America, “With built-in intelligence and a wide range of options to choose from, Samsung’s megapixel fisheye cameras greatly enhance situational awareness as well as providing the ultimate in versatility and cost-efficiency.” Images captured with the SNF-801/ 8010VM Fisheye cameras can be dewarped and/ or displayed in a variety of
configurations, including single or double panorama and 360° view as well as other view configurations. Images can also be dewarped on the client side for viewing and recorded in full 360° view prior to dewarping. PTZ functionality allows users to electronically pan, tilt and zoom in on specific areas for a more detailed view. Intelligent motion detection allows the cameras to detect motion while ignoring small, repetitive motions that could generate false alarms. With this feature, users can also configure the camera’s sensitivity, object size (minimum/ maximum) and detection (or privacy mask). The built-in microphone on the SNF-8010 provides audio detection capability, making it ideally suited for blind spots, low-light areas and other locations where video detection may be March 2015
49
challenging. The camera also enables bidirectional audio communications and audio compression in G.711 u-law or G.726 format. With an M12 connector and an IK10/ IP66 rated enclosure, the SNF-8010VM is ideal for use in transportation applications, such as buses and trains where it can be used internally to monitor passenger activity or externally to monitor the road or track ahead to provide video evidence of any incident. Both cameras provide 12V DC PoE capability, alarm input and output, and the ability to detect tampering and network disconnection. In the event of network disruption, video is automatically recorded to the camera’s on-board SDXC storage to ensure continuous coverage. The SNF-8010 and 8010VM feature automatic day/ night image capture,
www.indiasafe.com
CMYK
CMYK
product showcase
privacy masking and alarm triggers for motion detection and network disconnection. Advanced Samsung technology engineered into the camera’s design includes Samsung Super Dynamic Range (SSDR) and Samsung Digital Noise Reduction (SSNRIII). The cameras are
capable of transmitting video at 20fps at 5 megapixels or 30fps at 3 megapixels with dewarped images. Samsung’s smart codec allow users to set regions of interest such as vehicles, faces and other parts of a scene to be captured in fuller detail than the re-
mainder of the scene, allowing the SNF8010 and 8010VM to produce lower data rates while clearly highlighting regions of interest. The new smart codec will deliver faster transmission speeds while effectively reducing bandwidth traffic and storage requirements.
Perspective Video Management Software (VMS)™ P
erspective VMS features a unique map-based navigation feature. Users can move easily among multiple site locations or different floors on buildings by drilling down through site maps. These can be created from CAD drawings, map images or even satellite images or photos of buildings. Using map images for navigation gives users real time situational awareness. On the map image, camera positions can be signified when setting up the software. The cameras can be
viewed from the map interface, by hovering over the camera icons for a video pop-up or dragging and dropping cameras to the included camera dock.
The navigable map can be custom configured to the user's needs. Pan and zooming on the map are intuitive as well. LENSEC has years of experience providing solutions that work well in many environments including educational campuses, warehouses, oil & gas locations, hospital campuses, commercial properties, water/ wastewater, critical infrastructure sites, and more.
Launches Revolutionary Handheld Imager Aimed at Targeted Security Screening for Loss Prevention and Employee Safety Applications
I
SCON Imaging, INC., a manufacturer of patented infrared (IR) imaging screening systems, has unveiled its new FocusScan handheld imager for targeted personnel scanning. FocusScan is the first-ever IR-based handheld imaging technology purpose-built for use in loss
prevention, security enhancement and asset protection. FocusScan enables targeted screening of individuals, providing a detailed view of any objects hidden under clothing. The device delivers high-resolution images that allow users to enhance March 2015
50
safety and reduce loss while minimizing privacy concerns and eliminating radiation exposure. It records images securely for investigative purposes. An intuitive touchscreen interface streamlines usability, while the handheld platform also features an embedded metal detector for
www.indiasafe.com
CMYK
CMYK
product showcase
enhanced detection. FocusScan is completely portable and leverages ISCON’s patented thermo-conductive infrared technology. “FocusScan is a handheld imager designed for random security checks in high-value areas, including retail distribution sites and warehouses,” said Kathleen Tighe, Director of Sales and Marketing, ISCON Imaging, “It is purpose-built for loss prevention and employee safety applications, and its handheld design allows security personnel to quickly and easily identify concealed objects, allowing a more proactive ap-
proach to controlling loss and increasing security.” According to the 26th Annual Retail Theft Survey released in 2014, 78,085 dishonest employees were apprehended in 2013, up 6.5% from 2012. More than $55 million was recovered from employee apprehensions in 2013, up 2.5% from 2012, and one out of every 39.5 employees was apprehended for theft. FocusScan can help retail organizations capture incidents of loss before the employee leaves the facility, ensuring robust LP recovery numbers. “Retail organizations across the
globe face numerous challenges, and ISCON is dedicated to helping our customers better address common pain points head on,” said Bill Gately, CEO, ISCON Imaging, “By providing comprehensive screening solutions, such as FocusScan, we help close vulnerabilities in LP operations, while ensuring a safe workplace environment.” At the RILA Retail Supply Chain Conference, held Feb. 23-25 at the Gaylord Palms Resort & Convention Center in Orlando, Fla., ISCON Imaging demonstrated the benefits and capabilities of the FocusScan solution.
Surveon Enterprise NVR5000 Keeps Maintenance and Scalability Simple for Advanced Surveillance
S
urveon recently released one of the industry-first compact server NVR to tackle installers’ common difficulties on maintenance, operation and video storage in megapixel surveillance. The new enterprise NVR5000 series offers a shorter chassis, cableless, redundant modules and powerful features to ensure high performance operations and easy maintenance for project installers. “We have designed the NVR5000 with friendly usability in mind,” said Casper Wu, Product Manager of Surveon, “Because many CCTV equipment rooms have limited space, the NVR5000 comes with a shorter chassis (500mm/ 19inches in depth) and can fit in a standard rack without occupying larger space usually required for a server NVR.” In addition to limited space, the rooms are
usually with higher temperature due to heavy machine operations. With the cableless design, the NVR5000 can avoid dust and allows better circulation and thus reduces thermal issues to ensure system reliability for long-hour, nonstop recording. “Another hassle customers often face is the high cost and effort when they need to repair the systems,” said Wu. The NVR5000 offers swappable HDDs and modularized CPU, redundant cooling fans and power supplies. Using the March 2015
51
NVR5000, installers can easily replace the malfunctioned module instead of the entire system and keep maintenance simple and low-cost. Moreover, the NVR5000 offers easy scalability that allows storage to be expanded locally by simple cable connections. Without using complex remote storage such as NAS and iSCSI whose performance lies heavily on the network status, the NVR5000 is equipped with the SAS expansion port and is expandable up to 128 HDDs for large-scale projects. Designed for enterprise applications such as public utility, government, hotel, factory, and large campus, theNVR5000 is based on the Intel® Haswell server platform optimized for power savings and high performance, and supports 16bay HDDs for data storage and RAID 5,
www.indiasafe.com
CMYK
CMYK
product showcase
6 for data protection. For price-sensitive markets such as SMBs, retail and restaurant, Surveon offers the all-in-one, plug & play, Linux RAID NVR3000 series as a professional and economical option. For mission-critical projects such as city surveillance and transportation, the Surveon NVR2100 with EonStor RAID subsystem storage supports up to
64 channels of Full HD video recording and offers large capacities up to 448 TB for longer video retention periods, overall system stability and zero video loss. All Surveon NVR series are pre-installed with the Surveon VMS, offering enterprise-level functionalities such as large data backup and archiving, remote data retrieval, real-time video analytics,
instant playback, fisheye dewarping, PIP, multiple displays, mobile client, remote monitoring, centralized domain management and many more. Moreover, the Surveon NVRs are compatible with the advanced Surveon Control Center (SCC 2.5), supporting TV matrix and high scalability with unlimited cameras, NVRs and clients.
SmartTrap+ combines Mechanical Interlocks with Process Safety Sensors SmartTrap+ ensures process vessels and pipework are safe to open n the process industry, mechanical interlocks guarantee strict adherence to procedures and help avoid human error. They are particularly useful for highly dangerous operations such as pigging and valve changeover procedures. While interlocks ensure extremely
I
that enable traditional interlocking to be combined with digital process control and instrumentation systems. Smith Flow Control is the first company to combine these mutually beneficial technologies in the development of the SmartTrap+, which incorporates sig-
high safety levels, they usually function as stand-alone safety systems. New digital technologies are now emerging
nals from sensors into the interlocking sequence. During a pigging operation certain March 2015
52
safety conditions need to be met: the vessel pressure should be at a safe level and all dangerous gases and residue must be removed before opening the pig door. Mechanical interlocking guarantees that all required valve operations are performed, but cannot guarantee the outcomes of these operations. For example, opening and closing a vent valve does not give real time information that the vessel pressure has actually reached a safe level; while opening and closing a drain valve does not guarantee that all residue has been removed. By incorporating signals from other field devices like pressure or H2S/ CO2 sensors into the interlocking sequence, the SmartTrap+ ensures interlock keys can only be released if particular process conditions have been met. So, for example, this could mean that the key for opening the vessel closure door will only be released when the pressure inside the vessel is acceptable and no dangerous gases or residue are detected.
www.indiasafe.com
CMYK
CMYK
product showcase
SmartTrap+ incorporates permissive signals and a door lock proximity switch (4-20mA) as standard. The signals can include (but are not limited to) pressure detection, gas detection, flow/ level and pig detection. Some of the factors contributing to pipeline pigging incidents include: ● Lack of training or complacency. ● Lack of hazard awareness. ● False sense of security and reliance only on pressure gauges.
SmartTrap+ effectively deals with these factors, making pigging a safer operation and grants full traceability in real time. The process industry’s standard preventive actions include: ● Hazard identification and risk assessment including management of changes. ● Awareness, training and competencies of personnel. ● Procedures that address normal and
upset conditions. SmartTrap+ reinforces these actions and implements genuine physical control on any pigging operation. For operators needing to ensure higher levels of process safety, the SmartTrap+ is an ideal solution. By incorporating the best of traditional mechanical interlocking with process sensor information to ensure all vessels are safe to access, it will help to reduce accidents and reduce downtime.
Exacq Technologies Integrates with CEM Security Management System The CEM integration provides exacqVision users with a centralized security system
E
xacq Technologies, part of the Security Products business unit of Tyco, a leading manufacturer of video management system (VMS) software and servers used for video surveillance, has announced an integration with CEM AC2000 security management system (SMS). AC2000 is a powerful, fully integrated access control, alarm processing and photo badging system. The seamless integration between exacqVision and AC2000 enables users to associate access control alarms with digital video footage. AC2000 receives video alarms, such as video loss, motion and recorder offline, generated from the exacqVision system. These alarms are centrally displayed through the AC2000 system. Users can view up to 16 cameras on their exacqVision recorders in the
DVR viewer application. With this integration, end users can utilize one control center to quickly view access control events with the related video and update cam-
era presets. Key features of the integration include the ability to manage the following VMS functions from the AC2000 interface: ● Control pan, tilt and zoom (PTZ) cameras and adjust presets. ● Detects cameras and configures auMarch 2015
53
tomatically. ● View video associated with alarms as they occur. ● Set up video alarm actions. ● Playback alarm videos and download live and recorded video clips. “Our unified integration provides our customers with an opportunity to conduct video security from a single, intuitive interface,” said Scott Dennison, Director of Marketing, “Combining our exacqVision VMS functionality into CEM further unifies Tyco Security Products as an all-in-one video surveillance solution.” This integration requires exacqVision server 6.0 or later with a current exacqVision Professional or Enterprise license and CEM AC2000 v6.8 and above.
www.indiasafe.com
CMYK
CMYK
product showcase
New Altronix Outdoor Solution Enables Long Range Ethernet over Coax or CAT5e Supports Hi-PoE and PoE/ PoE+ at longer distances
A
ltronix continues to expand its popular offering of eBridge Ethernet over Coax solutions with the introduction of the new eBridge200WPM Transceiver, designed for rugged outdoor use. This unit transmits IP video/ data and power over Coax up to 300m or CAT5e up to 500m without repeaters. eBridge200WPM is Hi-PoE (60W), PoE/ PoE+ compliant and supports cameras/ edge devices beyond the standard 100m distance. “This new addition to the Altronix line of networked transmission solutions with long range Ethernet capabilities provides greater system flexibility for outdoor applications,” said Alan For-
man, President, Altronix. eBridge200WPM can support a sin-
gle Hi-PoE (60W) camera/ device or two PoE/ PoE+ cameras/ devices at 100Mbps full duplex. It also offers built-in IP management which allows for remote camera reset, monitoring and reporting via various IP protocols, as well as system event reporting via email and SNMP trap message notifications. When utilizing Altronix eBridge100SPR Receiver for coax applications or a Pace1PRD for CAT5e applications, power is injected up the cable eliminating the need for a local high voltage power source. The eBridge200WPM is housed in a lightweight IP66-NEMA4/4x rated enclosure, UL Listed in the U.S. and Canada and CE Approved.
Introduces
Control Center Mobile 2.0 W
enables intelligent, accurate and effective real-time monitoring of property and assets via the convenience and flexibility of a mobile device. A security force-multiplier, ACC mobile supports on-site security personnel or self-monitoring applications of any size or complexity. So what’s new in the latest release of the ACC Mobile app?
hen ACC Mobile was released in 2011, it revolutionized the way that security professionals could access and monitor their system remotely for faster incident response. Underpinned by the patented High Definition Stream Management (HDSM)™ technology, ACC Mobile enables the viewing of high-definition footage from any device with an Internet connection. The recent update to the ACC Mobile platform marks the next innovation for superior preventative protection. Combined with Avigilon’s HD adaptive video analytics technology, ACC Mobile now
Push-alarm notifications
A
CC Mobile now features new powerful alarm push-notifications through integration with the Apple Push March 2015
54
www.indiasafe.com
CMYK
CMYK
product showcase
Notification service on iOS and Google Cloud Messaging service on Android, ensuring security personnel receive critical alerts even when the app isn’t open.
Tap and swipe alarm handling
N
ewly designed and easy-to-use interface features color-coded alarm state indicators, an intuitive listing of all
alarms and the ability to preview associated cameras.
Compatibility and support ● Available for iOS 7 and 8 devices, and Android 4.x and 5.x devices. ● The recommended gateway version is ACC 5.4.2.10 (new alarm push notifications requires ACC gateway 5.4 or later).
● Existing ACC Mobile functionality (such as streaming live and recorded video) continues to be available for mobile devices connecting to ACC 4 and ACC 5 gateways. The newest release of the ACC Mobile app has been available for Apple iOS and Android devices since February 6 2015, through the Apple App store or Google Play.
Dahua iHCVR offers Face Detection Function D
ahua Technology has introduced its new iHCVR series products. iHCVR is based on Dahua’s in-house High Definition Composite Video Interface (HDCVI) technology, new generation of smart face detection which realizes1ch face detection, instant playback and face index playback. iHCVR series products not only support face detection but also can realize face image snapshot and face image 20 seconds playback assisted by software.
HD performance at 720p
D
ahua iHCVR product family is based on HDCVI technology and it retains the ease of use of an analog system while offering up to 720p HD video output.
Easy space
D
etected face images, motions, alarm snapshots and video can be uploaded to the free ‘Easy Space’ (Network Cloud Disk) such as Skydrive and Dropbox to keep data safe and save storage space. Also the recorded data can be searched easily.
P2P
P
2P allows simple and easy connecting between client-end and mobile
apps. Dahua iHCVR can realize p2p network connection through scanning QR code and logging website. (www. easy4ip.com) iHCVR products family includes 5104/ 5108H-F and 5104/ 5108HE-F. Among these models, different hardware case is not the only way to differentiate them but also with different functions, such as iHCVR5104/ 5108HE-F supports 4/ 8-ch alarm in and 3-ch alarm out. Furthermore, the sync software was available for mobile phones in January. With mobile device viewing support, it will be much more convenient to use. March 2015
55
As for the users, iHCVR is a cost-effective, easy-to-use and high performance solution.
Key features ● Supports face detection, instant playback and face index playback. ● Detected face images can be uploaded to the free ‘Easy Space.’ ● Support p2p network connection through scanning QR code. ● All channels@720p real-time recording. ● 1 HDMI, 1 VGA, 1 Audio, 1 SAT, 2 USB, 1 RJ45 (100m), Alarm (HE Series optional).
www.indiasafe.com
CMYK
CMYK
product showcase
DIGIEVER NVR New Firmware 2.1.0.54 Now Available to Upgrade: Superior NVR failover system and multi-volume storage expansion
D
IGIEVER has unveiled the latest firmware 2.1.0.54 for DIGIEVER NVR to bring it to an advanced IP video surveillance level. In firmware 2.1.0.54, DIGIEVER develops NVR failover,
and mobile surveillance app DIGIMobileV2. We are very excited to make surveillance become easier and more convenient to protect society and the whole world.”
multi-volume storage management and event and action enhancement that not only firmly secure the operations of the DIGIEVER IP video surveillance system but also provide more flexibility for users to expand video’s storage ability for longer storage requirements. “The release of firmware 2.1.0.54 is a milestone for DIGIEVER to expand to more comprehensive IP video total solutions,” said Catherine Yeh, Product Manager of DIGIEVER, “DIGIEVER has launched a comprehensive IP video surveillance solution, including DIGIEVER NVR, DIGIARRAY, Video Wall Decoder, DIGIEVER CMS
NVR failover feature is a reliable backup solution to ensure the reliability of DIGIEVER IP video surveillance system for long-term video recording and monitoring.
March 2015
56
All DIGIEVER NVR Pro+ and Pro series can be treated as a failover server to monitor NVR recording servers and to take over the responsibility of a failed server. Failover server will cease take over of the failed NVR as soon as the failed NVR becomes functional. In addition, users can check the NVR log system for detailed NVR information. To keep vital recorded videos for longer times with perfect video protection, storage capacity becomes an important issue when selecting a suitable IP video surveillance system. Therefore, DIGIEVER introduces multi-volume storage management to help users easily and flexibly expand NVR’s storage capacity with storage expansion box DIGIARRAY DA-4000E. Multi-volume storage management offers users an innovative method to easily expand storage capacity without removing original recorded videos. DIGIEVER NVR can still operate its usual monitoring missions as normal without any interruption of daily usual tasks. Besides, users can build different RAID types on DIGIEVER NVR and DIGIARRAY since DIGIEVER NVR and DIGIARRAY are individual systems. DIGIARRAY DA-4000E is an external storage expansion unit designed for DIGIEVER NVR series to satisfy customers’ request of higher storage capacity. One
www.indiasafe.com
CMYK
CMYK
product showcase
DIGIEVER NVR can connect up to 2 DIGIARRAY units that can easily expend up to 8 HDDs and up to 48TB for recording files. DIGIARRAY features hardware RAID to minimize the time to format/ rebuild hard disks and HDD hotswap design allowing users to replace a
faile d HDD without shutting down the system. Furthermore, with the release of new firmware DIGIEVER NVR now supports up to 6 event types and 15 action types to solidly guard your region with complete event and action manage-
ment. Finally, with the release of firmware 2.1.0.54, DIGIEVER NVR has successfully integrated with over 100 IP camera brands and more than 3,600 models to satisfy surveillance requirements in various vertical markets such as finance, education, retailer shop etc.
