Nov 14

Page 1





CMYK

5

CMYK


CMYK

6

CMYK


CMYK

7

CMYK


CMYK

8

CMYK


CMYK

9

CMYK


CMYK

10

CMYK


CMYK

11

CMYK


CMYK

From the Editor-in-Chief

Volume XI • Issue 3 • November 2014 (118 pages including 6 for cover) Editor-in-Chief Lt Col Pritam Singh Mehta (Retd.) Associate Editor Santosh Pathak

Dear Readers, Greetings from IndiaSAFE!

India MAGAZINES Registered Office BBC Complex, 150 Kilokri Near Maharani Bagh New Delhi - 110014 Ph: +91 11 32471910 Telefax: +91 11 42828080

The past month saw a flurry of newspaper articles on the deployment of CCTV cameras for a large number of reasons, as diverse as they were geographically widespread. It seemed that some part or the other of the country was finally having its tryst with the deployment of surveillance equipment, in many cases, long overdue. The city of Surat is now equipped with 604 CCTV cameras, of which 500 new cameras were installed in the second phase of the ‘Smart City Project.’ The existing 104 cameras from the first phase have already assisted police in solving a number of cases, and the city police are hopeful of cracking more cases with a wider network and trained staff, and or course, with the added experience.

E-mails: editor@indiasafe.com spathak@indiasafe.com Website: www.indiasafe.com Ad-Sales Madhu Mullick adsales@indiasafe.com

After the recent standoff between Indian and Chinese troops, both India and China have deployed cameras on the border to look deep into each other’s territory. While the Chinese activity has focused on its border with Himachal Pradesh, the Indian deployment of cameras, including thermal cameras, has been biased towards monitoring Chinese troop activities in Ladakh.

Brand Promotion Jayati Mehta

An electronic surveillance system to keep track of punctuality of government officials was to have become fully operational by the month end as part of the government’s efforts to discipline employees. Online trial run of the live biometric attendance system (BAS) has begun, and attendance of over 50,000 employees from 148 departments can be viewed online. The list goes on: Tihar Jail needs to be monitored better with 1,500 cameras as per an internal report, and work has already begun; to checking poaching, smuggling, encroachment on forest land and other illegal activities, the government of Odisha has decided to keep large areas of forests under the surveillance of CCTV; the excise department in Pune has installed CCTV cameras in 34 of the district’s liquor manufacturing and wholesale units; 80 DTC buses on outer Mudrika route get CCTVs as part of a pilot project in which 200 buses will be fitted with CCTV etc. This month’s editorial carries white papers from HID on Strong Authentication as the Foundation for Securing Mobile Access; 14 Best Practices for Building Video Surveillance Networks by Allied Telesys; and March Networks’ Security for Banks and Credit Unions. We wish you a pleasant month ahead and happy reading! With warm regards,

Lt Col Pritam Mehta (Retd) Mob: +91 9811413696

Circulation Pulak Halder, Priyanka Lal Design S S Rawat Portal Design & Maintenance Sudipta Das Printed, Published and Edited by Lt. Col. Pritam Singh Mehta (Retd.) on behalf of India MAGAZINES from BBC Complex, 150 Kilokri, Near Maharani Bagh, New Delhi-110014. Printed at Infinity Advertising Services Pvt. Ltd., F-90/9, Okhla Industrial Area, Phase-I, New Delhi-110020. All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of IndiaSAFE.)

12 CMYK


CMYK

Secure more business.

Introducing the Axis video surveillance solution. Build new revenue streams for your business with the Axis video surveillance solution. With the conversion from analog to digital, this opportunity is increasing. What’s more, you already have the relationships and knowledge to capitalize on it.

Secure an opportunity at www.axis.com/companion or email us at contact-sap@axis.com

Distributed by:

axis_ad_smb-retail_indiasafe_210x270_en_1410.indd 1

13

CMYK

14/10/2014 2:06:41 PM


CMYK

NOVEMBER 2014

CONTENTS www.indiasafe.com

WHITE PAPERS

19

28 Strong Authentication is the Foundation for

14 Best Practices for

Building Video Surveillance Networks

Securing Mobile Access

69

Networked Video Security for

Banks and Credit Unions NATIONAL ROUNDUP

38

Cisco Smart City

47

CP Plus CCTV Power Supplies

40

Oncam Opens Office in Delhi

48

HoMAI Re-launches as ASPA

• Sparsh Shines at IISE 2014

49

Schneider Engages Smart City Proponents • Rahul Nanda Talks with UK Prime Minister • Nanded Deploys NICE Safe City Solution