Launches
The 25 channel, E7060A Physical Security Appliance NVR with Analytics
A
imetis Corp. announces the addition of the 25 channel E7060A to its Physical Security Appliance (PSA) NVR line-up. The E7060A PSA range combines purpose-built hardware with Aimetis Symphony™ video management and analytics software. It comes loaded with 24 of its 25 camera channel licenses. 22 camera channels have Standard video management software (VMS) licenses and 2 have Enterprise VE Series™ analytics licenses. A third Enterprise license is added when the PSA is registered. Aimetis’ PSAs provide an embedded and seamless integration between VMS and video analytics. The PSAs give installers simple entry into the VA and VMS markets, with no compromise in functionality. The licenses on the PSAs are not tied to a particular camera. This
allows unrestricted camera replacement and simple license upgrading. The PSA can also be integrated into much larger, multi-sited, centralized VMS solutions at any time and includes software viewing using Windows Client, Web, iPhone, iPad and Android. The Aimetis PSAs support many manufacturers’ MP cameras and no software uploading or activation are required, helping to simplify installation. The PSAs have 6TB of internal storage using a WD Purple, surveillance-grade, hard disc drive and provide external support for eSATA, NAS, camera SD card and more. Fan-less cooling keeps running costs low with high reliability. The Aimetis VE Series™ video
analytics functions available include motion tracking, object classification, people counting, occupancy, auto-PTZ tracking, ANPR, facial detection, left/ removed objects, virtual fence, wrong direction, motion detection and loitering/ dwell time. The PSA allows this functionality to be allocated to selected cameras, with the flexibility to re-allocate to a different camera if system requirements change.
Launches Cloud-based Fire Alarm Management Solution F ike Safety Technology (FST) has released Nimbus, a new solution for the monitoring and management of remote fire alarm systems over the in-
ternet. At the heart of the system is a cloud-based database, which receives data from fire alarm systems via the GPRS mobile network. In addition to
March 2015
57
FST’s own TWINFLEXpro and Duonet fire alarm systems, Nimbus also works with the majority of analogue addressable control panels from all of the major
www.indiasafe.com
CMYK
CMYK
product showcase
manufacturers. The primary application of Nimbus is to log, manage and administrate the commissioning, servicing, maintenance, testing, performance and day to day use of the connected fire alarm systems. Data is stored in a secure database and
accessed via a standard web browser on any internet enabled device. Event noti-
fications are sent via email and/ or SMS messaging. Nimbus is the ideal management tool for Service, Building and Estate Managers who need to maintain a lifetime electronic log of their fire alarm systems. Fire alarm installers and service companies can also benefit from Nimbus, by offering it as a value-added service to their customers and using it to help streamline their own service operation. Nimbus centralises all fire alarm system activity through a single crossplatform management tool and provides a detailed electronic history of the system throughout its use and life. The Nimbus database can provide an infinite log of all data, thereby overcoming the memory
limits of fire alarm control panels. Fire alarm control panels are connected to Nimbus using a GRPS Gateway. This is a non-intrusive interface that connects to the panel’s serial or printer port and does not affect the function of the fire alarm system. Requiring no physical connection to telephone lines or clients IP network the GPRS Gateway provides the ideal communications path between the fire alarm system and Nimbus. Reports can be generated based on weekly testing, servicing and live activity. Users may also generate specific reports based on their own search criteria; e.g., date/ time, mode, event, panel, loop, device and any protocol parameter. The common web interface simplifies the generation of reports and allows data to be exported to industry standard tools, such as an Excel spreadsheet, or simply printed.
New Galaxy Control Systems Remote Access Reader with Turbo485 Sets a New Benchmark in Polling Speed Turbo485 delivers speeds up to 10x faster than conventional 485 readers using legacy RS485 architecture
G
data polling speeds up to 10x greater than conventional 485 readers. “Although RS485 is considered legacy at this point in time, there are thousands upon thousands of facilities around the world that still rely on this infrastructure. Our new RS485 Remote Readers with Turbo485 data polling
alaxy Control Systems, a leading provider of integrated access control, video and security solutions, featured its new RS485 Remote Readers with Turbo485 polling speed at Intersec 2015. Unlike conventional RS485 access control readers, the new solution from Galaxy with Turbo485 delivers March 2015
58
www.indiasafe.com
CMYK
CMYK
product showcase
speeds allow these facilities to install state of the art access control solutions without having to rip and replace existing infrastructure,” said Robert Laughlin, President, Galaxy Control Systems, “The cost savings, scalability and incredible speed provided by our RS485 Remote Readers with Turbo485 are truly unprecedented.” Facilities with RS485 field wiring architecture can connect Galaxy Control’s RS485 Remote Readers at door locations to the company’s Dual Serial
Interface (DSI) and eliminate the need to run additional cable from field access devices to a centralized controller. All field terminations can be done in close proximity to each of the door locations. RS485 Remote Readers are selectable for one or two readers and can connect a single door with a single reader, a single door with dual in/ out readers for antipass back, or two doors each with single readers. Over 4,000 access control readers can be accommodated in a single sys-
tem with Galaxy Control’s new RS485 Remote Access Readers using multi DSI controllers or via home run connections – or any combination of both. For added versatility and value, RS485 Remote Readers with Turbo485 polling speeds accommodate up to 16 contact closures via 16 independent inputs. This allows the access control system architecture to also facilitate alarm devices and functionality such as Fail Safe operation to unlock doors if a fire alarm is activated.
New 2K Module Camera MDF5200HD-DN Nightline Dallmeier has added another model to its 5200 Nightline series, the MDF5200HD-DN. This is a compact module camera which is ideally suited for installations in automated teller machines, gambling tables and display panels
T
he 5200 Nightline series has been developed with special attention to changing light conditions for 24-hour video surveillance. One particularly special feature is its outstanding lowlight performance: The extremely high light sensitivity of the sensor and the sophisticated image processing ensure crisp colour images even in the dark. In night mode, the cameras also provide outstanding results due to their excellent infrared sensitivity. The MDF5200HD-DN module camera is built into a small sensor enclosure and a separate encoder enclosure. Thanks to this extremely compact design, the camera is ideally suited for installations in automated teller machines, gambling tables and display panels – the corresponding mounting brackets are al-
ready included ex works. Furthermore, the IP camera is equipped with a 1/4” tripod socket located on the top and bottom, so it fits all standard brackets. The camera provides up to 2K FullHD video with up to 30fps at full resolution (1080p/ 30). It has a motor-driven megapixel varifocal lens that is perfectly tuned to the image sensor. The adjustMarch 2015
59
ment of zoom, focus and iris is made conveniently using a web browser, and no manual lens setting is required at the installation site of the camera. The MDF5200HD-DN is equipped with a RAM memory that is used by the EdgeStorage function for storing the video stream in case of a network failure. When the network is restored, the SmartBackfill function ensures fast transmission to the SMAVIA recording system. This stores the video stream at high speed and then continues the recording of the live stream seamlessly – this means that no picture data ever gets lost, even if the network goes down temporarily.
www.indiasafe.com
CMYK
CMYK
Top Access Control Trends
2015 By Blake Kozak – Principal Analyst with IHS
2014 proved to be a busy year for the access control industry which brought an abundance of innovation and change, with some suppliers even challenging our perception of security. Does security require components and solutions to work independently and remain isolated from other applications or should security entertain the idea of an open ecosystem of devices interacting to paint a clearer picture of an environment? In 2014, the access control industry begun to rapidly embrace IT and other more convenience-based solutions more so than in any year prior. Mobile devices and remote management dominated industry news with the residential, hotel and education verticals spearheading the movement. These changes will impact all facets of the access control industry as IT becomes more influential. Subsequently in 2015, IHS expects a continuation and implementation of the trends from 2014, notably with more focus on software, Bluetooth Smart with wearables and wireless locks, especially in smart home applications. A few of the trends are discussed on the top access control trends for 2015. March 2015
60
www.indiasafe.com
CMYK
CMYK
report
Not a question of if, but when
S
imilar to access control as a service (ACaaS), Mobile credentials will see more widespread uptake in 2-3 years’ time, and selling mobile credentials will present new challenges and rewards for channel partners.
More than 35% of electronic Advantages IHS● projects Reduce administrative cost of printing and maintaining credentials.
• Electromechanical and ● Provisioning and registering made mechatronic were the most easier. talked-about product over past 12 months ● Mobile phones are lost less often.
emulation (HCE), providers can offer NFC outside of the SE.
manufacturers in addition to open APIs and SDKs. For example – residential security market is becoming increasingly competitive, but brand of hardware is More than 35% of not a focus during marketing and sellelectronic locks ing. Instead, value is driven by services, shipped in 2015 will be expertise and customer satisfaction. wireless online Integration: Bringing together dispa● Electromechanical and mechatronic rate and having them work cowere the most talked-about products locks shipped in 2015 will besystems wireless online, hesively will drive value. This includes over past 12 months. ● Electronic locks allow more doors to integrating human resources (HR), visitor management, student databases, conbe online.
● Passcodes on mobile phones add a
• Electronic locks allow more layerto of be security. doors online
● Combine legacy card technologies
• Reduces installation cost and with mobile access. time spent with each end user
● Reduce cost of buying hundreds (or
• Online flexibility to be installed thousands) of plastic credentials. in remote locations in all weather climates by using Barriers mechatronic locks, where andBluetooth access rights ● battery NFC or Smart are will be often held in the key the technology of choice. NFC can
be used with most smartstatic, card read• Offline flexibility among programmable read/write ers today with and minimal updates, but there are fewer phones available with
• Use flexibility: cabinets, this technology enabled lockers, carts, doors, etc. for non-
payment transactions. Bluetooth is available on all smartphones today, but the existing access control reader infrastructure does not support Bluetooth. ● Bring Your Own Device (BYOD) adds risk to the organization. Who will manage the mobile device – the IT or security department? ● Secure Element (SE) cannot be widely accessed without extensive and expensive partnerships. Most providers of NFC-based access control currently use encryption methods located in the ‘sand box’ (host operating system) of the handset only, not the SE. By using host card
● Reduces installation cost and time spent with each end user. ● Online flexibility to be installed in remote locations in all weather climates by using mechatronic locks, where battery and access rights are often held in the key. ● Offline flexibility among static, programmable and read/ write. ● Use flexibility: cabinets, lockers, carts, doors, etc.
tractors and risk/ compliance protocols. Cloud-based services: Many mega trends impacting access control market today are closely tied to IT. Access control industry over next 10 years will be reshaped by Physical Logical Access Interoperability (PLAI) and role-based access control (RBAC) as it relates to logical, physical and HR integration, as well as implementation of new methods to assign access control rights.
With hardware becoming more commoditized, Internet of Things (IoT) services are key to difs the Internet of Things (IoT) revoferentiation lution heats up and IT becomes
A
A
diverse hardware portfolio will remain an ingredient for successful
March 2015
61
more integral to security, closets with servers and PCs will become a thing
www.indiasafe.com
CMYK
3
CMYK
report ains thorny for access control vendors pre-packaged/ bundled solution, while others require a tailored approach. Some need to meet strict regulations and standards set by government, while others want to utilize social media and mobile applications to create exciting end-user experiences. Building access control requires knowing: who, what, where and when, so the market continues to be slow moving for good reason. But change is coming, partly driven by other industries that already embrace innovations like mobile/ remote connectivity and the cloud but also by end users becoming more familiar with technologies, e.g., the home.
Administering security
N
of the past. Management of PACS is also decentralizing with the adoption of ACaaS. third party servers/ services combined with OPEX and CAPEX can greatly reduce cost per door while removing on-site equipment. Intelligence is being pushed closer to the edge. Average number of readers per panel is quickly decreasing, and despite many panels being capable of managing 100+ readers, average reader per panel is nearing 30 or less. Edge devices are getting smarter. All-in-one readers and panel devices can display information on training
requirements, meetings, visitors and other important information specific to each employee. Web-based panels allow management from any Web browser. Wireless locks can connect to a gateway or via a mesh network, vastly reducing cabling.
Even with innovation, legacy remains thorny for access control vendors
F
lexibility and options remain a core function of the access control industry. Some end users prefer a March 2015
62
ot all end users require hardened security but instead are looking for easy and efficient methods of administering security, for examples: ● HID Global’s ‘Twist and Go’ gesture technology. ● Allegion’s ENGAGE technology. ● Zaplox mobile keys. ● Clay by Salto – cloud-based wireless locking solution. ● OkDoor and SAM API by Brivo Labs. ● Kevo by Kwikset. ● And many more. 6Convenience-based security is a growing segment of the access control industry. Just as the residential market has been reinvigorated by marketing as well as new technologies and innovations from newcomers like Google, MSOs and existing providers like ADT, the access control industry could jump-start the SMB market with new, enticing and innovative technologies. After decades of providing magnetic strip readers, push PIN and card
www.indiasafe.com
CMYK
CMYK
onic locks are a primary selling feature for smart home solutions
for the U.S., ) offer a to the n.
report
Target end users with the most upside
O
selling ditional xpects. ectronic motion
n by: locking ry keys arrives readers, the access control industry is realizing that not all end-users need high-grade security, and that convenience should have a larger role in the future and be part of more portfolios.
In North America, electronic locks are a primary selling feature for smart home solutions
T
he smart home is a mega trend for the security industry today. In the U.S., multiple system operators (MSOs) offer a wide array of security products to the home along with home automation. Security will remain the primary selling feature for MSOs and traditional monitoring companies, IHS expects. Security devices include: video, electronic locks and intrusion detection like motion and door/ window sensors. Features are being driven by: convenience of remote locking/ unlocking of doors; ability to provide temporary keys or know when a family member arrives home.
New entrants
N
ew entrants will help drive demand, competition and partnerships and consolidation should be expected as the market becomes less siloed. Dozens of suppliers offer both access control and video surveillance. Some video surveillance suppliers – like Axis – have created their own branded solution. Some – like Panasonic and Bravida – have partnered with access control manufacturers and created OEM agreements. Some have free applications – like Video Insight with MonitorCastEDU – to run beside video on the same server to reduce the costs to end users. Google, Apple and various MSOs (AT&T, Comcast, Time Warner etc.) are also new entrants. New entrants are a positive for the security industry. While security solutions may not be equal, they are all required today in most enterprise, SMB and government applications. Even the residential market is now looking for video, electronic access control and intrusion on a wider scale. March 2015
63
ver next 12 months, many governments will increase spending and continue existing programs, like PAC2 in Brazil and C4I4 in Mexico. Other initiatives will target renewable energy, manufacturing and education. Governments in all countries and regions are looking to implement a safe, secure and eff icient cloud-based solution. Many EU countries, together with the Trusted Cloud (European Cloud Partnership), are in the process of creating best practices and blueprints for countries to follow to address cross-border security concerns. The U.S. is searching for ways to use commercial cloud for government agencies and departments like the Department of Defense (DoD). As 4G mobile coverage expands, more towers will be required, which will create more demand for mechatronic and remote access control 8 to protect the new towers. Rentable office space is helping drive demand for aesthetic locks and centrally managed access control. Facilities managers are also looking to use more ACaaS-type solutions. Higher education across Europe is seeing a big increase in demand in access control, mainly to ease administrative workflows and to attract students, while the U.S. is continuing to spend on school security to protect against violence. Smart security hardware in the home will grow above 20% yearover-year for the next several years as more folks look to ZigBee and ZWave devices to connect through a central gateway and mobile device.
www.indiasafe.com
CMYK
CMYK
International Updates
Announces
2014 Financial Revenues Showing 60% Growth H
ikvision, the global leader in innovative video surveillance products
and solutions, has announced revenues of US$2.82 billion for the financial year 2014. This corresponds to a 60.37% growth rate year on year and a compound annual growth rate over the last decade of 53%. “Hikvision’s continued growth is attributable to our product innovation capability and complete product and integrated vertical solution offerings, as well as the expanding global service network. Keeping in touch with market trends, Hikvision has made stupendous
achievements in both domestic and overseas markets in the last year,” says Cynthia He, Vice President at Hikvision, “In 2014, Hikvision invested 8% of its annual revenue into research and development. Looking to the future, we will continue to devote our R&D efforts into delivering innovative products and vertical solutions that fulfill the everchanging needs of the security industry, in the belief that we are ideally placed to provide a complete video surveillance solution to the market globally.”
GSA 2015 is Asia’s First Security Conference on ISIS Event aims to address various dimensions of the ISIS threat in the region including biological threats
K
ey military and security delegates from around the world will gather to attend Asia’s first ISIS-focused homeland security and counter-terrorism Conference and Exhibition, Global Security Asia (GSA) 2015, held at the Suntec Singapore Convention and Exhibition Centre from 3 to 5 March 2015. “ISIS presents a credible and widereaching threat to global security, not just in the Middle East. ISIS ability to radicalise and militarise individuals anywhere in the world is growing. We want to assess the impact of the ISIS threat in Asia, including from chemical, biological and radiological attacks.” Said Conference Chair Dr. Rohan Gunaratna, Professor of Security Studies at the
S. Rajaratnam School of International Studies & Head of the International Centre for Political Violence and Terrorism Research at Nanyang Technological University in Singapore. Now in its 10th year, GSA 2015, now organised in partnership with MILIPOL, is behind Asia’s first ISISthemed 2-day conference ‘The New Asian Threat Landscape.’ The conference portion of the event will span 4 and 5 March, and will delineate the current and emerging Asian threat from ISIS and discuss state and societal responses. The rise of ISIS and the declaration of an Islamic State have presented a new global and Asian threat landscape, and the ongoing spread of ISIS ideolMarch 2015
64
ogy in Asia through well-planned use of technology and communications channels, including the Internet, means that the operational threat to the region has changed dramatically. The threat to Asia is no longer primarily from the resurgence of al Qaeda and its host Taliban in the Pakistan-Afghanistan theatre but the growing appeal of ISIS. Conference Chair Dr. Rohan Gunaratna will open the conference with a keynote address and will lead into various focused series of talks over the two days such as Chemical, Biological, Radiological and Nuclear (CBRN) threats by Dr Chua Teck Mean, Group CEO of Gaia One International Pte Ltd, Lt. Gen. (Dr) J R Bhardwaj, former Director General
www.indiasafe.com
CMYK
CMYK
International Updates
of the Armed Forces Medical Services of India and Dr David Trudil, A Smallpox and Anthrax specialist and President of NHDetect (USA). There will also be sessions on ISIS’ online and social media activities by Remy Mahzam, Associate Research Fellow, International Centre for Political Violence and Terrorism Research and Nur Azlin Mohamed Yasin, Counter Terrorism Analyst at RSIS. Other speakers also include Major General Dr Tito Karnavian, Former Commander, Counter Terrorism Force, Indonesia and leading security and counter-terrorism practitioners and academics from the US, Pakistan, India, Bangladesh, Sri Lanka, Indonesia, Malaysia, Thailand and Singapore will map the evolving threat and share governmental and community strategies to contain and mitigate the ever evolving threats.
Topics of interest include: ● The threat of bio terrorism. ● A strategic ideological response to Islamic State. ● Intelligence collection before operation, the warning signs of terrorist attacks. ● ISIS social media. ● The terrorist-criminal nexus in cyberspace. “This year’s ISIS-themed conference is a regional first and is of crucial importance to all local and regional government and private security forces,” said Andrew Marriott, Managing Director of GSA Exhibitions Pte Ltd, the exhibition and conference organiser, “The New Asian Threat Landscape Conference allows us to examine the emerging ISIS threats and their influence in the region. This is undoubtedly a unique opportunity for all
delegates to update themselves on the progress and threat from Islamic State which is currently destabilising huge swathes of the world and needs to be effectively contained in the local and regional context.” In tandem with the conference is a public three-day exhibition opening on 3 March that presents opportunities for governments and security professionals to meet and interact with international manufacturers and resellers of security equipment, services and technology to discuss the latest solutions available to protect their borders, infrastructure and their populations against acts of terrorism and organised crime. Over 170 international security contractors with cutting edge equipment and services will be on display and available for demonstration alongside the free-to-attend technology workshops for all visitors.
Milestone Certifies BCDVideo Nova Series on XProtect Certified video surveillance storage system among ‘best ever tested’
M
ilestone Systems has now tested and reported performance component certification of BCDVideo’s Nova Server and Storage Series. IT infrastructure, server, storage and client platforms are integral parts of networked video management deployments, so any miscalculations of the server or storage requirements impact the success of a system's operation, causing system outages and downtime. To address this, Milestone worked closely with BCDVideo to ensure that their systems can be optimized for the Milestone XProtect® software portfolio, helping implementa-
tions to be specified, built and delivered as optimal systems for each customer's technical environment. The Milestone Solution Certification gives verification of the components as interoperable and optimized for performance with XProtect VMS. The certification process delivers documentation of a solution's proven maturity and quality as assurance of system integrity and differentiation from non-certified components. “Integrators can build solutions with confidence when referencing the tested configuration data from the Milestone March 2015
65
certification process. The documented proof describes how these video solutions operate within the parameters of the maximum performance tests,” says Christian Bohn, VP Strategic Alliances at Milestone Systems, “We have been doing integration certifications for several years, and these additions continue to build trust in Milestone solutions for both partners and customers.” Each certification project has three phases, starting with two scenarios of a benchmark test and a maximum performance test. Statistics from the Milestone XProtect Recording Servers are gath-
www.indiasafe.com
CMYK
CMYK
International Updates
ered to judge the performance as a platform for video recording. The analyzed data and findings are presented in a complete report with details on the configuration of the test system and a summary published on the Milestone website. These tests identify that the system integrations meet minimum expected performance thresholds based on known benchmarks for best practice. The certification also measures the maximum number of cameras, at a given frame rate, resolution and codec that can be supported by the server and storage system. A summary report from the Solution Certification includes optimal configuration for a surveillance system using the Milestone XProtect VMS with BCDVideo. This contains the solution architecture, the performance results,
use-case information, and detailed system configurations for the components of the combined solution. “The BCDVideo storage solution to date is among the best VRP/ NRP that Milestone has tested with the given parameters. With the video profile used for the tests, the system should easily support 150 cameras (storage limited). The system outperformed the given video simulator and testing had to stop with the given parameters: the maximum number of cameras achieved on the system was set at 150 1MP cameras at 10 frames per second and 60% video compression. It is noteworthy that this was achieved with only 32% of the system resource utilization on the BCDVideo server,” says Jeff Burgess, President/ CEO of BCDVideo. Both system integrators and end
customers of this best-practice, Milestone-certified system can rest assured that their video will record and archive successfully. BCDVideo’s enterprisegrade VRP solution has been designed for maximum performance on a Milestone XProtect platform with long-term value and performance in mind. Founded in 1999 and headquartered in Chicago, USA, BCDVideo is a global manufacturer of purpose-built IP video recorders. BCDVideo is HP’s global OEM partner for IP video security and excels in providing IP security storage and intelligent network solutions to the security integrator community. With a global footprint of successful Milestone installations, the company prides itself on providing first-rate customer service, delivery, and support.
Fire Fighting Enterprises Becomes FFE Rebrand Announced at Intersec 2015
O
n January 18, 2015 Fire Fighting Enterprises officially became FFE.
Known the world over as a specialist in smoke and flame detection through its
March 2015
66
Fireray and Talentum product brands, FFE used Intersec Dubai as the platform to announce its rebrand. “We are delighted to be making this key announcement at Intersec. Changing our name and updating our image marks an important milestone for our company and our customers,” commented FFE’s Managing Director Mark Osborne, “We’re putting more focus on our two world-renowned product brands – the Fireray optical beam smoke detector and the Talentum flame detector. We welcomed many visitors to our booth at Intersec to discuss how we can work with them to deliver world-class fire safety.” FFE has always been driven by innovation, from the introduction of the
www.indiasafe.com
CMYK
CMYK
International Updates
first Fireray optical beam smoke detector over thirty years ago to the integration of the Talentum flame detector range in 2013. These products are relied on to protect some of the most iconic buildings in the world, including the White House, Buckingham Palace, Dubai Airport and theAl-Aqsa mosque in Jerusalem, as well as countless industrial installations worldwide. Talentum flame detectors have also been selected to protect the Bloodhound supersonic car, set to break the world land-speed record later this year. Over 8% of all FFE’s revenues are
re-invested into R&D, developing the technologies that are at the core of Fireray and Talentum and helping to bring about new technological breakthroughs. Through this ongoing research, FFE is not only providing quality today, but developing world-leading technologies for tomorrow. “Underpinning everything we do is our most valuable asset, our people,” says Sales and Marketing Director Tracy Kirk, “We couldn’t do what we do without our R&D team of highly qualified engineers, a dynamic and truly customer-focussed sales and marketing
team, and a UK-based manufacturing facility covering production, testing and calibration. “Added to that is our purpose-built, on-site training space, where we offer training courses not only on the products we supply, but also on the fundamental principles of smoke and flame detection.” FFE has offices in the UK, USA, Dubai, India and China, and a global network of distributors and channel partners. Continuous growth now sees the company’s products protecting lives in over 90 countries round the world – and this growth is set to continue.
Nedap Identification Systems Announces first Certified Partners N
edap, the leading specialist in vehicle identification and detection technology for security, parking and traffic, announces that a first group of partners is now officially certified according to the guidelines related to the Certified Partner Program that was introduced at end of 2014.
Dedicated program for three sectors
N
edap Identification Systems developed a dedicated partner program for the Long-Range Identification, Wireless Vehicle Detection and Smart City Access product lines. The Certified Partner Program allows partners to get recognized as a committed Nedap partner. Moreover, they obtain access to benefits related to this program, such as additional sales tools, marketing resources, combined marketing opportunities and
additional access to technical information and trainings related to products. The three certification programs are: ● Nedap Certified Partner for LongRange Identification: Relates to Nedap systems that offer fast, secure and convenient identification of vehicles and people in and around buildings and sites. ● Nedap Certified Partner for Wireless Vehicle Detection: Relates to Nedap wireless sensors that gather real-time parking status information from outdoor located parking spaces. ● Nedap Certified Partner for Smart City Access: Relates to vehicle access control systems to restrict traffic in designated areas in city centers, such as shopping areas and historical centers. March 2015
67
Recognized as committed partners
A
Nedap Certified Partner is a qualified representative with adequate knowledge and skills related to the planning, installation and implementation of Nedap products. They show commitment to the Nedap brand and provide high-quality technical support to customers in one of the three sectors. The first group of Nedap Certified Part-
www.indiasafe.com
CMYK
CMYK
International Updates
ners include: ● Long-Range Identification: AAM Systems (Russia), Identity Warehouse (South Africa), Nortech Control (United Kingdom) and IDelcon (Spain). ● Wireless Vehicle Detection: AAM Systems (Russia), AGK (Ireland), Flow (Belgium), Vialis (Netherlands), IDelcon (Spain), Infracontrol (Sweden), Traffic Technologie Système (France) and IPSens (United States). ● Smart City Access: ST&D and
BAM Infratechniek (Netherlands).
Mobiliteit
Improved competitive position
N
edap expects to announce more certified partners soon. “We are extremely proud to announce this first group of partners that have chosen to become certified and recognized as a valued partner. Most of these partners have worked with us for many years. We are very happy that we can finally offer them the opportunity to get rec-
ognized for their loyalty, commitment and hard work to promote and successfully install our products. Furthermore, this also creates good opportunities for the end users of our products. It will now be easier to identify those vendors that have a proven track-record in building successful installations with our products. In the upcoming months more committed business partners are expected to get certified worldwide,” explains Maarten Mijwaart, General Manager of Nedap Identification Systems.
Introduces
First Multilingual iOS Demonstration Apps for LYNX Touch Systems Demo apps seamlessly translate between English, Spanish and French
H
oneywell has released two firstof-their-kind multilingual demo apps for its LYNX Touch 5200 and 7000 home security systems. Dealers and integrators can now easily transition between English, Spanish and French languages within the same app, depending on a customer’s language preference, to demonstrate system capabilities. The apps interactively showcase the features of Honeywell’s latest LYNX Touch security systems by simulating the experience on an iPad®
or iPhone®. Dealers can demonstrate functions such as how to arm and disarm the system, view video, open and close garage doors, modify thermostat temperatures, and control lights and door locks. “Easily transitioning between three languages using one app lets dealers more effectively demonstrate end-to-end security and lifestyle systems to a morediverse group of consumers in North America,” said Alan Stoddard, Senior Marketing Director, Honeywell Secu-
rity Products Americas, “Apps like these will help dealers demonstrate to customers the power of the ‘Connected Home’ and how it will enhance their everyday lives, as well as their security.” In addition to the multi-language product demonstration capabilities, consumer marketing materials have been translated for immediate, on-the-spot access via the apps. The apps are available for free download on iTunes and are compatible with the latest Apple® iOS software.
Canon to Acquire Axis Communications C
anon announced a public offer to acquire Axis Communications. Axis is one of the world’s largest suppli-
ers of video surveillance equipment. This is a massive development in the video surveillance equipment market. March 2015
68
Until last year, Canon was a small player in this market. However, back in August 2013, it revealed big ambitions when its
www.indiasafe.com
CMYK
CMYK
International Updates
CEO, Fujio Mitari, spoke about security cameras becoming an “important pillar” for the company and the market having “limitless possibilities for growth.” Then in June 2014, Canon acquired the world’s largest supplier of video management software, Milestone Systems. Now, Canon is purchasing the world’s largest supplier of network cameras. All of this shows just how seriously Canon is about expanding its interests in the video surveillance equipment market. IHS estimates that Axis Communi-
cations was the third largest supplier of video surveillance equipment in 2014 with over 5% of a global market worth around $15 billion. Despite this, the company has faced intense competition, particularly from Chinese rivals in recent years. The largest of these, Hikvision and Dahua, have both been gaining market share faster than Axis. At the same time, the average selling price of a network camera has more than halved between 2010 and 2014. Canon’s acquisition of Axis is the
latest in a number of major changes to the structure of the supply chain for video surveillance equipment. It comes just two months after Samsung Group sold Samsung Techwin. Today, the supply chain remains highly fragmented. The top fifteen suppliers account for less than 50% of revenues and there are thousands of small suppliers. Consolidation has been anticipated for some time and Canon’s purchase of Axis could be just the start of a series of industry acquisitions in 2015.
Raytec Illuminators Provide Lpr for Colombian Police Cars R
aytec illuminators have been put to an exciting use by the police force of Bogota, Colombia. With a growing need for accurate, reliable and mobile licence plate capture to combat speeding in areas with no fixed monitoring, Bogota police cars were outfitted with licence plate cameras from IndigoVision, and VARIO infra-red illuminators from Raytec. A mobile and highly flexible solution was essential. But achieving proper illumination was also a hurdle, as high quality lighting is mandatory to allow licence plate cameras to perform at their maximum proficiency 24 hours a day. The hardware, designed to mount on the top of patrol cars, was designed by Bogota based integrator EGC who made the decision to use Raytec illuminators. After testing was carried out to compare different manufacturers, the build quality and overall performance superiority of the Raytec illuminators established
the Raytec VARIO i4 as the illuminator of choice. “Night time testing was crucial for the customer. The performance of the VARIO i4 was excellent and it delivered clear illumination to allow us to effectively capture licence plates in darkness,” Jefferson Valencia of EGC explained, “After trialing models from other manufacturers, we quickly assessed that Raytec was the only choice.” The design allowed for the lights and LPR cameras to be integrated on top of the vehicle, allowing the cameras to get a perfect, illuminated shot of any plate. Raytec’s VARIO i4 units are equipped with holographic lensing with hot-spot March 2015
69
reduction technology (HRT) providing a highly targeted and even light distribution for superior image quality and greater distances. All VARIO illuminators can also be powered from any 12-24V battery, making them perfect for this mobile application. In addition, VARIO’s interchangeable lens system provided the flexibility needed to adjust the output angle of illumination whenever required to suit any
www.indiasafe.com
CMYK
CMYK
International Updates
scene, by simply slotting a different lens into the unit – not possible with traditional fixed angle illuminators. Having developed many bespoke CCTV solutions for the Colombian gov-
ernment, EGC recognized that the police force were facing the challenge of needing high quality and reliable mobile LPR illumination almost daily and have delivered a solution that the end user is
delighted with. While the project started in the city of Bogota, the implementation of this Raytec lighting and LPR integration has been planned across Colombia.
Software House Gains FIPS 140-2 Validation for iSTAR Door Controllers The certification of iSTAR Edge and iSTAR Ultra broadens the range of government-compliant products
S
oftware House, part of the Security Products business unit of Tyco announces the certification of its iSTAR Edge and iSTAR Ultra door controllers under the government’s Federal Information Processing Standards Publications (FIPS) 140-2 program, the most stringent standard for cryptographic
products. With the certification of iSTAR Edge and iSTAR Ultra, Software House becomes the first company to offer a full lineup of FIPS 140-2 approved controllers covering a wide range of access control scenarios. FIPS 140-2 is an information technology security validation program that certifies products and systems for use in government-run and other highly regulated industries, such as finance and healthcare, where sensitive information is collected, stored, and shared. The FIPS 140-2 requirements are among the government’s most stringent requirements for product design, documentation, and secure operations. “The certification of these physical access controllers addresses two of our government
and enterprise customers’ most critical needs: compliance and choice,” said Rick Focke, Senior Product Manager, Tyco Security Products, “Receiving FIPS 140-2 validation ensures the products’ conformity for use with sensitive information, while offering multiple products with this key certification makes Software House’s iSTAR line the most versatile choice on the market today.” iSTAR Edge is an IP-based edge device serving smaller one- to fourdoor PoE network applications, while the powerful and scalable iSTAR Ultra, which is built on the Linux platform, supports up to 32 readers. Software House also offers iSTAR eX, an Ethernet-ready four- to eight-door controller which has already been FIPS 140-2 validated.
at ISC West 2015 A
t ISC West 2015, Genetec plans to show upcoming new features of its Security Center, an IP system that merges IP video management, access control and automatic number plate recognition (ANPR). Besides a preview of Security Center version 5.3, Genetec will show
the unified communications capabilities of its SIP-based intercom management module, Sipelia, and its new Cloud Archives Service. New features in the next version of Security Center will include a way to help users view ultra-HD and megMarch 2015
70
apixel resolutions via GPU-accelerated video decoding capabilities. Using offthe-shelf video graphics cards, Security Center will be able to display more high-resolution streams and enhance the fluidity of video playback, while minimising workstations, the company says.
www.indiasafe.com
CMYK
CMYK
International Updates
New incident recording capabilities in Security Center will enable export and sharing of archived incidents. It will allow operators to storyboard complete incidents after the sequences in which they occurred by dragging cameras of interest within Security Center monitoring tiles, reducing time spent compiling video exports. And the Archive Transfer tool will enable users to transfer video from one Archiver to another, a redesigned Security Center web client, and
enhancements to the Genetec Video Player and export workflow. At ISC West, attendees will also be able to see Genetec’s new Cloud Archives Service for Security Center, announced in late 2014, which allows organizations to scale the storage capacity of their surveillance system and eliminate the need to invest in additional servers. As a hybrid cloud service it’s for customers who need to
extend their video retention period or do off-site recording.
HP Study Finds Alarming Vulnerabilities with Internet of Things (IoT) Home Security Systems HP Fortify On Demand finds that 100 percent of top security systems studied display significant security deficiencies
H
P recently released results of a security testing study revealing that owners of Internet-connected home security systems may not be the only ones monitoring their homes. The study found that 100 percent of the studied devices used in home security contain significant vulnerabilities, including password security, encryption and authentication issues. Home security systems, such as video cameras and motion detectors, have gained popularity as they have joined the booming Internet of Things (IoT) market and have grown in convenience. Gartner, Inc. forecasts that 4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020. The new HP study reveals how ill-equipped the market is from a security standpoint for the mag-
nitude of growth expected around IoT. Manufacturers are quickly bringing to market connected security systems that deliver remote monitoring capabilities. The network connectivity and access necessary for remote monitoring presents new security concerns that did not exist for the previous generation of systems that have no internet connectivity. The HP study questions whether connected security devices actually make our homes safer or put them at more risk by providing easier electronic access via insecure IoT products. HP leveraged HP Fortify on Demand to assess 10 home security IoT devices along with their cloud and mobile application components, uncovering that none of the systems required the use of a strong password and 100 percent of the systems March 2015
71
failed to offer two-factor authentication. The most common and easily addressable security issues reported include: ● Insufficient authorization: All systems that included their cloud-based web interfaces and mobile interfaces failed to require passwords of sufficient complexity and length with most only requiring a six character alphanumeric password. All systems also lacked the ability to lock out accounts after a certain number of failed attempts. ● Insecure interfaces: All cloudbased web interfaces tested exhibited security concerns enabling a potential attacker to gain account access through account harvesting which uses three application flaws; account
www.indiasafe.com
CMYK
CMYK
International Updates
enumeration, weak password policy and lack of account lockout. Similarly five of the ten systems tested exhibited account harvesting concerns with their mobile application interface exposing consumers to similar risks. ● Privacy concerns: All systems collected some form of personal information such as name, address, date of birth, phone number and even credit card numbers. Exposure of this personal information is of concern given the account harvesting issues across all systems. It is also worth noting that the use of video is a key feature of many home security systems with viewing available via mobile applications and cloud-based web interfaces. The privacy of video images from inside the home becomes an added concern. ● Lack of transport encryption: While all systems implemented transport encryption such as SSL/ TLS, many of the cloud connections remain vulnerable to attacks (e.g., POODLE attack). The importance of properly configured transport
encryption is especially important since security is a primary function of these systems. “As we continue to embrace the convenience and availability of connected devices, we must understand how vulnerable they could make our homes and families,” said Jason Schmitt, Vice President and General Manager, Fortify, Enterprise Security Products, HP, “With ten of the top security systems lacking fundamental security features, consumers must be diligent about adopting simple and practical security measures when they’re available, and device manufacturers must take ownership in building security into their products to avoid exposing their customers unknowingly to serious threats.” As IoT product manufacturers work to incorporate much needed security measures, consumers are urged to consider security when choosing a monitoring system for their home. Implementing secure home networks before adding insecure IoT devices, instituting complex passwords, account lockouts and two-factor authentication are only a few measures consumers can take to make
their IoT experience more secure. Legislators are also getting involved, with the U.S. Federal Trade Commission releasing a recent report analyzing the balance between security and privacy concerns with development of the IoT devices.