41 42

• NUUO’s Appointment for India Aditya Awarded at IISE 2014

51

• Wavesight Secures Bangalore Turf Club 43 • Matrix at IFSEC India 2014

52

Odisha Police Adopts e-Surveillance

Axis’ Annual Seminar 2014

53

DuPont Safety and Sustainability Awards 2015 • Wavesight India and SmartWitness Join Forces • IndigoVision Helps India Reach the Stars

44 45 26 46

• Sony’s IP Camera SNC-XM631 • IFSY Road Show 2014

54

Transcend CFast 2.0 CFX650/600 Memory Cards

14

CMYK


CMYK

15

CMYK


CMYK

NOVEMBER 2014

CONTENTS www.indiasafe.com

PRODUCT SHOWCASE 55

• VIVOTEK Debuts VC8201

62

• AXIS Q6000-E Network Camera

56

Hikvision Enhances EXIR Cameras

57

Grundig’s New IP Camera Range

58

• Redvision X-SERIES™ Rugged Dome • Comelit Software Update to ViP

60 61

• Scati Launches X600 Series • OnSSI at Security Canada

63

Honeywell Total Connect™

64

Elpas’ Infant Protection Bracelet

65

• Lilin’s New Rugged IP PTZ Domes • Exacq EasyConnect

CEM’s New Version of AC2000 • Altronix New Video Series

66

Avigilon Control Center 5.4

• NI Introduces Two New Products

67

Milestone’s XProtect® 2014

APPLICATION/ CASE STUDIES

74-79

97-107 INTERNATIONAL UPDATES

80-96

110-113 16

CMYK


CMYK

17

CMYK


CMYK

18

CMYK


CMYK

WHITE PAPER

Strong Authentication is the Foundation for

Securing Mobile Access By Jordan Cullis – Head of Identity Assurance, Asia Pacific, HID Global

Securing personal mobile device access to enterprise IT and cloud assets with strong authentication Loss of control – The mobile, BYOD phenomenon

I

n the world of enterprise security, what used to be a fairly contained universe – with the ability to put effective controls at critical physical and online entry points – is now an exploding, constantly moving target. The new landscape many enterprises and government organizations are facing is a mobile one, where employees, partners, customers and other constituents want to access resources from anywhere, at anytime, using the latest, smartest mobile devices they have on hand to conduct their business. While organizations recognize the opportunities and productivity gains that can be garnered from anywhere, anytime access, they are struggling to effectively support it. A key reason this is so difficult is that organizations no longer own all the devices that enter their premises and connect to their networks. Employees are bringing their own devices (BYOD) to work and demanding IT support for

them at an increasing rate because they want the same quick, easy and convenient access to resources at work, with the same devices and tools they are used to having in their personal lives. Since these personal mobile devices are being used to access enterprise resources and cloud applications, they become a highly attractive target for security threats. Against a backdrop of increasing mobile malware, advanced persistent threats (APTs) and highly motivated and sophisticated attackers, enterprises and government organizations must be able to secure mobile access – it cannot be the weak link. The consummate balance between convenience and security must be maintained to ensure the convenience that mobile access enables doesn’t jeopardize the resources and ongoing operations of the business. But how do organizations protect access from mobile devices when they don’t own or control them? They can’t standardize on a couple, even a handful, of platforms and operating systems to create a consistent environment or November 2014

19

A Mobile World – By the Numbers: • An Accenture survey found 83% of companies believe mobility will significantly affect their business. • Gartner predicted one billion smartphones will ship in 2013. • Apple sold 67 million iPads in less than two years – it took Apple 24 years to sell an equivalent number of Macintosh computers. • By 2016, it’s estimated global mobile data traffic will reach an annual run rate of 130 exabytes a year. • There will be seven billion new wireless devices on the network by 2015 – including machine-to-machine modules – which equates to almost one mobile device per person on the planet. • 1-2% of all mobile phones are infected with malware at any given time.

reduce support complexity; they can’t tell users what to download or do with the device on their own time; and they certainly can’t watch them to make sure they don’t give it to someone else or leave it somewhere. While organizations and government agencies don’t have a lot of control over the device, they can control the access they allow from that device to corporate resources, networks and cloud applications.

www.indiasafe.com

CMYK


CMYK

white paper

By deploying a complete identity assurance solution, the foundation of which is strong authentication, organizations can establish trust in their users’ identities and their mobile device when they are accessing corporate resources and manage and control that access. In this way, organizations can enable users to access enterprise and cloud applications from their mobile devices, in a more secure, cost-effective way, while regaining control over their environment.