Methodology
C
onducted by HP Fortify and leveraging HP Fortify on Demand, HP’s Home Security Systems study tested 10 of the most commonly used home security IoT devices for vulnerabilities using standard security testing techniques that combined manual testing along with the use of automated tools. Devices and their components were assessed based on the OWASP Internet of Things Top 10 and the specific vulnerabilities associated with each top 10 category. The resulting data and percentages in this report were drawn from the 10 IoT systems tested. Given the popularity and similarity among the 10 devices, HP Fortify believes the results provide a good indicator of where the market currently stands as it relates to security and the Internet of Things.
Grundig Exhibits at Intersec Dubai G
rundig Security showcased its new IP camera and recording solutions at the INTERSEC exhibition in Dubai in January 2015. Specialist cameras, designed by Grundig Engineering, included a 6MP Fisheye with IR
and a 4K (8MP) box camera. Technological developments used within the wider IP camera range included Sony Exmor® CCD sensors with Xarina™ digital signal processing (DSP) and P-Iris image enhancement. March 2015
72
Facial detection and analytics are also built in to several models. The exhibition booth itself featured retail and city surveillance zones to demonstrate the new camera range and technologies. “P-Iris increases the camera’s image contrast, clarity, resolution and depth of field,” explained Andreas Franusic, Product Manager at Grundig, “Xarina™ DSP technology combines image signal
www.indiasafe.com
CMYK
CMYK
International Updates
processing (ISP) with video stream encoding to produce an exceptional wide dynamic range (WDR). This, and a 60fps setting, makes the Grundig cameras extremely sensitive in low light and reduces motion blur. The IP cameras also remain in colour mode for longer, with improved visibility, before IR illumination is activated.” On a practical note, Grundig also
showed its new water-repellent, RainWash coating for the optical surfaces of domes. Rain and dirt simply run off, keeping surfaces clean and preventing condensation, even in damp environments. The new 4K2K, 8MP box camera delivers outstanding detail at an unprecedented resolution. The indoor, 6MP Fisheye camera, designed for indoor
use, comes with de-warping functionality built in. It simultaneously provides a 4MP 360° stream and secondary, 2MP, de-warped 2 or 4 way stream. Motorized auto-focus and zoom (AFZ) is featured on some models. IR LED illumination, quad video streams, SD/ SDHC card slots, PoE and ONVIF Profile S integration are standard across the range.
Innovative Security Solutions to Headline INTERPOL World Congress T
echnology-driven security solutions developed by leading industry players will be presented at the INTERPOL World Congress, a knowledge sharing forum anchoring the inaugural INTERPOL World in 2015. With an emphasis on public-private partnerships, the Congress will feature forums on each of the four areas of focus – Cybersecurity, Safe cities, Border management and Supply chain security – chaired by the following experts: ● Michael O’Connell, INTERPOL Director of Operational Police Support, for Border Management; ● Dr Madan Mohan Oberoi, Director, Cyber Innovation and Outreach, INTERPOL Global Complex for Innovation, for Cyber Security; ● Anselm Lopez, Director, Capability Development and International Partnerships Directorate, International Cooperation and Partnerships Division, Ministry of Home Affairs, Singapore, for Safe Cities; ● Michael Ellis, Assistant Direc-
tor, Trafficking in Illicit Goods and Counterfeiting Sub-Directorate, INTERPOL, for Supply Chain Security; ● Kingsley Ejiofor, Deputy Director and Head of Legal Division, National Agency for Food and Drugs Administration and Control (NAFDAC), for Supply Chain Security. The INTERPOL World Congress is timely and critical, given the urgent need for countries to address pressing global security challenges. Solutions for countering these challenges will be presented by INTERPOL World’s strategic partners: ● Cybersecurity: Microsoft, RSA, The Security Division of EMC and Symantec; ● Safe cities: Motorola, Thales Solutions Asia Pte Ltd; ● Border management: 3M Identity Management, Entrust Datacard and Securiport; ● Supply chain security: Digital Coding and Tracking Association and March 2015
73
SICPA. The Congress will be held alongside the INTERPOL World Exhibition, a biennial international security trade event in Singapore (14-16 April 2015).
Cybersecurity
W
ith more than 60,000 malware software created daily to infiltrate security systems, it is essential for global efforts to enhance cybersecurity through robust partnerships between law enforcement and private sector Internet security companies, as well as coordinated regulations across countries. “The world is swiftly moving into cyberspace and more people are living their lives virtually, from social interactions to personal and business transactions. There is an imperative need for the IT and security industry to invest in the development of essential technology, tools and training to generate and share actionable information and intelligence on cybersecurity trends and threats,” said Keshav Dhakad, Regional Director,
www.indiasafe.com
CMYK
CMYK
International Updates
Asia, IPR & Digital Crimes Unit (DCU), Legal and Corporate Affairs, Microsoft.
Safe cities
A
nation’s well-being and prosperity hinge on the safety, functionality and resilience of its critical national assets, which include organizational and physical structures as well as facilities that are vital to society and its economy. Therefore, discussions at the INTERPOL World Congress will focus on the development of command and control system integration, prediction, modelling and simulation, which will influence the way information is shared between multiple sources, and ensure reliable access to real-time information that provides actionable insights to identify potential security threats or trends. “Thales has been working for more than a decade on advanced adaptive systems using biomimetic simulation for training, risk management and decision making. We aim now to apply this technology to situational forecast and real-time risk assessment during large events,” said Jean-Marie Decaux, Safe and Smart Cities Development Director at Thales Solutions Asia, “Smart cities and critical infrastructure are generally equipped with numerous sensors. We
can use the data captured by these sensors to simulate the real environment, enabling us to better plan the event and enhancing our overall situational awareness. This provides a powerful ‘What If’ tool to create possible scenarios and to prepare for incidents when they occur.”
Border management
O
ur increasingly globalized world has made it is easier for people and goods to cross international borders. This has led border authorities to search for new automated data-sharing systems and border screening solutions that address technological and logistical challenges while enhancing and integrating border security procedures. “In the current security landscape, there is a need for law enforcement agencies to have access to relevant, informative and timely information, while at the same time guaranteeing that basic principles of privacy are maintained,” said Michael O’Connell, INTERPOL Director of Operational Police Support, “The aim of the border management forum will therefore be to address key security challenges and the importance of exchanging security data while ensuring high standards of data protection.”
Supply chain security
O
ne of four key domains to be discussed at the INTERPOL World Congress, supply chain security addresses the challenges of the trade supply that is highly susceptible to threats such as terrorism, piracy, theft and illicit trade. The forum will discuss product verification solutions that will allow the public, private industry and frontline law enforcement officials to access extensive product security information in a quick and easy manner, in order to make an informed decision about a product’s legitimacy. “The key to combating illicit trade and ensuring the security of supply chains lies in innovative security solutions and enhanced collaborative action between governments, the law enforcement community, the private sector and consumers,” said Pierre Viaud, Senior Director Public Affairs & Government Relations, SICPA Security Solutions SA, “SICPA invests significantly in R&D and is committed to working in close partnership with all stakeholders so as to provide the best level of protection for governments, companies and the millions of people who depend on the integrity and value of their currency, personal identity, products and brands.”
Do Door Phone Companies Need Indoor Units? I
n recent years there has been a growing interest and adoption of the ‘smart home’ concept in North America. This has been led by service providers using physical security to drive smart home applications. The issue for door
phone suppliers is that all of these services are increasingly being integrated and controlled by either a central intelligent alarm control panel, or online via a smart mobile device such as a smartphone or tablet. March 2015
74
So what does this mean for the door phone industry? Even within the door phone industry companies are starting to offer solutions that do not require indoor units. Panasonic offers a wireless monitor that
www.indiasafe.com
CMYK
CMYK
International Updates
is not fixed to a wall, and companies, such as SkyBell, offer Wi-Fi based door phones. IHS expects that there is still a place for indoor units. Indoor units accounted for 50% of the $2.3 billion world market in 2014, and the market is forecast to grow in line with other component items and villa kits through to 2019. The reason that the smart home market is not expected to significantly impact the use of indoor units in the near future is because of geographic differences:
● Whilst there are high-end smart home offerings around the world, the drive to bring the smart home to the mass market is taking place in North America, which at present is a relatively small market for door phones when compared to Europe and Asia. ● The European and Asian door phone markets are highly focused on the residential market. Whilst the North American market is heavily focused on commercial end-users. ● The type of residential user is very
different as well. In Asia door phones are mainly used in high rise flats, where smart home applications are much harder to implement, due to building services normally being managed by the building owners, not the residents. In North America however, proportionally there are many more villa kits and door phones for smaller occupancy buildings sold. These types of products are much easier to integrate with smart home offerings.
International Updates
Navtech Radar Announces NavCover+ New customer service initiative offers superior warranty to all customers
N
avtech Radar has announced the launch of a brand new customer service initiative named NavCover+, as part of the company’s drive towards offering a superior warranty service to all customers. With the new initiative, Navtech Radar aims to provide customers with the option of a prolonged service agreement with differing levels of support and response times. NavCover+ covers a total of eight different services according the customer’s chosen warranty level; hardware repair, contract term, repair turnaround, remote fault diagnosis, Witness software upgrades and remote Witness software support, free shipping, 3rd year servicing, as well as hot standby, for repair and servicing. Each of the eight service types are specifically designed with product lifetime extension offering specialist expertise at the forefront of Navtech’s customer service priorities. Through their implementation, Navtech is able to perform scheduled restoration and main-
tenance on any Navtech solution within any geographic region, according to the service level agreed. NavCover+ is available with four
different support plan options. These include the standard warranty, as well as Bronze, Silver, and Gold service agreements. The standard warranty covers three out of the eight available service options. With a one year contract term, hardware repair, and a twenty working day turnaround time, this warranty level is recommended for Navtech’s accredited partners needing no form of support in the first year after product installation. The Bronze agreement provides additional Witness
“We are delighted to announce the NavCover+ customer support scheme. It is a central part of Navtech Radar’s long term plan for the enhancement of our customer service across all of our sophisticated technology solutions. We are confident that the NavCover+ initiative will provide our customers and partners with a market leading product support service within our industry. The new structure of our customer service initiative will enable us to prepare for the needs of our clients in advance of any potential issues occurring, which in turn will allow us to streamline our operations, reduce repair time and improve the service level across all product solutions.” – Greg Thomlinson Customer Service Manager at Navtech Radar March 2015
75
www.indiasafe.com
CMYK
CMYK
International Updates
software updates, support and fault diagnosis on fair use terms, a longer contract term lasting two to six years, and a faster repair turnaround time, at fifteen working days. The Silver agreement offers
further improved support, including free shipping, a three or six year contract, including free third year servicing, and a further improved repair turnaround time of ten working days. The Gold support
plan offers the premium customer support package, with unlimited Witness software support and fault diagnosis as well as an ‘advance replacement’ to replace a failed unit during the repair.
Janus Now Completed Drivers for Crestron J
anus drivers provide full, two-way integration with Crestron for all compatible network cameras, as well as one-way control of DVR/ NVRs. Offering a full complement of pan, tilt and zoom controls, as well as monitoring of MJPEG streams on the Crestron panel, this driver provides all the CCTV control functionality the client will need. For the security conscious, motion and tamper variables can be programmed to alert the user, initiate recording, and/ or trigger any appropriate action within the
Crestron system. The ability to save and recall preset camera positions at high speed, and with accuracy is an added bonus. The DVR/ NVR driver provides a complete set of one-way commands, providing the user with the ability to easily navigate through the on-screen menus and review recorded camera footage.
How does it work?
T
he Crestron processor communicates directly with cameras and NVR/ DVRs connected to the network.
The following features are supported: ● Full PTZ control of network cameras. ● Save and recall preset camera positions. ● Alarm/ motion monitoring. ● One-way IP control of NVR/ DVR. The driver comes packaged with a demonstration panel design, enabling easy integration and testing with your existing system. Crestron have now added and certified the drivers on their website.
Morpho Signs Major Multi-biometric e-Border Contract with the United Arab Emirates Ministry of Interior
M
orpho (Safran), through eIMASS, has been awarded the prestigious e-Border management project by the Ministry of Interior of the United Arab Emirates. The e-Border project is setting the standards for the future of border control in the world, combining the very latest in biometric technologies, automation and system integration. The contract covers the implementation of a fully integrated multi-biometric border control system, including the delivery of 96 e-Gates and 94 e-Counters, in five major airports across the UAE. Abu Dhabi airport will be the first, in
spring 2015. The system features Morpho’s Finger on-the-Fly technology, which is a very rapid, touchless way of capturing fingerprints, via a simple wave of the hand, in only one second. Morpho’s Finger on-the-Fly is a world first, offering major advances in both speed and accuracy, while mitigating hygiene concerns. In a similar way to fingerprint recognition, the e-Border project is spearheading the use of the iris and face recognition for border control, featuring Morpho Iris-at-a-Distance (IAD) camMarch 2015
76
eras, with the world’s fastest operational capture time (less than 1 second for simultaneous capture of iris and face). In terms of automation, the versatile MorphoWay e-Gates provide the highest level of security, while facilitating the traveler experience in airport border control. Featuring a new and modern design, they can be used by travelers at both entry to and exit from the UAE. System integration is also a key feature of the e-Border project. Expanding upon the e-Border pilot implemented in 2012 in Abu Dhabi, the new fully inte-
www.indiasafe.com
CMYK
CMYK
International Updates
grated border control system seamlessly interfaces with the existing Ministry of Interior systems, such as the Visa Enrollment Centers for the Ministry of Foreign Affairs. Philippe Petitcolin, Chairman and CEO of Morpho said, “This contract solidifies our long-standing working relationship with the police and border authorities of the UAE. We believe that our partnership is a truly winning com-
bination, and one that will make a positive contribution to the future of border control in the UAE.” Major General Dr. Ahmed Naser Al Raisi, Director General Central Operations of Abu Dhabi Police added, “Morpho has the proven technology and local expertise which enable them to fully understand our needs and expectations for the e-Border project. We have every confidence in their ability to successful-
ly support us in one of most important of our nation-wide projects.” In addition to the Ministry of Interior, Morpho already supplies security systems to numerous government agencies and organizations within the UAE. These customers include the Abu Dhabi Police, Emirates Identity Authority, the Ministry of Foreign Affairs, Abu Dhabi Airports Company and the Dubai Civil Aviation Authority.
Introduces
Genuine HID Technology™ Biometric cards for iCLASS® and ProxCard® readers CLASS® and ProxCard users can authenticate themselves directly on the biometric card without having to add any biometric readers to their existing security system. Zwipe, a global leader in biometric authentication technology has announced that HID Global's iCLASS® and 125kHz ProxCard® users can now easily integrate the Zwipe Access biometric card, eliminating the need to add biometric readers to an existing HID Global® iClass® or Prox-based system. “As the largest smart and proximity card provider in the world, HID Global has thousands of users who would like to upgrade to biometric authorization, but may not have the budget or the resources to invest in biometric readers,” added Robert Fee, Director of Sales, Americas, Zwipe, “The Zwipe biometric card provides an easy, affordable option for security professionals to extend the use of their present card systems by adding biometrics for multi-factor, card-based authentication.” By providing authorized users with Zwipe Access biometric cards that interoperate with their existing iCLASS and 125 kHz ProxCard readers, these organi-
i
zations can now benefit from the leading edge biometric authorization technology by simply incorporating the card into their existing systems in the same way they already incorporate proximity or HID Global smart cards. The Zwipe solution enables customers to extend the life of their existing infrastructure while simultaneously increasing its security. With Zwipe’s patented on-card authentication technology, only the authorized cardholder can activate card communication with the reader. This means no more lending or borrowing of ID badges to access buildings, university labs, hospital pharmacies, data centers or networks. By upgrading the authentication from something they carry (a card) to something they are (a fingerprint), the issues associated with a lost or stolen credential are dramatically reduced. The problems associated with PINs and passwords are eliminated through the use of Zwipe’s biometric authentication technology. The on-card fingerprint scanner with 3D capacitive technology resides on the contactless smart card that utilizes an embedded HID Global March 2015
77
13.56MHz iCLASS or 125kHz Proximity transponder. The Zwipe biometric card is also compatible with MIFARE Classic™ and DESFIRE™ EV1. By incorporating Zwipe’s biometric solution to access control, organizations can increase the security of their systems, their employees and their assets by changing the authentication from something you carry to something you are without any modification to their existing infrastructure. Starting in 2009, Zwipe challenged the status quo of identity verification by replacing PINs and passwords with fingerprint authentication. After developing the leanest, fastest, and most power efficient fingerprint algorithm in the world, Zwipe continued disrupting the industry through its patented energy harvesting technology. No longer dependent on batteries, Zwipe fingerprint readers harvest the energy needed from already existing access, transport, border control and financial infrastructures. With its already strong portfolio of patent applications, Zwipe continues to develop and refine its innovative technology.
www.indiasafe.com
CMYK
CMYK
International Updates
IndigoVision Software House C•CURE 9000 Integration Module T
he IndigoVision Software House C•CURE 9000 Integration Module provides a bi-directional flow of events and alarms between the C•CURE 9000 system and IndigoVision’s complete suite of management software.
The integration allows any C•CURE 9000 event to trigger live video, move PTZ cameras, start recordings and send notification e-mails automatically in Control Center – helping to dramatically decrease operator response time. Also, alarms, live and recorded video from the IndigoVision system can be viewed within the C•CURE 9000 interface. C•CURE 9000 events supported in this module are: ● Event and alarm monitoring. ● Local/ global anti-passback within a cluster. ● Elevator control. ● Muster/ de-muster. ● Alternate and extended shunt by door. ● Escort management. ● Intrusion zones/ keypad commands.
● ● ● ●
Occupancy restrictions. C•CURE ID badging solution. Visitor management systems. Asset management and hands free access control. ● Cardholder access events. ● Advanced door monitoring. ● Carpool anti-passback. Examples of supported. C.CURE 9000 video functionality ● Pop up live video. ● Pop up playback video. ● Go to preset. ● Control PTZ cameras. ● Place camera icons on map. Key benefits ● Seamless video and alarms in a single software solution. ● Quicker operator response time. ● View and manage video and alarms from anywhere.
ASIS Middle East 2015 showcased what’s next in Security Management U
nder the patronage of His Excellency Lt. Gen. Dhahi Khalfan Tamim, Deputy Chairman of Police and General Security, the ASIS 6th Middle East Security Conference & Exhibition, was held from 15-17 February 2015 at the Intercontinental Dubai Festival City, Dubai, UAE. More than 580 attendees
from 45 countries gathered to take part in cutting-edge learning and networking opportunities along with product showcases, demonstrations, discussions and innovation sessions. The event was opened by Major General Khamis Mutar Al Muzainah, Commander in Chief of the Dubai PoMarch 2015
78
lice, followed by a keynote presentation by Mohammad Al Shammary, General Manager Industrial Security at Saudi Aramco. The next day featured a panel discussion on how the introduction of security industry regulations has contributed to increasing industry’s performance and the effect on the customer
www.indiasafe.com
CMYK
CMYK
International Updates
and end user experiences. The panel, moderated by conference chairman John Cowling of Conreol Risks consisted of His Excellency Dr. Khalid bin Saad Al-Ageel, General Secretary of the Higher Commission for Industrial Security in the Ministry of Interior of the Kingdom of Saudi Arabia, Colonel Abdul Rahim Bin Shafi, Director of the Anti-Organised Crime Department of the Dubai Police and Dr. Marc Siegel, Commissioner of the Global Standards Initiative of ASIS International. Professor Moray McLaren from the IE Business School in Madrid was the closing
keynote speaker discussing A New Approach to Negotiation. In the course of two packed days, attendees were given access to 33 educational sessions featuring speakers from Saudi Aramco, Zurich Insurance Company, Johnson & Johnson, Securitas, G4S, Sanofi and many more. In parallel, a CSO Roundtable Summit designed for Chief Security Officers (CSOs) was organised. 30 companies from around the globe showcased their products and services at their exhibition stands. Attendees also visited the Technology and Solutions
Theatre (TST) providing engaging presentations and experiences. A key component of the event consisted in networking with fellow attendees and security professional leaders in the many networking events organized throughout the conference. Attendees enjoyed a welcome drink on Sunday 15 February introducing all members, followed by the President’s Reception on Monday evening hosted by the president of ASIS International at Al Badia Golf Club. Lunches & networking breaks completed the networking experience all along the conference.
ASSA ABLOY acquires MSL in Switzerland A
SSA ABLOY has signed an agreement to acquire MSL Schloss und Beschlägefabrik AG, a leading Swiss supplier of innovative locks. “I am very pleased to welcome MSL into the ASSA ABLOY Group. This acquisition delivers on our strategy to strengthen our position in the mature markets through adding complementary market segments and products,” said Johan Molin, President and
CEO of ASSA ABLOY. “MSL stands for innovative lock technology,” said Tzachi Wiesenfeld, Executive Vice President of ASSA ABLOY and head of the EMEA division, “It has continually shown its success thanks to its high product quality and competent and dedicated employees. MSL will fill in a gap in our product portfolio in the important Swiss market, making ASSA ABLOY more
relevant to our Swiss distributors.” MSL was founded in 1892 and has 106 employees. Its head office and factory are located in Kleinlützel near Basel, Switzerland. Sales for 2015 are expected to reach CHF 20 M (approx. SEK 180 M) in the financial year ending 30 June 2015. The acquisition will be accretive to EPS from start. The transaction is expected to close during Q2 2015.
mobiDEOS Adds Powerful Cloud Capabilities to DVRs and IP Cameras Cloud Power™ helps DVR and IP camera manufacturers leverage the cloud
m
obiDEOS has unveiled a new service positioned to revolutionize
the category of digital video recording (DVR). With Cloud Power™ software, March 2015
79
DVR products without offsite backup can leverage the cloud, and provide redun-
www.indiasafe.com
CMYK
CMYK
International Updates
dant storage designed to eliminate single points of failure in security video recording applications. “We’re making cloud software more modular and flexible in application with Cloud Power,” said Sri L. Palasamudram, Chief Executive Officer (CEO), mobiDEOS, “The service is for DVR, NVR and IP camera manufacturers whose products don’t have cloud backup storage capabilities. The OEM application will allow them to easily enable and integrate this critical backup feature into their products,” he said. Cloud Power backs up and stores
video images generated by motion or intrusion detection or other events. It also helps alleviate situations where disk drives become corrupted, damaged or stolen by an intruder by automatically storing video clips in the cloud. Cloud Power stores all images at exceptional quality using the latest H.264 video compression algorithm. The Cloud Power service can be easily integrated into new DVRs that currently don’t support cloud or hosted recording. Participating manufacturers can select from flexible plans that automatically store images from seven to 90 days, and can
choose the cloud provider of their choice – including Amazon, Google or Microsoft. Systems integrators will also be able to garner additional recurring monthly revenue (RMR) by offering the service to their customers, allowing users to extend their storage capabilities to the cloud without the expense of rip and replace. Suggested customer pricing and RMR for the service ranges from $6 to $30 per month, depending on the length of time and amount of storage. With a quick integration, DVR/NVR/ IP manufacturers can leverage cloud capabilities with Cloud Power.
CP PLUS Steals the Show at INTERSEC 2015 Dubai C P PLUS received an immense response for their products and technology displayed and demonstrated at the recently concluded INTERSEC 2015, where they unveiled the latest
range of products and solutions. CP PLUS was the official Feature Partner for the event. CP PLUS solutions on display included analog, HDCI, IP based video surveillance, face detection with analog, tribrid DVR, mobile DVR, ATM solutions, comprehensive 3i Home solution, video wall and controller, InstaLive
plug & play wireless kit, vOptimus Pro and ultra WDR cameras. The product demonstrations were a near real-time experience. 3i Home solution provides all-in-one features essential for overall home security and convenience. VDP, HDCVI, home automation, remote accessibility, energy control etc., were shown working integrated, intelligently and interactively. CP PLUS 3i Home solution is the industry’s only enterprise-grade one stop comprehensive solution that sets new standards in operational efficiency, cost-effectiveness and performance. The video wall controller displayed multiple feeds from HD cameras from outside the hall, and even identified license numbers on vehicles parked remotely. CP PLUS also displayed their Fisheye IP camera which is suitable for
March 2015
80
monitoring large installations such as airports, shopping malls, parking lots, retail stores, offices and many more, resulting in reducing the need of multiple camera installations. vOptimus pro, video management software enabled operators at the control room to access the seamless and consistent video inputs. HDCVI was highly appreciated by security professionals for its HD over analog features over longer distances. InstaLive plug and play wireless kit was lauded as a portable solution for small homes and offices by video surveillance solution seekers. It drew huge attention from a number of curious visitors looking for portable solutions. “The Intersec event provides the most significant platform for demonstrating technology and innovative solutions to an international audience and facilitates interactions with security experts from the industry,” said Aditya Khemka, CMD, CP PLUS.
www.indiasafe.com
CMYK
CMYK
International Updates
Gemalto acquires Trüb AG's Secure Document Business Further Strengthening its World Leadership in Digital Identity Programs for Governments
G
emalto announces that it has signed a definitive agreement to acquire the secure document business from Trüb AG. Trüb has a 150 year history of secure printing. Headquartered in Aarau, Switzerland, it has been a pioneer in eco-friendly and highly secure polycarbonate technology. Today, Trüb provides identification solutions primarily to governments and banks and is a leading provider of high security polycarbonate identity documents. Known for its innovation capabilities, Trüb has also introduced a number of patented security features to the market.
The Trüb business will reinforce Gemalto's leadership in high security identification documents and will also enable Gemalto to serve the Swiss market of financial institutions. Once completed, the acquisition will contribute to Gemalto revenues by approximately CHF 100 Million on a full year basis. The transaction will be immediately accretive to adjusted EPS (Earnings Per Share before purchase price allocation) upon completion. “Trüb is well-respected in the security market, known for its quality, imagination and high-end security technologies,” said Olivier Piou, Gemalto CEO,
“This acquisition contributes to the expansion of our Government Programs business and positions Gemalto as the only supplier to operate dual polycarbonate production facilities in Europe.” “We really welcome the opportunity to join Gemalto, which will provide us with greater scale and market access,” said Fernando Dal Zotto, Trüb CEO, “In addition, Gemalto's broad platforms and service offers will enable us to propose full solutions to our customers.” The terms of the transaction, which is expected to close in the second quarter of 2015, were not disclosed.
Door Phone Market Worth an Estimated $2.3 Billion in 2014 Increased use of T larger screen sizes with touchscreen he world market for audio and video door phones was estimated to be worth $2.3 billion in 2014, an increase of $100 million from 2013, according to a new report from IHS. The audio and video door phone market consists of indoor units, outdoor units, accessories, and villa kits. The main technology trends currently affecting the market are:
released home automation and security products. This is important for the door phone market because IHS expects consumers will want products to integrate into one system all controlled from either a smart mobile device, or a smart alarm/ control panel. IHS expects that the growth of the home automation market will have two main implications on the door phone market.
Video door phone integration with home automation systems
Increased use of IP systems
T
he home automation market has grown considerably in recent years, especially in the United States, where several alarm monitoring, cable and telecommunication companies have all
I
P door phone systems have historically been focused on non-residential applications. However, IHS forecasts IP systems to increasingly be used within the residential markets with the introduction of home automation applications. March 2015
81
functionality
I
HS predicts the video door phone market to follow other technology markets, for example, the mobile phone and laptop markets, and move increasingly to larger touchscreen indoor units. Touchscreen indoor units allow more functionality on the indoor unit and facilitate greater ease of integration with other smart-home products, including intruder alarms, lighting controls, and heating systems. However, IHS forecasts door phone suppliers to experience increased completion from multi-function alarm panel suppliers, for example, Honeywell and its Tuxedo Touch panel.
www.indiasafe.com
CMYK
CMYK
report
India Fraud Survey By Rohit Mahajan – Senior Director and Head, Deloitte Forensic
T
he Indian economy is currently placed at the cusp of revival with visible signs indicating a change in the economic cycle. Over the last few years, we have seen the advent of new age businesses such as e-commerce occupy a prominent position in the Indian business landscape. Increased use of technology in every aspect of business operations has resulted in a new set of dynamics around fraud risk management. The new government has managed to improve business sentiment and is giving confidence to investors to make fresh investments across several key sectors. It has also taken a strong position on the perceived deterrents to investment and growth such as bribery and corruption, and other unethical business practices, by promoting good governance and enacting legislations to curb such malpractices. To benefit from the changing economic conditions, corporate India needs to focus on building a strong backbone of ethical business practices along with a robust framework of compliance and internal controls. To help organizations become aware of the fraud risks they can be exposed to, and help them develop a mitigation strategy, there is need
for quality guidance. In that regard, this Deloitte India Fraud Survey Report may provide some key insights. The report discusses the current state of corporate fraud focusing on prevention, detection and response to fraud, profile of the fraudster, role of technology in fraud risk management, and managing new fraud risks such as those from social media, e-commerce, cloud computing and crypto currency. The findings of this survey report will help corporate India work towards building a robust fraud risk management framework.
Fraud continues to be on the rise
T
he last decade has seen significant coverage of corporate fraud in the Indian media. While the Indian govern-
March 2015
82
ment has passed several laws aimed at curbing fraud, poor enforcement has diluted the intended impact. With the rise of new business models backed by technology, fraud has spawned new variants and seems to be on the rise. Around 56 percent of our survey respondents believe that fraud will continue to increase in the coming years.
Traditional schemes dominate the fraud landscape
D
espite the extensive adoption of technology by organizations to build global business models, corporate India continues to face challenges in mitigating traditional fraud schemes. According to our survey respondents, diversion/ theft of funds or goods, bribery and corruption, and regulatory noncompliance were the top three fraud concerns faced by their organizations. Further, over 50 percent of survey respondents felt that procurement, sales and distribution functions were most vulnerable to fraud, indicating that greater business exposure to external stakeholders such as vendors, suppliers, customers, and distributors could significantly increase the risk of fraud. Around 28 percent of the survey
www.indiasafe.com
CMYK
CMYK
report
respondents have indicated that their organizations did not experience any fraud in the last two years. In our experience, organizations with robust internal controls detected flags regularly and investigated them for potential fraud. In the absence of red flags or fraud, we would recommend that organizations re-look at their controls and test them for effectiveness. In our view, insufficient mechanisms to prevent and detect fraud, as well as limited enforcement of internal controls are likely to be the reasons that organizations continue to experience traditional fraud. Specifically in the area of bribery and corruption, organizations have, in the past, considered bribery as the ‘cost of doing business,’ and hence demonstrated a degree of acceptability towards this practice. But with increased scrutiny by foreign regulators, and the Indian government taking a tough stand
Which of the following measures have you considered implementing within your organization to tackle bribery and corruption?
tions are considering implementing a formal code of conduct and ethics policy with a dedicated section on tackling bribery and corruption, followed by im-
Which of the following types of fraud/ misconduct/ noncompliance has your organization experienced in the last two years?
on bribery by enforcing legislations like the Prevention of Corruption Act while passing judgments on cases, we are seeing several companies taking efforts to address the risk of bribery and corruption.
Tackling bribery and corruption
T
he majority of survey respondents have indicated that their organiza-
parting periodic trainings to employees on understanding and dealing with various forms of corruption. This behavior is indicative of the changing attitudes to bribery and corruption in corporate India. It is believed that the way the senior management deals with external stakeholders (regulators, suppliers, customers etc.) has a strong bearing on how the employees of the organization perceive March 2015
83
the business is run. Hence, the tone-atthe-top and actions of the senior management are a critical measure of how successful an anti-bribery and corruption program is/ will be. However, we noted that a relatively small portion of the survey respondents considered this aspect when they wanted to tackle bribery and corruption. Our interpretation is that while corporate India acknowledges that the process of mitigating the risk of bribery and corruption is ongoing, it feels that policies and procedures may be sufficient guides to help drive positive behavior among employees. Another interesting finding is that a small portion of the survey respondents considered the need to educate third parties to tackle bribery and corruption. At the same time, a majority of survey respondents identified tracking the levels of compliance by third party stakeholders as the key challenge to implementing an anti-bribery and corruption compliance program. While at first glance, these statements appear to be contradictory, it is possible that compa-
www.indiasafe.com
CMYK
CMYK
report
nies are relying only on internal controls to mitigate the risk from third parties. As organizations mature, we hope to see stringent anti-bribery and corruption compliance measures being expected of external stakeholders, and hence better monitoring of their compliance levels. Interestingly, a very small number of survey respondents stated that they are investing in tools and technology, especially data analytics, for detecting potential bribery and corruption instances. In our experience, technology is a powerful mechanism to mitigate potential bribery. Globally, we see companies investing in tools to monitor high-risk activities involving functions or individuals working with the government/ vendor organizations. These activities are tracked to identify red flags such as conflicts of interest, complex routing of transactions through third parties, mismatched invoices and purchase orders, back-dated contracts, unusually high payments made to counter parties, unusual phrases used for denoting facilitation payments and bribes, as well as mismatched expense claims. With strong enforcement of global laws, we are seeing Indian companies with global operations demonstrating a zero tolerance culture within the organization. In addition, many industry bodies have set up committees to help organizations identify and adopt good practices to mitigate the risk of bribery and corruption. The World Economic Forum has launched the ‘Partnering Against Corruption Initiative’ with industry bodies across the world to strengthen business and government collaboration on increasing transparency in business dealings. Additionally, companies can also look at adopting the OECD convention against bribery as well as international
standards such as the UK standard BS10500 or the future ISO standard PC278 to adequately secure themselves against bribery and corruption. The Indian government, on its part, has initiated programs such as e-procurement in select departments with an aim to curb bribery in public dealings. The coming years are likely to see a strong enforcement of Indian legislations in the What do you feel are your organization’s top three area of bribery and corchallenges in implementing an anti-bribery corruption compliance program? ruption, considering the recent cases of enforcement of the Prevention of Corruption growth. Act against corporates. With further proFor instance, during the growth posed changes in the Prevention of Cor- phase, companies tend to put pressure ruption Act, the Indian anti-corruption on executives to grow the business, often law is expected to become at par with linking compensation to achievement international regulations. of business targets. In such instances, compliance and fraud risk management processes tend to get ignored, given Contributors to fraud urvey respondents attributed the the heightened single-minded focus on prevalence of fraud risks to the lack growth. In light of the socio-economic of efficient internal controls/ compliance developments over the years, and the posystems, diminishing ethical values and tential for growth in the future, there is inadequate due diligence of employees/ a rise in aspiration levels among people. At times, the need to fulfil these aspirathird parties. In our experience, we have observed tions can lead to a tendency to comprothat many companies do not spend mise on ethical values. Therefore, we enough time building robust backend believe it is imperative for companies systems to manage fraud risks. While to invest in developing a robust code of Indian businesses use technology to conduct and follow it up with a compremonitor transactions, there is room for hensive program to ensure that the code significant automation of processes and is imbibed by employees in their day-tocontrols. Human touch points continue day business activities. Survey respondents have also highto monitor and manage technological controls. People managing these pro- lighted that in adequate due diligence on cesses can be compromised or may un- third parties is one of the key contribuintentionally overlook certain aspects of tors to fraud. Adequate due diligence compliance in a bid to focus/ support that includes understanding the coun-
S
March 2015
84
www.indiasafe.com
CMYK
CMYK
report
terparty’s market reputation, relevant experience, business interests and affiliations, financial position, clients served and litigation exposure can help identify the right partners. In addition to undertaking due diligence activities, we also believe that organizations which invest in helping their external stakeholders imbibe and comply with the organization’s values, see better working synergies and reduced risk of fraud.
Profiling the fraudster
I
nstances of big-ticket frauds in Indian corporations have historically involved employees, either as perpetrators or as conduits. Survey respondents indicated that senior management employees (senior managers and above) were most likely to commit fraud. However, in our experience all employees are equally susceptible to committing fraud.
of over Rs 100 million. About 38 percent of our survey respondents said that they had suffered no fraud loss and another 23 percent said they were unable to quantify the loss due to fraud. Globally it is estimated that the average fraud loss in companies is about 5 percent of revenues. This raises concerns over corporate India’s understanding of fraud loss and the ability to compute it accurately. This, in turn, may result in a lackadaisical approach to implementing fraud risk management measures. It is important to understand that in addition to the monetary loss from fraud, loss of reputation and credibility can also have severe repercussions for a business – long term ban from conducting business or in some cases, business termination itself. These aspects too must be considered when one thinks of fraud loss.
What do you feel are the reasons that can contribute to fraud?
Fraud losses continue to be deceptive
Preventing and detecting fraud
A
I
lthough large value scams running into several hundred crores of rupees are making media headlines regularly, responses to our survey indicate that perhaps majority of Corporate India does not experience even a fraction of that value of loss. Only 3 percent of our survey respondents said they suffered fraud loss
n the past, companies focused on putting in place basic processes and controls to improve operational efficiency, control and oversight. Today, however, there is a further need to implement mechanisms that are specifically aimed at mitigating the risk of fraud, and enabling early detection in the event of an March 2015
85
incident. Our survey results indicate that internal audit continues to remain in the top spot as a channel to detect fraud. However, whistleblower hotlines, IT controls/ data analytics are rapidly gaining ground as fraud detection. Whistleblowing hotlines have proven to be an effective means of fraud detection globally, and form an integral part of a robust fraud risk management framework. Data collected from whistleblowing hotlines can be useful in identifying patterns and trends leading to potential red flags. However, in our experience, whistleblowing programs in Corporate India need greater attention. Currently, whistleblowing programs are implemented either as part of a larger fraud risk management framework, or to primarily meet regulatory requirements, making them relatively ineffective in detecting fraud. For a whistleblower program to be successful, it needs senior management commitment and an enhanced degree of awareness among employees around the benefits of a whistleblowing mechanism so that they feel comfortable and confident while reporting their concerns through the channel. This can be done through periodic workshops and trainings, and ensuring visibility through internal promotional tools such as posters, screensavers and wallpapers, flyers and giveaways. Alongside whistleblower programs, IT controls/ data analytics have emerged as a key channel to detect fraud. Apart from measures such as restricted access to online resources and controls over use of external storage devices, organizations are increasingly using Data Leakage Prevention (DLP) software to monitor the movement of data to and from office systems. Further, organizations
www.indiasafe.com
CMYK
CMYK
report
work with huge volumes of data and it would be difficult to detect any anomalies without the use of data analytics tools that can process such data fast and pick out exceptions. We have, in our experience, observed that effective forensic data analytics can help companies detect at least 11 types of fraud schemes (see figure below). While forensic data analytics can be used for a periodic diagnostic review to identify any red flags in historical transactions, it is of greater importance to use these tools proactively for continuous fraud monitoring, which would involve real-time or near real-time analysis of transactions across business functions, so that any misconduct can be identified and controlled before the damage is done. However, continuous fraud monitoring can be a challenge for organizations that may not have dedicated resources to manage data analytics functions on a daily basis or even understand how to utilize them, as indicated by major-
ity of the survey respondents. That being the case, organizations may not see favorable outcomes pertaining to fraud detection and mitigation, despite investing in analytics tools across a range of processes and functions.