Strong authentication is the foundational element to securing mobile access

S

trong authentication, which is sometimes referred to as advanced authentication (AA) or multifactor authentication, serves as the foundation for an effective identity assurance solution that can be used to secure mobile access. By requiring additional factors, beyond a simple password, to validate a user is who they say they are, organizations are able to deploy a higher level of security and better control access to corporate resources, networks and cloud applications. To trust personal mobile devices and deploy strong authentication, organizations may use any combination of factors: ● Something the user knows, such as a unique password or personal identification number (PIN). ● Something the user has, such as a token, one-time password (OTP), short message service (SMS) message, or a secure element on a mobile device (such as a SIM card, embedded smart chip, smart MicroSD, etc.). ● Biometrics of the user, such as their fingerprint, Iris pattern, voice pattern or facial geometry. ● Or a collection of parameters the

authentication system gathers with fraud or behavioral intelligence. It may consider characteristics of the device itself, such as type of phone, browser, etc., geographic location, or unique characteristics of the user, such as keystroke patterns, typing rhythm, etc. From a mobile perspective, there are three possible elements to authentication. The first is authenticating to the device – for example, when a user turns on their phone and punches in a PIN to start using it; the second is authenticating to access the resources that are either on the mobile device or accessible by that device; and the third element is authenticating to the wallet/ enterprise container. The second element – authenticating to access resources – is where organizations can apply a point of control. They can ensure users authenticate before they can access enterprise resources via their personal phone, tablet, etc. Strong authentication enables organizations to gain higher trust in the identity of their users and then grant appropriate access to VPNs, virtual desktops, Wi-Fi networks or individual enterprise and cloud-based applications, while addressing the potential security risks associated with users bringing their own devices into the corporate environment.

The options for authentication to meet different security, convenience and cost requirements

W

hen looking at protecting access to resources and cloud applications with personal mobile devices, once again it comes down to a balance between cost, convenience and security. There are several approaches that add varying levels of security and introduce

November 2014

20

varying levels of complexity. Organizations should consider the users’ needs, as well as the costs, both capital investments and ongoing operational expenses, to the organization. One option may be that certain users or applications require additional levels of security and differing levels of access, so organizations may end up deploying a variety of authentication methods to appropriately control access. When combined, an organization can achieve a layered approach to mobile authentication that meets both their security and cost requirements and their user’s expectations when using their own mobile device. Some of the authentication options organizations can consider for securing access to corporate resources with personal devices include: ● Static passwords: They simply aren’t enough – they are vulnerable to keystroke loggers, phishing attacks etc., and do nothing to protect against insider threats. ● Hardware token: A device that can be used for multi-factor authentication. Hardware tokens offer strong security, however, the onus is on the user to carry and remember the token, which can negatively impact the user’s experience. When they need to authenticate, they look at the token and plug in the OTP that it has generated to gain access (if the device has a reader, the user may instead put the token in the reader to authenticate). The tokens can increase overall costs for an organization, since they need to purchase, send out, manage and maintain the tokens. Note, sometimes these tokens are delivered as a USB drive, which some phones don’t support. ● Mobile soft token: Delivered as either a standalone application or embedded into an application that

www.indiasafe.com

CMYK


CMYK

21

CMYK


CMYK

white paper

someone develops, the soft token is downloaded by the user to act as an OTP for multi-factor authentication. This may not be as strong as having the keys of the OTP generated on a dedicated, tamper-proof certified chip, however, many have special anti-cloning technology built into them to prevent counterfeiting or cloning the token onto another device. When they need to authenticate to an enterprise resource or cloud application, users simply click on the mobile soft token (app), enter a pin and use the OTP that’s good for approximately a minute to get access. It doesn’t require any hardware, which makes it very simple to deploy and manage and easy for the user to incorporate into their existing workflow. ● SMS message: Acts as an OTP that’s sent over SMS. Similar to delivering the OTP via a mobile soft token, but instead of clicking on an application to get the OTP, the user makes a request and receives an OTP, via an SMS message, which they must then copy and paste into the application. This makes it slightly less convenient for the user than a soft token. It is also less secure, since SMS can be intercepted and doesn’t always arrive at the destination. There is also an ongoing cost associated with sending the SMS messages. ● Secure element-based security tokens: Security mechanism incorporated into the mobile device that enables users to leverage strong credentials. Note, mobile platforms, which have varying levels of maturity, have to be able to either have the secure element already on board (embedded) or have a place to hold the smart chip or microSD, so it can be leveraged for different uses, such

as to authenticate, encrypt, decrypt, sign e-mail, and provide secure physical access and cloud application access. This offers the highest level of security; it’s also convenient for the user, since they can securely do everything they need. It can be costly to purchase, but innovative solutions are on the market that simplify the deployment and ongoing management of secure elements and the credentials they harbor. To date, it’s used mainly by government organizations and regulated industries that need to adhere to standards and regulations.