Deloitte point of view Leveraging your enterprise software to detect and prevent fraud
A
s indicated by the survey respondents, the adoption of technology and analytics for fraud risk management among Indian businesses seems to be moderate to high. Yet, on the basis of the responses received, it appears that companies have not had much success in using technology to detect or prevent fraud. In our experience, aligning specific IT controls with fraud risk management processes can possibly improve detection of fraud. Below are some practical tips based on our experience that companies can use to enable better fraud risk
What challenges do you face in the adoption of data analytics techniques in fraud prevention?
March 2015
86
management outcomes from their existing technology platform. â—? Logging and maintaining an audit trail of activities In our experience, most companies maintain logs more from a system diagnostic and troubleshooting perspective than from a fraud risk management perspective. The retention period for logs should also be determined keeping in mind the fraud risk management requirements. We recommend that a multi-disciplinary team with representatives from legal and compliance teams work together to develop a robust log maintenance policy. It is important that analytics should be routinely run on logs, and these logs should be routinely reviewed to identify unusual patterns and red flags. â—? Automated notifications (e-mails/ text messages) in cases of process overrides Well known security monitoring tools can be configured to send automated notifications to designated stakeholders when a particular event is triggered. If configured properly, such automated notifications can help ensure that the right people are notified of control overrides without delay which helps reduce the response time required to contain the fraud risk. â—? Active threat monitoring and management Most Enterprise Resource Planning (ERP) systems have Business Intelligence modules that can be configured, depending on the type of business and data inputs available, to generate red flags for deeper enquiry. While there are no universal settings or standard operating procedures for this, we would recommend enabling
www.indiasafe.com
CMYK
CMYK
report
cross departmental integration of data from systems such as between HR, Payroll, Administration and Finance to ensure a holistic view of fraud risk management. ● Audio visual monitoring This involves video recording the premises and eventually integrating the video feed with ERP data to crosscheck details pertaining to transactions. This is commonly done at toll plazas and retail point of sale counters. For instance, in our experience one of the most common forms of toll plaza fraud include miscategorization of vehicles and therefore the corresponding toll amount charged. With a video feed, cross checking this becomes a lot easier. Globally, audio visual monitoring is believed to increase the ‘perception of detection’ as employees are aware that someone is watching them, and therefore they are cautious in their conduct and behavior. • Data Leakage Prevention (DLP) software Typically DLP software run on key word based routines, filtering out transactions with those key words. However, we see that fraudsters are working around this issue by encrypting content in a manner that will pass
through the DLP software. In some cases, fraudsters also change file extensions to transfer data without it being detected by the DLP software. These issues can be overcome with policy tweaks such as allowing certain e-mails outside the group domain only if a copy is marked to a particular e-mail id – generally that of a monitoring group etc. ● Adequate control on devices (employee owned and office owned) containing confidential office data All devices containing corporate data should be encrypted to ensure confidentiality, in case the device is lost or stolen. There are software tools that can remotely wipe data from such devices over the network to ensure that data is not used by the wrong people.
Due diligence rising to prominence
I
n the larger context of fraud risk management, we would like to draw attention to the increasing role that forensic due-diligence is playing. As organizations work with an increasing number of third parties, the risk of associating with the wrong set of business partners can stretch beyond reputational risks, resulting in monetary losses and legal battles.
In India, promoter-investor/ partner conflicts are often reported by the media. Companies can, to an extent, safeguard themselves from liaising with the wrong partners by conducting a pre-investment/ pre-acquisition forensic due diligence to identify alignment of the potential partner’s goals to their own, potential integrity issues or past legal entanglements. Due diligence procedures are also used while recruiting strategic hires like senior management personnel who manage highly sensitive information, and handle roles where their integrity and reliability are of paramount importance. The due diligence in this case is used to verify the credentials, capabilities and integrity of new appointees. Our investigation experience indicates that contracting/ procurement continues to remain highly vulnerable to fraud risks, necessitating vendor due diligence procedures to understand the independence of the vendor, their capabilities and reputation in the market, as well as identify any adverse information that could affect the relationship between the entities, prior to appointment of the vendor. Adopting a structured approach to due diligence at various points of the business process is therefore a key aspect of an ideal fraud risk management practice.
Deloitte point of view Building a due diligence process framework and including it in your fraud risk management plan
B
Using forensic data analytics, which of the following frauds has your company been able to unearth/ detect?
March 2015
87
usiness intelligence (‘BI’) is a key component of a due diligence program and is an evolving risk mitigation tool. It can be applied both as a preemptive strategy for fraud prevention and for generating critical leads when investigating a fraud. In certain situa-
www.indiasafe.com
CMYK
CMYK
report
tions where access is restricted, an investigation can be conducted through an ‘outside-in’ BI process. BI combines examination of information in the public domain with market intelligence gathered through relevant stakeholders to form a comprehensive view on the credentials, reputation, financial strength and business practices of an entity or individual that is the subject of the due diligence/ investigation. As part of a due diligence program, BI assists corporations/ individuals to get access to information that can be used to quantify potential risks. Including a due diligence process as part of the larger fraud risk management plan can help avoid legal complications, costly mistakes and reputational damage. This can help detect the modus operandi of frauds perpetrated by employees and identify the manner in which the suspects have materially benefitted. BI can also help strengthen cases for prosecution by providing leads to where the evidence could be residing. In our experience, companies can benefit by leveraging business intelligence across some key processes such as vendor or counter party on boarding and management, investment due diligence, recruitment of C-Suite and other senior candidates, asset tracing, driving compliance programs focused on safeguarding labor laws and ensuring appropriate working conditions, and monitoring compliance of environmental, health and safety issues.
Response to fraud remains conservative
S
urvey respondents indicated that upon the detection of fraud, the top three actions taken by their organizations were internal investigation, disciplinary action against the fraudster, and
renewal/ updation of existing controls. Internal investigations, though perceived as cost effective and confidential, have their limitations. In our experience, internal investigators can be limited by their knowledge of
with little sign of a conclusive verdict, as well as the quality of evidence available with companies. Despite heightened awareness of fraud today, it appears that the attitude towards fraud continues to remain pri-
What action is generally taken in your organization upon the detection of fraud?
investigative tools. It is also possible that their personal biases may influence the nature of the investigation. Additionally, internal investigators may also be challenged in the area of evidence handling and may unwittingly end up tampering with the legal admissibility of the evidence. With regard to the action taken on the fraudster, we have seen that most companies tend not to terminate the said employee, but pressurize him or her to resign from his or her duties. Further, there is little or no communication about the fraud to employees, as indicated by the majority of the survey respondents. In our view, while the sensitivity associated with certain frauds does not allow disclosure, communication of employee perpetrated frauds and the action taken by the organization against the perpetrators, gives employees a sense of the organization’s low tolerance for misconduct. Survey findings also reveal that only a quarter of the survey respondents took legal action against the fraudster. We feel this is likely due to the long drawn out nature of legal proceedings in India March 2015
88
marily reactive. However, with the Companies Act 2013 specifically addressing fraud and attaching responsibilities on various stakeholders such as the Board, Audit Committee, Independent Directors and Auditors for different aspects of fraud preparedness and response mechanisms, we are hopeful that a significant number of companies will, in the years to come, be able to put in place robust processes that enable them to mitigate the risk of fraud, detect any suspected breaches in time, and respond effectively to identified misconduct. We believe that the Companies Act 2013 can be instrumental in changing corporate India’s mindset of looking at compliance as an investment and not a cost. Disclaimer: This article re-publishes extracts from the Deloitte India Fraud Survey. This material and the information contained here is intended to provide general information and is not an exhaustive treatment of any subject discussed. Before making any decision or taking any action that might affect your personal finances or business, you should consult a qualified professional adviser.
www.indiasafe.com
CMYK
CMYK
89-90 ART CARD-II FRONT SPARSH
89
CMYK
CMYK
91-92 ART CARD-II Back PILICE EXPO
90
CMYK
CMYK
Now Available through
e-Retailers http://issuu.com/indiasafe/docs
https://www.rockstand.in/emagzines/ india-safe-march-2015/
http://www.magzter.com/IN/ India-Magazines/India-Safe/Lifestyle/
http://www.readwhere.com/ publication/5787/IndiaSafe
Reach them on www.indiasafe.com 93
CMYK
CMYK
white paper
Securing Substations and Meeting NERC CIP-014 By John Romanowich – President & CEO, SightLogix, Inc.
Introduction
A
ttacks on transformer substations and other components of the electrical grid in North America have underscored the risks associated with physical security breaches and the potentially disastrous consequences. Recent events such as the shooting at the Metcalf transmission substation in California have brought a new sense of urgency around the issue of grid security. With tens of thousands of substations across the U.S. situated in locations that range from isolated remote areas to densely populated urban areas, the job of securing these critical assets is challenging at best. In light of the ongoing threat to the power grid, and to ensure greater physical security around substations, in March of 2014 the Federal Energy Regulatory Commission (FERC) ordered the North American Energy Reliability Corporation (NERC) to establish Critical Infrastructure Protection (CIP) standards that “address physical security risks and
vulnerabilities related to the reliable operation” of the bulk power system. In response, on May 13, 2014, the NERC Board of Trustees filed its proposed CIP014 physical security standard for critical components of the power grid. Once officially adopted, CIP-014 will serve as a blueprint to help both utilities and security professionals understand the requirements to best protect these vital assets. While the threat of terrorist activity to disrupt the power grid remains ever-present, other hazards such as theft and vandalism are more common and represent an additional challenge. With the price of copper at an all-time high, and with a large amount of copper wiring present at electrical substations, it’s no surprise that they have become an attractive target – often with lethal consequences, along with the associated liability beyond potentially disrupting services. Even if thieves get away unscathed, the safety of the substation March 2015
94
may have been compromised. Utility employees have been severely injured or killed in the process of performing regular maintenance due to the destabilization of certain elements of the power grid caused by copper theft breaches that went undetected. Clearly, the need for reliable intrusion detection systems to protect electrical assets has never been higher.
While the threat of terrorist activity remains ever-present, theft and vandalism represent an additional challenge
Understanding NERC CIP-014 guidelines
C
IP-014 is specifically focused on protecting the nation’s electric transmission stations and substations from physical attack. Following CIP014’s finalization, utilities will be tasked to identify their most critical facilities
www.indiasafe.com
CMYK
CMYK
white paper
– those that, if damaged or taken offline would “result in widespread instability, uncontrolled separation or cascading within an Interconnection,” and then “develop, validate and implement plans to protect against physical attacks that may compromise the operability or recovery” of these facilities. To comply, utilities will need to perform a security analysis to evaluate potential threats and vulnerabilities of physical attacks on the targets they’ve identified as most critical, verify this risk assessment with an unaffiliated third party, and then deploy and implement physical security plans to cover those locations. Finally, utilities will undergo another third-party review to evaluate their vulnerability analysis and physical security plans. These requirements will be implemented in phases, giving utilities time to prepare for and implement physical security upgrades. Importantly, CIP-014 does not prescribe specific solutions that utilities should deploy; instead, it provides suggested guidance and practices that can help mitigate risks. The concepts as outlined in the NERC standards also represent a sound and effective security practice that suits all facilities tasked with protecting key assets in the outdoors.
The concepts as outlined in the nerc standards represent a sound security practice that suits all facilities tasked with protecting key assets in the outdoors For example, in order to assure the physical security of these potentially vulnerable substations, NERC suggests implementing a ‘systems approach’ comprising six specific concepts, which
are summarized as Deter, Detect, Delay, Assess, Communicate, and Respond. NERC also suggests a ‘Defense in Depth’ approach that attempts to ‘prevent the advance of an attacker’ using zones of protection over a larger area, which creates an opportunity to respond to an event over time, rather than setting up a ‘single, strong defensive line.’ These layers of protection can start with the perimeter fence and extend into sensitive internal areas such as control rooms or copper storage locations. The NERC guidelines acknowledge that the best approach can be complicated by the many options available to achieve these goals. Let’s look at how one particular technology, smart thermal intrusion detection cameras, contributes to substation security while satisfying many of CIP-014’s security recommendations.
Meeting NERC guidelines with smart thermal detection solutions
S
afeguarding any outdoor asset, whether airport perimeters, oil refineries, chemical plants or electrical substations often comes down to the same thing: Accurate detection and timely information about the unfolding event. While there are many strategies for detecting outdoor intrusions, and various approaches for meeting CIP-014, combining reliable alerts with knowledge about what is actually happening and where it is happening is the ultimate goal. While video surveillance cameras based on visible light have long been established as an effective forensic tool for analyzing what happened after an event, there are limitations to what video surveillance can do. Historically, it has only
March 2015
95
provided passive recording of events for future use. Critical asset protection demands that intruders are detected as soon as they enter a secured area. Such real-time awareness is critical to ensuring a timely response and preventing an incident from escalating. As a result, thermal technology has become a top choice for detecting intrusions outdoors. These systems, which combine thermal sensors with video analytics, are known as ‘smart’ thermal cameras because they never tire, can cover large areas, and ‘see’ what the human eye would miss, while people – when provided with accurate alerts that thermal cameras generate – can make appropriate response decisions. Using smart thermal cameras for perimeter security applications was once seen as a more costly solution better suited for government or military applications. Recent developments in thermal camera technology provide a new Why Use Thermal for Outdoor Security Video analytics used for security applications are based on detection, and the alert must be accurate. Outdoors, it’s almost impossible to achieve detection accuracy with a visible camera, and the reason is lighting. Thermal cameras ‘see’ heat rather than light, so they are perfect ‘human detectors’ under all conditions, from zero light to bright sun, in rain, snow or humidity. They ignore all the movement that will cause alerts with visible cameras, like headlights and reflections off water. Thermal cameras also eliminate the expense, power and difficulty of lighting large outdoor perimeters. Under almost all conditions, visible cameras are not a reliable, costeffective detection system outdoors.
www.indiasafe.com
CMYK
CMYK
white paper
level of detection accuracy while making them available at commercial prices. Smart thermal cameras have benefited from the same processing advancements that make all modern computing devices so powerful, and use this processing to amplify small differences between the temperature of a person and the background, accurately detecting intruders even in less than ideal conditions. They ignore headlights, reflections off water, or other lighting issues that cause false detections with visible light cameras. The combination of higher performance and lower costs is rapidly expanding the use of thermal cameras for 24/7 security applications. Let's take a look at how smart thermal camera systems contribute to substation security in general and CIP-014 compliance in particular.
eras that use GPS-based video analytics ignore the movement of small animals, trash blowing across the ground, and other non-threatening movement from causing alerts, and send alarms only when human intruders enter secure areas.
Protection in depth
T
he NERC standards recognize that early and accurate detection is essential to achieve a high level of vigilance. For this reason, NERC seeks to create zones of protection beyond the fenceline and internally around areas of heightened security. Such buffer zones create additional time to respond before
fence-mounted systems is that they are prone to a very high rate of nuisance alerts. At the same time, costs for deploying and maintaining two separate systems – a sensor and a video system – can quickly escalate. A better approach is to implement a volumetric system to provide early warning, which is both NERC’s preference and an outdoor security best practice. This is where smart thermal cameras excel. These volumetric systems detect people and objects beyond the fenceline of a substation, triggering alarms when intruders approach the facility, giving security personnel ample warning and time to intervene.
Dependability of alerts
S
olutions deployed to protect critical facilities like transmission substations must be able to detect the presence of unauthorized persons anywhere across site perimeters and outdoor areas at all times. Excessive nuisance alarms cause operators to lose trust in the system when an alert occurs, reducing accountability across the security function. Dependable alerts are the cornerstone to effective security; operators must know that when an alarm is received, it’s time to respond. Smart thermal cameras can provide accurate detection over large areas, regardless of the outdoor conditions. For example, video processing within the camera can be used to stabilize images electronically before video analytics are invoked. This approach removes camera motion from wind or vibrations as a source of nuisance alarms. Smart thermal cam-
site assets are harmed. Numerous technologies can provide early detection of a perimeter security breach but smart cameras provide the added benefit of visual evidence of a breach without need for additional verification systems, saving valuable response time. Traditionally, the common approach for securing large outdoor areas has been to use a ‘blind’ sensor, such as coax or fiber on the fence, acting as an activity detector, augmented by a camera to help security guards determine the cause of the alert. One drawback to such an approach is that these systems fail to address CIP-014 best practices to deliver an early warning and an opportunity for a rapid response. Another drawback to such March 2015
96
For higher-risk transmission stations, smart thermal cameras can be combined with fence mounted sensors which act as a secondary layer of security.
Situational awareness
T
www.indiasafe.com
CMYK
he goal for any security organization is to maintain awareness of
Real-time topology map projects target locations
CMYK
white paper
the risks that are lurking and quickly obtain reliable information about the place and nature of an intrusion. Achieving security awareness depends on knowing the precise location and nature of an intrusion. Smart thermal cameras meet these goals when they are ‘geo-registered.’ Geo-registration, which means that the camera’s field of view (FOV) maps the GPS coordinates of all points in the landscape under surveillance, unlocks key situational awareness benefits:
Real-time target location
P
hysical Security Information Management (PSIM) software can use the target location data to display the topological positions of detected objects, overlaid on a top-down map of the surveillance area. Auto-steer PTZ cameras: PTZ cameras are often used to watch outdoor areas, but when applied to large areas, trying to use a PTZ camera's narrow view to find targets manually almost guarantees that events will go unnoticed. GPS information about detected targets can be used to automatically direct PTZ cameras to the exact location of an alarm to zoom and follow an intrusion in real-time, allowing security operators to quickly assess the nature of the alarm, and react appropriately.
Layers of protection: Compliance with CIP-014 requires securing both perimeter and multiple sensitive areas and access points throughout the facility. Smart thermal video is a good tool to protect internal assets where physical or man-made boundaries are unlikely to exist. Adding infrastructure around sensitive areas would be costly and likely impede the flow of business operations. Smart video can be used to create a ‘buffer zone’ around areas of special concern to control access based on time of day or other criteria, mitigating possible sabotage or theft from insiders. The GPS-based analytics built into some smart thermal cameras play an important role here as well. Utilities can create multiple security zones where alerts
in a certain direction that might indicate a threat, such as toward a fence. If that same intruder climbed over the fence and reached the inside yard, another security zone can be created that sends an additional alert for another area. Affordability: While NERC does not directly address system costs, the reality of business operations makes doing so a requirement. Smart thermal cameras can detect intruders 600 meters away, and an area as wide as 60 meters. Using such long-detection reduces the number of cameras needed, along with reduced infrastructure and construction costs.