The requirements for an effective authentication solution to secure mobile access (BYOD)

T

he mobile landscape is changing every day; new devices are introduced and mobile platforms are evolving at such a rapid pace that it is virtually impossible for organizations to keep up. Users are quick to adopt the latest device and bring it into the corporate environment and request access to resources. To effectively enable access via these personal mobile devices, without opening up the organization to unnecessary risks or costs, solutions must deliver:

● Risk reduction – Nothing is going to eliminate the danger posed by the ever-changing, ever-progressing threat landscape; what’s needed is a way to minimize the organization’s exposure to risks introduced by mobile access. ● Strong authentication – two-factor or more, to increase the confidence organizations have in their users’ identity and their ability to grant appropriate access from their mobile devices. ● Differing levels of access – based on the risks associated with different types of users and the sensitivity of the enterprise resources and cloud applications being accessed via that mobile device. ● Platform control – to accommodate the available mobile platforms, organizations may have in their environment. Organizations should be able to enforce which platforms and what specific version of each platform is allowed to access their networks and applications. For example, an organization might know a specific version of a mobile OS is vulnerable to attacks and could decide not to allow devices with that specific OS version to access network/ resources.

Table BYOD – Strong Authentication Options Option

Option

Security Complexity

Cost

Convenience

Password

Simple password

Low

Low

Low

High

OTP developed in hardware

High

High

High

Hardware Token

Low

Mobile Soft Token

Acts as an OTP delivered via an application

Medium

Low

Low

Medium

SMS Message

Acts as an OTP delivered via an SMS message

Low/ Medium

Low

Low

Medium

Secure Element

SIM, embedded Smart chip, or Smart microSD that’s installed on the phone

High

High

High

High

November 2014

22

www.indiasafe.com

CMYK


CMYK

Avigilon saw a 2014-Mar-14 03:04:52.196 AM

attempting to 2014-Mar-14 03:04:52.196 AM

at warehouse 2014-Mar-14 03:04:52.196 AM

while analogue saw CAM1 2014-MAR-14 3:04:52 AM

Only our high-definition surveillance solutions give you the full story. Get the image detail you need to reduce break-ins and keep inventory secure with an Avigilon end-to-end solution. Our broad range of cameras lets you monitor multiple interior and exterior environments to provide you maximum coverage even in the absence of security personnel. Learn more about the benefits of Avigilon’s end-to-end solutions at avigilon.com/endtoend

Avigilon_FullStory_DLevel_D0224_Factory_21X27.indd 1

23

CMYK

2014-09-15 2:48 PM


CMYK

white paper

● Rapid and targeted response – In the event a security incident occurs, organizations must have the tools and means to quickly and easily respond to that incident in a targeted fashion that does not impact the users unaffected by the incident. For instance, they should be able to bar access from a particular device or version of applications/software that have been deemed a high risk, perhaps from a specific vulnerability. ● Manageability – the solution should be easy to get up and running, without adding unnecessary complexity or costs. Ideally, it would enable organizations to have a consolidated view that simplifies the credential issuance and on-going management to support a consistent security stance. For example, it should be easy to identify and revoke credentials so