Conclusion
A
s defined in the NERC guidelines, the goal for protecting critical substation assets is to employ technology
Long-range thermal cameras (at left) reduce infrastructure when compared to visible cameras
are only triggered if an intruder is moving
Long-range smart thermal cameras detect (at left) and auto-zoom PTZs for assessment (at right)
March 2015
97
that can “provide situational awareness of activity” about potential threat so that the utility can “initiate an appropriate and timely response.” Technologies such as smart thermal video are expanding the capabilities of perimeter security systems and taking their place alongside legacy strategies such as physical barriers and other forms of perimeter sensors, detecting intruders with high reliability and at low costs in the outdoors, helping utilities achieve the real-time response that CIP-014 requires.
www.indiasafe.com
CMYK
CMYK
application/ case study
CP PLUS Coral HDCVI Secures Vedanta Group Company CP PLUS deploys HD-over-analog HDCVI solution to secure Talwandi Sabo Power Limited (TSPL), a Vedanta Group company in Punjab
Background
T
alwandi Sabo Power Plant Limited, the first unit of the largest power generation facility in Punjab, is generating 1980 MW of electricity for 20 lakh households. This is also a coal-fired thermal power production project with 3 units of 660 MW each. The plant set up by the Vedanta group is being projected as a major step towards making Punjab power surplus. The CCTV surveillance system has been installed to ensure proper working of the sub plants of the Vedanta Thermal Power Plant – Talwandi Sabo to cover the security risks and also to monitor operations.
strict adherence to the process and regulations is a mandatory requirement to ensure smooth operations. All critical monitoring was carried out largely by physical and conventional security but this left security vulnerable to manipulation and potential sabotage. So, a complete and fool-proof security, independent of complete human intervention was required.
Solution
C
P PLUS identified locations where installation of analog cameras could be leveraged to monitor not only emissions but also the surveillance of
Mission
A
thermal power plant includes many diversified and integrated operations. The plant houses heavy machineries which work continuously for long durations. Even a small snag in any component may hamper electricity generation. Apart from routine maintenance schedules, it’s prudent to monitor the key parameters like emissions (a regulatory issue and grave concern for environment), temperatures, discharge of waste etc. Besides this, protection of the perimeter of the plant against any illegal intrusion is a key to safety. In environment critical installations as large as thermal plants,
which offered long-term benefits and made system maintenance free for a long period. To enhance protection from exposure to the harsh arid weather, high quality switches and RJ45 connectors were installed. All the connections were properly sealed and secured to avoid dust and moisture going into the connections. After analyzing the locations and system requirement, and discussing with power plant management, the team decided to deploy HDCVI solutions. HDCVI range of solutions is an ideal choice when an analog solution needs to be upgraded to HD video quality. The other big advantage of HDCVI technology is loss free signal transmission over long distances as far as 500 feet. The same cable can carry both audio and video signals which save infrastructure cost substantially. With HDCVI, operation and maintenance costs are greatly reduced.
Impact chimneys, DM water plant, perimeters and the EDP area. Since cameras were located at relatively longer distances, various parameters and factors were considered while laying the cables and selecting other peripherals to ensure optimum working of the system. The safety and longer life of cables were ensured by passing them through PVC conduits March 2015
98
T
he given HDCVI video surveillance solution is working well and active monitoring has led to proactive measures and thereby enhanced safety. Any process violations are reported to the technical management team and the video quality is beyond expectations. System Integrator: Z plus Surveillance Security Pvt.Ltd.
www.indiasafe.com
CMYK
CMYK
application/ case study
Globally Advanced Biometric Technology from Tbs Selected By Umm Al-Qura University A leading university in Mecca solves the problem of critical fingerprints with TBS Touchless 3D-Terminals. The 120 unit installation performs Time & Attendance for over 3000 staff 60 buildings • Large number of users • Identification improved • Arabic Interface
U
mm Al-Qura University in the city of Mecca, KSA, is one of the most prestigious institutions in the Islamic world. Its colleges occupy over 60 buildings, with more than 3000 staff on-site. When the University identified the need for a Time & Attendance system, the scale of the installation called for a scrupulous examination of the most advanced biometric technologies available on the market. The solution had to address several challenges: To securely and intelligently manage a large number of users, to display in Arabic language, to be easy to use, and most importantly, to solve the common challenge of ‘critical fingerprints,’ such as thin skin resulting from diabetes, high pigment skin, and fingers decorated with henna. The worldwide unique TBS Touchless Technology (TBS 3D) is using a non-intrusive capturing process that delivers far superior identification results. TBS 3D increases efficiency without compromising on security levels and maintaining high acceptance threshold for critical fingerprints. TBS partner Business City successfully implemented a state-of-theart 120-unit 3D solution in the colleges
“TBS made employees attendance headache history in our university”
Dr. Fahd Al-Zahrani, Dean of IT Department, UMM AL-QURA University, Mecca, KSA
of the University, making it a leading reference worldwide. TBS has built a strong presence and reference base in the Middle East with installations in over 30 government organizations. Every day, globally, more than 1 million people are using a TBS terminal. Switzerland is famous for its unmatched stability and security making it a paragon worldwide. It is TBS’ mission to bring Swiss security standards to the world. TBS offers biometric devices made in Switzerland and comMarch 2015
99
plete solutions for any kind of biometric applications in access control and time & attendance. TBS 3D Touchless finger scanning technology is worldwide unique. The three-dimensional and contactfree sensor technology captures the highest possible quantity of fingerprint details, guaranteeing significantly higher security than other biometric systems. Contact-free solutions qualify in particular for higher risk, large user groups or hygienically sensitive applications.
www.indiasafe.com
CMYK
CMYK
application/ case study
Dahua Enhances Video Surveillance System for AB DNB Bank A
B DNB Bank is part of Norway’s largest financial services group that provides financial services to its customers in 19 countries worldwide. DNB stands for long-term relationship that creates value to its customers, em-
ployees, shareholders and society. In addition, the bank has one of the biggest branch networks in Lithuania which are
82 branches, and cooperated with SEB VILNIAUS BANKAS bank to operate the largest ATM network in Lithuania. AB DNB Bank is also the third largest bank in the country. In order to safeguard customers, employees and assets, AB DNB bank decided to level up its security system, including its 26 branches throughout Lithuania. The project selected not only network cameras but also NVRs. Dahua’s network cameras for AB DNB Bank include HD network (motorized) IR-bullet cameras and HD WDR network cameras in order to protect every corner of the bank. Dahua network cameras feature high resolution camera images and better compression performance to transmit image data efficiently, also reducing storage requirements. Among those IP cameras, HDB-
W3300P, full HD vandal-proof network (IR) dome camera is IP66-rated weather and dust-proof which ensures the cameras can withstand even the harshest weather environments. Furthermore, IK10-rated vandal-proof can effectively prevent violent destruction. The products are used in 26 branch offices of AB DNB Bank in Lithuania. With the most advanced technology, Dahua DH-NVR4216 network NVR can provide high-quality video with 1080P real-time live view, so that the staff can get access to the security status immediately in the surveillance center. “Security in the banking system requires the highest level solution among different verticals,” said Tim Shen, Marketing Director at Dahua Technology, “Dahua’s solution provides the specific features that banks require such as WDR, HD as well as real-time playback. With Dahua’s video surveillance system, AB DNB Bank is capable of enhancing its security to provide a secured environment for the business and the employees.”
Etisalat Adopts Gemalto Mobile NFC Solution for Accessing Office Facilities E tisalat, the UAE's leading telecoms company, is harnessing mobile NFC solution for corporate access control from Gemalto (Euronext NL0000400653 GTO), the world leader in digital security. The solution enables
Etisalat’s management to securely access its head office and facilities with a single tap of a mobile phone on a contactless reader. The new app reflects Etisalat’s commitment to innovation and to bringing
March 2015
100
convenience to modern, smart cities. The combination of Gemalto’s UpTeq Multi-tenant NFC SIM and embedded access control application showcases the potential uses of NFC in a highly secure corporate environment, with
www.indiasafe.com
CMYK
CMYK
application/ case study
smart mobile services and trusted digital identities forming an integral part of everyday life. Furthermore, mobile NFC can be used for authorizing and initiating network printing. This ensures document confidentiality as well as supports Etisalat's objective of adopting environment sustainability in all aspects of operations and business. “Etisalat is evolving into a truly
integrated service provider by introducing smart solutions and mobile apps that can make modern living in our smart cities easier, whether it’s in the office, at home, or when shopping or traveling,” said Abdulla Hashim, Senior Vice President – Digital Services, Etisalat, “We believe that Gemalto's NFC experience and remarkable technical support will be valuable assets to us.”
“This deployment reflects the true potential of NFC technology which opens the door to many more new services on mobile,” said Eric Claudel, President for Middle East & Africa at Gemalto, “Etisalat is playing a key role in putting the UAE at the forefront of this mobile revolution, using the power of this technology to deliver smart services to its employees but also potentially to its corporate customers.”
Hikvision secures Valuable Jewellery for Saudi Arabia’s Leading Retailer The new system balances high technology with the aesthetics of a prestige building
H
ikvision has installed an IP sur- “Although our client completely unveillance solution at Saudi Ara- derstood the importance of investing in bia’s premier jewellery store. During the technologically advanced, high quality implementation process at the Al Fitaihi CCTV equipment, one of their major Holding Group’s store in Jeddah, Okaz considerations was the absolute necesInternational oversaw the installation of sity of ensuring that the CCTV cameras were as unobtrusive as possible, comple75 cameras and six 32 channel NVRs. The ‘Fitaihi Center Jeddah’ is the mented the existing prestige décor, and company’s leading retail outlet and is could be installed with as little disrupsituated at the heart of the city’s com- tion as possible.” The installed mercial district. It houses system has 75 Hikthe company’s principal vision 3 megapixel jewellery department DS-2CD754F-E(I)(Z) with its most valuable 1080p full-HD indoor pieces on display. Endome cameras, each suring that the security installed with Hiksystem minimized the vision’s DS-1227ZJ risk of theft was imperain-ceiling mount to tive but it also had to be minimize their impact as discreet as possible to on the high standard blend in to the aesthetics decoration. The 75 IP of the surroundings. cameras are linked to Mohan, the execua central control room tive manager of Okaz the store's selection of containing six DSInternational, explains, A glimpse ofluxury goods March 2015
101
9632NI-RT NVRs. “This first collaboration between the Al Fitaihi Group, Okaz International and Hikvision, has been a great success and a large part of this is due to the very high quality of the Hikvision products,” continues Mohan, “It is fitting that Al Fitaihi’s exceptionally valuable jewellery is being watched over and protected by some of the world’s most advanced technology. Having secured Al Fitaihi’s most prominent store in Saudi Arabia, we are already evaluating other opportunities to place Hikvision products in their branch stores as well.”
www.indiasafe.com
CMYK
CMYK
application/ case study
Seamless Safety and Security? Not An Issue For Skytrain T
aiwan Taoyuan International Airport (TPE) is one of five airports in Taiwan with regular international flights, and is by far the busiest. Last year, TPE dealt with approximately 34 million passengers, ranking TPE the 11th busiest airport worldwide in terms of international passengers. TPE comprises two terminals, each harboring roughly half of the passengers. A comprehensive transport system is established within the airport to transport passengers between terminals and in/ out of the airport. This sys-
the China Engineering Consultants Inc., Japan Niigata Transys Co., Ltd., and Taiwan Rapid Transit Corp. The PMS was formally launched by TPE on 18 January 2003. The PMS consists of 2 parallel tracks, North and South, each providing bidirectional service. A single car serves the north track for airline passengers only. The south track serves both airline passengers and the public, separated by platform dividers between the cars. Because of the increasing number of passengers that use the PMS each
tem comprises trains, buses, taxis, and the people mover system (PMS), better known as the Skytrain.
year, security within train carriages has become a prevailing problem for the unmanned transport system. Thus, TPE commissioned Apogear, a distributor of VIVOTEK products in Taiwan, and System Integrator Plustek to design and deploy a solution to meet the safety and security demands of TPE.
High quality security system is required for the unmanned transport system
T
he Skytrain is a fully automatic train system that runs between the two terminal buildings at TPE. The construction of the PMS was initially imitated by the Civil Aeronautics Administration in 1997, and subsequently completed under the collaboration of
Comprehensive mobile solution for the mobile environments
T
aking into account the immense flow of people in an international airport context, as well as the fact that
March 2015
102
surveillance in mobile environments required specialized products, Apogear and Plustek formulated a comprehensive mobile solution comprising 10 state-of-the-art VIVOTEK cameras. A series of hardware and software comparisons were conducted to identify the ideal device for this setting, where the VIVOTEK MD8562 mobile dome network camera surpassed all established benchmarks and all competition in its category. Thus, the MD8562 was selected for the in-carriage surveillance of the Skytrain. The MD8562 is a dome network camera geared specifically for mobile applications such as trains, buses, and other vehicles. This camera model is fully compliant with EN50155 standards and meets all shock and vibration criteria set by EN50155. The camera is housed within a vandal (IK10-rated) and weatherproof (IP67-rated) dome housing to withstand the harshest environmental conditions. The camera itself features a 2-megapixel CMOS sensor capable of capturing 1080p Full HD video at 30fps and supports real-time H.264, MPEG-4, and MJPEG compression technologies to provide detailed footage whilst reducing file size and conserving network bandwidth. The wide-angle fixed lens and WDR Pro technology exponentially increases the camera’s field of view and ability to capture minute details in extremely bright, extremely dark, or light-fluctuating environments. Therefore, the MD8562 mobile dome network camera is ideal for monitoring the mobile carriage spaces of the Skytrain system.
www.indiasafe.com
CMYK
CMYK
application/ case study
Safety and security are well ensured within the PMS
S
andy Huang, Product Manager at Plustek stated, “Since the deployment of the new surveillance system in
August 2014, a tangible improvement in safety and security within the PMS can be well observed. The cameras installed in each of the train carriages operate seamlessly with the airport’s network video recorder to produce de-
tailed, unobstructed footage. Airport management praised VIVOTEK for the excellent quality of its cameras, anticipating future collaboration in enhancing the security of other sections of the airport.”
Milestone Systems Makes Newborn Rhino an Online Star Copenhagen Zoo uses Milestone XProtect® VMS to create online buzz about rare rhino birth. This is the first result of a strategic collaboration with Milestone on video-enabled experience in parks
M
ilestone Systems has entered a strategic collaboration with the Copenhagen Zoo. One of the main aims behind this partnership is to use video as a tool to extend and enhance visitors’ experience and create new business possibilities for Copenhagen Zoo. The first successful event using the networked video technology was the online broadcast of the birth of a male rhino calf at the zoo, on January 24 this year. The broadcast attracted more than 35,000 views on YouTube and generated further media interest. Rhino births in zoos are rare and the last delivery in Copenhagen Zoo was in 1982. The zoo has created a section on their website dedicated to the event. Holders of annual passes can now watch live video from the rhino pen and get more information on this endangered species. The video feeds from the zoo are currently only accessible to those who have an annual pass to the zoo. Copenhagen Zoo is very positive about the video technology possibilities in this strategic partnership with Milestone Systems. “Milestone has opened
our eyes to new uses of video and shown us marketing opportunities that we had not discovered ourselves. The video software is not only helping us with safety and protection of the animals and staff – there are so many additional possibilities as well. It is a fascinating new category of management tool that is expanding into our line of business,” says Steffen Straede, CEO at Copenhagen Zoo. “We see a very positive reaction from our patrons when we announce the birth of an animal. The use of video technology gives the zoo patrons the possibility to experience the animals close up and undisturbed.” The open platform technology in Milestone XProtect enables Copenhagen Zoo to pick camera brands and models that are perfectly suited to the highly challenging environment in the park. When the rhino calf was born, the national Danish broadcaster DR requestMarch 2015
103
ed a live video feed from the rhino pen. The open architecture of the Milestone software helped facilitate this request on short notice, and the rhino calf became an instant media darling on Danish prime time television. “We are dedicated to furthering the benefits of open platform software to video-enable business. The use of video to enrich patrons’ experience of Copenhagen Zoo is a clear testimonial to the value of our technology, empowering through our technology to reach beyond monitoring and protecting the animals,” says Kenneth Hune Petersen, Chief Sales and Marketing Officer at Milestone Systems.
www.indiasafe.com
CMYK
CMYK
application/ case study
Bulk Oil Storage & Transport Accra Ghana Perimeter & Interior IP Surveillance over a Wireless Network The requirement
A
s a result of incurring reported operational losses due to the theft of products and assets onsite – Bulk Oil Storage & Transportation Co Ltd. (BOST) approached in country Secu-
rity Systems installer JIDEM Security to design and specify a perimeter IP surveillance system, with public address over IP capability from a central location. The requirement outlined the provision of a dedicated CCTV monitoring control site within the facility to accommodate recording capabilities and monitoring staff on a 24/7 basis as part of an ongoing contract. BOST was incorporated in December 1993 as a private limited li-
ability company with the Government of Ghana as the sole shareholder. Until May 2001, BOST was responsible for the distribution of refined petroleum products from its strategic depots located throughout the country. BOST also holds the Natural Gas Transmission Utility License (NGTU) granted to it by the Ghana Energy Commission (EC) on December 19 2012. The NGTU as per EC Act 541, 1997, will provide transmission and interconnection services for natural gas without discrimination throughout the country
The solution
T
he design, planning and implementation of an end-to-end HD IP CCTV system, delivered to a dedicated control room facility within the site premises was carried out with the help of a Wavesight designed and provisioned wireless network infrastructure – utilising a host of Wavesight radio products and industrial interconnects to facili-
tate a comprehensive day/ night megapixel perimeter surveillance system. The wireless network infrastructure was further leveraged by integrating a public address system used by the security control room operators. JIDEM Security in partnership with Wavesight, scoped the project through the design and planning stages to include a total of 55 IP cameras comprising a combination of 1080p/ 720p IR equipped CCTV sensors, to be displayed across a 7 monitor video wall with operator client workstations. Wavesight designed the wireless network to accommodate all CCTV sensors, the interconnects and integrated an IP public address system. Wavesight also provided onsite consultancy and commissioning support to ensure that the system was deployed quickly and efficiently in order to minimise any operational disruptions. Within a few hours of the first cameras coming online, evidence was already being collected that empowered the BOST management team to assess and plan to rectify the risks associated with theft related activities and other operational efficiency related activities.
Milan Cathedral Protects History with exacqVision Challenge
T
he Milan Cathedral had an aging CCTV analog security system in
place. They wanted to upgrade their surveillance system with new IP technology while also utilizing their existMarch 2015
104
ing infrastructure. To protect the cathedral’s historical value, Milan Cathedral employees wanted to install a more re-
www.indiasafe.com
CMYK
CMYK
application/ case study
liable, updated security system.
Solution
T
hey installed three exacqVision LC-Series hybrid network video recorders (NVRs). The hybrid NVRs allowed the cathedral to connect their existing analog cameras and utilize the current infrastructure while also adding new IP cameras. The exacqVision NVRs provided them with a low-cost, powerful system. The exacqVision system offered them the opportunity to select from thousands of IP camera models that are compatible with the exacqVision system. SIQR, an Italian local distributor, installed new SIQR Sentry two megapixel IP cameras. These new IP cameras provided high definition video and larger aspect ratios. The IP cameras cover more space, so they can see a greater area and detail with one camera. Within exacqVision, Cathedral security can zoom in and move around the image to see greater detail. After seeing the results of the new IP cameras, Milan Cathedral personnel decided to add more
exacqVision allows Milan Cathedral security personnel to customize their live view to show multiple camera views
cameras. These cameras were strategically placed around the perimeter and inside the cathedral to monitor the most traffiked areas and valuable art pieces. Each exacqVision server came pre-installed with exacqVision professional video management system (VMS) software. Fabbrica del Duomo Manager views the exacqVision client on his laptop using the free web client application. From the client, he can easily mon-
The Milan Cathedral in Italy has recently updated their surveillance system to better monitor visitor flow and improve operations
March 2015
105
itor video from all cameras. Within a few clicks, he can search and find the video evidence necessary. Specifically, the Cathedral Manager can use a timeline search to quickly identify the visual change and exact time in the video that he needs for the evidence. They are now able to respond to situations faster than ever before and provide local police with the appropriate video evidence. The exacqVision solution proved to be future proof. They can easily add additional IP cameras and another server over the next few years to expand their security system. Equipment-at-a-glance Software: ● exacqVision Pro VMS Software. Hardware: ● 32 analog cameras. ● 3 exacqVision LC-series hybrid servers. ● 14 2-megapixel SIQR Sentry IP cameras. Purpose/ Benefits: ● Easy to use VMS software. ● Fast video search capabilities. ● Scalable for future additions. ● Integrates with third-party providers.
www.indiasafe.com
CMYK
CMYK
application/ case study
Advanced Panels Protect the Eighth Wonder of the World Hagia Sofia in Istanbul, built almost 1,500 years ago and a landmark of global importance is being protected with an Advanced fire system
B
uilt on the orders of Eastern Roman Emperor Justinian in 537 in what was then Constantinople, it was the world’s largest cathedral and a cornerstone of Christianity for nearly 1,000 years. It then became
tical smoke and air sampling detection, with a range of input and output devices. MxPro offers customers a choice of two panel ranges, four detector protocols and a completely open in-
the city’s most important mosque for almost 500 years and is now a world famous museum and a crown jewel in the history and skyline of Istanbul. As far back as the 6th Century it was called ‘the eighth wonder of the world.’ It welcomes millions of visitors every year and became Turkey’s most visited tourist attraction in 2012. A recent upgrade to its fire system, installed by Advanced’s partner, D Sistem, saw an Advanced MxPro4 fire system installed, supporting op-
staller network that enjoys free complete training and support. MxPro panels can be used in single loop, single panel format or easily configured into high speed, multi-loop panels in 200 node networks covering huge areas. Advanced’s legendary ease of installation and configuration and wide peripheral range make it customisable to almost any application. MxPro 4 is Advanced’s benchmark panel and is EN54 2 & 4 approved, offering users high quality March 2015
106
and performance, and the knowledge that its fire system can be easily upgraded in future. Its partner Advanced’s MxPro 5 is EN54 2,4 &13 approved and is backward compatible with the MxPro 4. GerdaKoberidzeÖzkan, spokesperson for D Sistem Ltd said, “The improvements to this historic building have involved bringing the fire detection system up to date, ensuring that the building has the best quality fire alarm system and meets the highest standards in fire safety. We have used Advanced panels for several projects in the past as they are highly reliable, adaptable and can be upgraded in the future.” Etienne Ricoux, Advanced’s Export Sales Manager for Europe commented, “The Hagia Sofia is the latest landmark building to be protected by Advanced panels. It’s probably the oldest building we’ve ever protected and beautifully illustrates the power and quality of Advanced’s fire systems. On the one hand we protect one of Europe’s oldest landmarks and the other its current tallest building, The Shard in London. “We believe that MxPro ticks all the boxes, combining proven reliability with innovation and ease-ofuse. It also delivers a future-proof solution, with the capability to be easily upgraded and supplemented in future.”
www.indiasafe.com
CMYK
CMYK
application/ case study
New Silesian Museum with 109,000 Valuable Artefacts Secured by CEM AC2000 from Tyco Security Products
T
he powerful CEM AC2000 Security Management System from Tyco has secured the new Silesian Museum in Poland. The stunning new museum building, opening mid-2015, has all of the Museum’s exhibition space buried underground with only glass tower skylight extensions visible above. The Museum houses 109,000 items from different fields of art, as well as archaeological, ethnographic and historical artefacts. “As an organization with a large number of important works of art and other artefacts of historical importance, security is obviously of paramount importance for The Silesian Museum. CEM AC2000 access control system was chosen because of its proven security and reliability in addition to its flexibility to integrate to third party security systems,” said Philip Verner, EMEA Sales Director, CEM Systems, “Integration is an important part of the Museums’ overall security strategy, requiring their existing intruder and
CCTV security systems to work seamlessly with the access control system.” The AC2000 access control and security management system was delivered by CEM approved Reseller Samaxon, and installed by IB Systems & Budimex. CEM Systems worked together with Samaxon to develop a software interface between CEM AC2000 and Avigilon video management system and used the AC2000 Galaxy Dimension Interface to integrate with the Honeywell Galaxy intrusion detection system. The AC2000 Galaxy interface enables inputs from intruder panels to be placed as icons on the AC2000 AED (Alarm Event Display) application allowing for central alarm monitoring of both access control and intruder alarms. AC2000 AED provides the museum with a powerful security management tool and provides a central command and control user interface for the access control, video and intruder systems. AC2000 AED also provides the Silesian Museum with dynamic, realtime information on all alarms and events that occur on the AC2000 system. AC2000 comes with a range of comprehensive software applications that can enable the Silesian Museum March 2015
107
to enhance business operations. The Museum will utilize AC2000 VIPPS (Visual Imaging Pass Production) and AC2000 Visitors. AC2000 VIPPS gives museum security personnel the ability to design and customize ID badges and AC2000 Visitors enables staff to monitor and control visitor access to the prestigious building. Visitors can be given access levels and/ or traced, allowing visitor movements to be monitored and controlled. Visitor cards can then be reused when returned, saving on visitor card costs. The Silesian Museum has also installed CEM S610f integrated fingerprint card readers at high security doors throughout the building. This additional layer of biometric security allows for triple authentication – card, PIN and fingerprint – for highly restricted areas that require extra security.
www.indiasafe.com
CMYK
CMYK
108
CMYK
CMYK
109
CMYK
CMYK
Comelit’s ViP System Offers Residents Class-Leading Comfort and Security
Globally renowned door entry manufacturer, Comelit Group UK, has supplied an IP video door entry system for a multi-block residential development in an exclusive gated community within the idyllic north London village of Mill Hill ertfordshire-based luxury property developers, Heron Lea, asked Comelit to design and supply a system that offered unparalleled functionality and security, complemented by monitors that were sleek, elegant and in harmony with the high-end décor of the luxury apartments.
H
video monitors were installed and linked to the 23 bespoke ViP entrance panels throughout the eight apartment blocks. These individual buildings were then connected to the existing site-wide LAN to provide simultaneous video and audio conversations between an unlimited numbers of users (including the switchboard operator), without the phone line ever being engaged. The installers benefited greatly from being able to integrate the existing alarm with the door entry system and preconfigure everything offsite, saving both time and money. Comelit’s ViP system is completely digital and is at the forefront of leadingedge technology, making it easy to install into an existing LAN network. In comparison with traditional analogue systems, ViP also makes future expansion possible, as there are no limits to the number of users, switchboards and internal units.
Essentra Security Awarded Contract to Supply Smartcard Printers to HSCIC
Specialist electronic fire and security company, Detection Security, working in conjunction with access control distributor, Door Entry Direct, was tasked with the installation and design for the Hammers Lane site using Comelit’s simple and versatile IP system. A total of 72 Black Planux Lux
Essentra Security, Europe's leading provider of ID solutions, has been entrusted to play a key role in the provision of a new generation of Smartcard printers throughout the healthcare service he contract to supply the new card printers has been awarded by the health and social care information centre
T
March 2015
110
(HSCIC), the national provider of information, data and IT systems for health and social care.
Essentra Security will fulfil the project in partnership with prime contractor SCC through the commoditised IT hardware and software (CITHS) framework, and ultra ID manufacturer of Magicard ID card printers. The key objective of the contract is to refresh and modernise the estate of smartcard printers used for authorising and issuing ID smartcards to staff who need to access NHS systems that require this authentication. The contract will run over a three year period with two options to extend by 12 months. The Magicard Enduro+ custom printer has been tested during a thorough evaluation period, and successfully integrated into a new card management system developed by HSCIC as part of the care identity services project. From April 2015, the printers will start to be rolled out across all regional health service establishments throughout England and Wales.
www.indiasafe.com
CMYK
CMYK
Lights, Cameras, Eagles! Iluminar’s Skidaway Owl Cam
Bordering Skidaway narrows, a part of Georgia’s famous intercoastal waterway; Skidaway Island in Georgia is a state park near historic Savannah picturesque nature reserve, Skidaway Island attracts visitors throughout the year to see its wide variety of animals and migrating birds.
A
With the reserve widely known for its Bald Eagle’s nest, and with the pair expected to return for a third season, the Landings Club board of Governors sought a way to bring the nesting activity to a wider audience by providing visual
and audio surveillance of the birds during the hatching season. The mission: HDOnTap, a specialist provider of live webcam streaming services, hardware and customized off-grid power, wireless network and remote live cam solutions for wildlife viewing, was referred to the board by the Georgia Department of Natural Resources. The solution: Tim specified an X|Stream designs X|Mod enclosure fitted with a 720p Sony WR600 PTZ camera, supported by an iluminar IR623 series long range infrared LED illuminator, and powered via a 12VDC accessory power port within the enclosure. The iluminar IR623 series can illuminate objects at distances up to 623ft (190m) using SMT LED technology, and features low-power consumption together with an IP67 weatherproof enclosure ~ perfect for deployment in the birds’ nest. Footage from the camera is now being streamed live on the Internet via HDOnTap’s live streaming webcam service. The result: After a swift installation, the nest was left for the anticipated arrival of the bald eagle pair. However, only one eagle arrived. The speculation was that the mate had been lost or had strayed. This was not the bad news it initially appeared to be though, as the vacant nest soon attracted a pair of great horned owls who took it over.
March 2015
111
International Expansion from LearnCCTV
UK based LearnCCTV are pleased to announce international expansion into a number of overseas regions ollowing great success in the UK security market, LearnCCTV are pleased to announce the launch of the first stage of their international expansion strategy. LearnCCTV will be providing vital training services to the Middle East and regions across East Africa to a variety of differing markets. Within these varying markets LearnCCTV will be focusing on key areas including an introduction to CCTV, the importance of specifying systems correctly and the differences in technologies and platforms including analogue, IP and HD over traditional COAX. Working with the government department for UK Trade and Investment, LearnCCTV are making excellent in-roads into these overseas territories to partner with local training organisations to deliver a full range of CCTV training programmes. The programmes will be continually monitored, adapted and adjusted to develop as technology advances in each region. Initially LearnCCTV will be providing training courses in the United Arab Emirates, Uganda and Kenya, however, further countries will be added as part of their wider international expansion strategy.
F
www.indiasafe.com
CMYK
CMYK
University of South Australia Finds Value in Tech to Safeguard students
CriticalArc’s SafeZone™ improves safety and security for 34,000 students and staff riticalArc reports that the University of South Australia (UniSA) has improved on-campus safety and security for 34,000 students and staff with the successful implementation of its innovative SafeZone™ distributed command and control solution.
C
UniSA selected SafeZone to enhance safety while reducing costs across six disparate campuses, from inner-city urban environments to outback locations dispersed across 800kms. By providing unparalleled situational awareness, SafeZone is enabling UniSA to manage everyday security operations and incidents response procedures faster and much more efficiently. An intuitive SafeZone app enables UniSA students and staff to summon assistance for an emergency, first aid or general help via a simple tap on their
phone to raise an alert that automatically pinpoints their exact location. Security staff and coordinators on all campuses carry the SafeZone responders’ app on an iPhone to ensure a fast, well-coordinated response, most appropriate action and best outcome. The cloud-based SafeZone system shares situational awareness across the whole security team in the field, giving responders access to live operational intelligence and complete incident visibility as an event unfolds, enabling more agile decision-making. UniSA chose SafeZone in response to a range of security challenges much like those facing higher education providers worldwide. These included expanding facilities, the rise of flexible 24/7 on-campus learning and to improve round-the clock lone student protection. As on many campuses, there was a concern that incidents might go unreported, particularly among overseas students due to unfamiliar surroundings, cultural reticence and language barriers. UniSA also wanted a better mass notification system plus the ability to monitor performance against KPIs and build a continuous service improvement culture. Superseding slow, unreliable and costly SMS, SafeZone’s mass notification is fast and efficient, allowing
UniSA security coordinators to send alerts to all staff and students. Tailored instructions can be sent to response teams or messages targeted to specific groups such as wardens or people at a particular location. Outdated manual check-in processes have been replaced, making it easier to optimise security cover for out-of-hours users and lone workers. It is also enabling more accurate, cost-effective reporting, regulatory compliance and continuous service improvement.
Samsung Techwin Increases Flexibility of iPOLiS Mobile app
iPOLiS Mobile for Android and Apple iOS devices has been upgraded and can now support playback directly from SD cards inserted into Samsung Techwin cameras he added flexibility offered by this enhancement to the iPOLiS Mobile app is likely to be of particular
T
interest to users who wish to remotely retrieve recorded video of specific incidents captured by a small number of cameras installed in their home or working environment, as it negates the need for a DVR or NVR to record and store the video. March 2015
112
www.indiasafe.com
CMYK
CMYK
The free iPOLiS Mobile app can be downloaded from the Android Play store and iTunes. It can be set up in less than a minute, after which users are able to view streamed video from their selected camera via a wireless or 3G network. Key features include auto detection for adding new devices and ‘Event’ search to provide easy access to recorded video.
IP Bullet Cameras from Siemens Deliver Superior Image Quality: Day and Night
Siemens has launched a new model series of innovative IP bullet cameras wo model versions are available: CCPW3025-IR (3MP version) and CCPW5025-IR (5MP version). Featuring an attractive housing, the cameras offer high image resolution and quality, and deliver sharp images in any lighting condition.
T
The robust, reliable camera models are suitable for a wide range of applications. Both the camera and the motorized 3-9 mm lens are inside a permanently sealed IP66 weather-proof housing. This ensures maximum performance and reliability even under ex-
treme environmental conditions. Additional features include H.264 and MJPEG dual encoding and context-adaptive binary arithmetic coding (CABAC), for superior video encoding. Compatibility with ONVIF Profile S enables seamless integration with thirdparty systems. The 3MP model has a resolution of 2048x536 pixel at 15 fps and 1920x1080 pixel at 25fps, the 5MP model 2592x1944 pixel at 12fps and 1920x1080 pixel at 25 fps. Both versions have a bi-directional audio input and output. For local alarm recording, the on-board storage capacity can be expanded up to 64 GB using a micro SDHC/ SDXC card. Sold by the security product business segment of Siemens, these IP bullet cameras offer state-of-the-art built-in backlight compensation (BLC) and a wide dynamic range (WDR) for outstanding image quality. The varifocus day/ night IR technology produces excellent color image quality in daytime mode while the mechanically controlled IR-cut filter delivers sharp, IR-sensitive black-and- white images at night. In addition, an Auto Back Focus (ABF) function automatically adjusts the camera’s CMOS position when switching between color and black-and-white, thus ensuring optimal image quality at any time. The cameras are easy to mount indoors and outdoors, requiring only a three-position bracket and a power supply and network connection. The Powerover-Ethernet (PoE) option can be used to supply power via the IT network infrastructure.
March 2015
113
Kramer to Release New Matrix Switcher/ Multi-Scaler at ISE 2015
VSM-4x4HFS features seamless switching, video wall, and multi-viewing modes for HDMI ramer Electronics announces the release of its newseamless VSM4x4HFS matrix switcher/ multi-scaler with video wall and multi-viewing modes. The company will be showcasing the product at ISE 2015 in Amsterdam as part of Kramer’s Pro AV solutions for live events.
K
The Kramer VSM-4x4HFS offers the fastest and cleanest switching and scaling experience in the market. Designed for presentation environments, the switcher/ scaler features a 4x4 matrix switcher, as well as video wall (2x2), dual display (PIP/ P&P) and quad display modes. Video wall mode comes with Bezel correction options. VSM-4x4HFS includes PixPerfect™ scaling, Kramer’s high-precision pixel mapping and scaling technology. The VSM-4x4HFS has 4 HDMI inputs and 4 scaled HDMI outputs, and offers flexible control options e.g., front panel buttons, IR remote control with OSD (On-Screen Display), RS-232, and a built-in web browser.
www.indiasafe.com
CMYK
CMYK
Annual Subscription: 1000/- for 12 Issues
* Please subscribe through admin@indiasafe.com
WE ARE UPDATING OUR DATABASE For free listing in IndiaSAFE Directory
EXPAND Your BUSINESS
For details contact: spathak@indiasafe.com
* Send your detail to admin@indiasafe.com
India Magazines, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh , New Delhi-110 014, INDIA Tel: +91 11 32471910 • Telefax: +91 11 42828080 • Website: www.indiasafe.com 114 114
CMYK
CMYK
LIST OF ADVERTISERS – march 2015 Page #
S. No.
1.
35-36 (Card)
12.
33-34 (Card)
2.
Gate Fold
13.
18
S. No.
Company
Company
Page #
Fostering Innovation for Global Security Challenges 14 - 16 APRIL 2015 Sands Expo & Convention Centre Singapore www.interpol-world.com ER
RD
14.
35-36 (Card)
BO
3.
M
AN
AG
SU
EM
PP
LY
EN
CY
BE
RS
EC
UR
116
ITY
T
CH
AI
N
SE
SAFE CI TIES
C
U RI
TY
4.
15.
13
•
Source from over 250 international solution providers
•
Connect and cultivate business relations through networking events
• Get updated on innovative solutions and technologies • Exchange
Inner Front Cover
ideas at INTERPOL World Congress
Your business and networking engine! Register online at www.Interpol-world.com now Event Owner
Supported By
Supporting Knowledge Partner
Held In
Managed By
05
5.
11
16.
6.
37
17.
108-109
7.
Gate Fold
18.
91-92 (Card)
8.
08, 09
19.
07
10
20.
89-90 (Card)
10.
Inner Back Cover
21.
32
11.
6, 17, Back Cover
22.
15
9.
Interpol AD_Visitor Promotion_FA 210X270mm.indd 1
14/12/14 9:53 pm
GSA Exhibitions Pte Ltd
115 115
CMYK
CMYK
116
CMYK
March 2015
www.indiasafe.com
Price ` 100/-
(118 pages including 6 for cover)
127
Access Control Trends
2015 India Fraud Survey Convergence of
IT & Access Interview Ashish P Dhakan MD & CEO, Prama Hikvision India Pvt. Ltd.
Securing Substations
I N D I A S A F E
M A R C H
2 0 1 5