the organization doesn’t have an active credential for an employee who has left the company. Versatility – The solution should be versatile and scalable, so organizations can satisfy their different requirements. It should support: ● Multiple authentication methods – To balance an organization’s cost and security requirements, the solution should be flexible enough to support different authentication methods for different users, resources and cloudbased applications. ● Best-of-breed standards-based technology – In the quickly evolving mobile landscape, organizations want a solution from a vendor that has a history of innovating to find solutions to tough problems. The solution should embrace standards so organizations can deploy technologies as they are available, without How authenticating to cloud Applicahaving to rely on the timeline tions works of any one vendor. The organization can use HID Global’s ActivID® so● Wide platform support – lutions to deploy a variety of authentication methods, while keeping the user experience simple and With BYOD, it’s a wide open limiting security risks associated with bring your field; users can be using all own device (BYOD). For example, a user can go to sorts of devices, with differthe app store, download the soft token app (or the organization can push it out) to start the registration ent operating systems and process with ActivID. different versions of those The organization’s administrator then sends an operating systems, from a e-mail with multiple codes that the user inputs to variety of vendors. What orreceive validation they have been bound to that deganizations need is a solution vice in the system. The user can then authenticate to secure access from that device to the enterprise that can be applied across the network and/ or cloud applications. spectrum of mobile devices For example, the ActivID Appliance will use secuto ensure access controls can rity assertion markup language (SAML) to work with be consistently applied in a Salesforce.com; when the user wants to access Salesforce.com they automatically get rerouted to way that’s simple to manage. the appliance, where they must use their credential ● User convenience – the to authenticate in and get access. That SAML ticket solution shouldn’t disrupt can be used by other cloud or enterprise applications to grant access – the applications accept the workflows or cause undue ticket because they know the user has been validelay to the enterprise and dated. This authentication federation is a secure, cloud-based applications simple mechanism that makes it easy and convenient for users to access resources via their mobile users need to conduct their devices as needed. business. November 2014

24

HID Global’s approach to mobile authentication – comprehensive, flexible and secure options

W

ith HID Global, organizations can establish trust in their users’ identities when they are accessing resources from their mobile devices and then manage that access to protect their enterprise and cloud applications. HID Global, worldwide leader in secure identity solutions, has a long history of providing innovative, comprehensive identity assurance solutions that meet an organization’s security and cost requirements, as well as their users’ expectations. Depending on the organization’s business needs, the solution offering could be one or a combination of products from HID Global’s Identity Assurance portfolio. HID Global offers a breadth of authentication and credential management products and has issued more than 20 million credentials worldwide. The portfolio includes: ● HID Global’s mobile soft tokens and SDK (HID Global’s ActivID® Tokens) – the soft tokens can be pushed out over the network and quickly downloaded by users (or downloaded from an app store). Users can simply generate a one-time password (OTP) when they want to connect via their mobile device to corporate resources. HID Global’s Mobile Soft Tokens are available on leading handset operating systems, including RIM BlackBerry®, Apple® iOS (for iPhone® and iPad), Google Android, Windows Mobile, and many other Java 2 Platform, Micro Edition (J2ME) enabled devices, and come with replacement for life with a current maintenance

www.indiasafe.com

CMYK


CMYK

white paper

contract. Organizations can also use HID Global’s Mobile Soft Token SDK, which can be embedded directly into the mobile application, such as a mobile banking app offered by a retail bank. ● HID Global’s ActivClient™ Mobile – Middleware that leverages a local phone secure element, which can be a Smart microSD, embedded smart chip or even the SIM or an existing issued smart card (e.g., PIV, PIVI, CIV cards), inserted into the phone, via an attached reader (for example in form of a sleeve), to provide the highest Levels of Assurance (LoA 4) for security services, from strong authentication and non-repudiation to digital signature and encryption services. Supports HID Global’s FIPS-certified applets that provide trusted government grade components of a PIV card ‘on the phone.’ For example, users can have secure, digitally signed e-mail on their phone – the ActivClient acts as middleware, enabling the organization to exploit the security functionality on the secure element. It interfaces with HID Global’s Applets on the secure element to leverage publicprivate key credentials, making it easy to use public key infrastructure (PKI) for secure e-mail. Because the mechanism is within the phone, there is no need to tether or pair a smart card reader with the device, making it far more convenient for the user and less complicated for the organization. ● Strategic alliance with good technology – delivers an array of new government strength, mobile enterprise collaboration, messaging and management solutions for the iOS

and Android platforms. The solutions couple the existing governmentgrade security capabilities of Good for Enterprise™ and Good for Government™ with the strong authentication technology of HID Global’s ActivClient® Mobile middleware. They make it easier for regulated industries, government employees and the companies that support them to gain access to pertinent applications using their mobile device, while maintaining the necessary security levels required by the organization. The solution helps compartmentalize access to resources from the mobile phone, specifically for BYOD scenarios, to mitigate risk. ● HID Global’s ActivID Credential Management System (CMS) – provides a complete, flexible solution to enable organizations to easily manage the issuance and administration requirements of successful authentication deployments. Organizations can issue and manage secure elements, smart cards, smart USB tokens etc., that can be used to authenticate to applications from mobile devices. The ActivID system provides over-the-air lifecycle management capabilities to enable locking the secure element (and all related certificates and keys) while the phone is in the field; self-service capabilities enable a user to unlock a locked PIN or receive a new credential (for example a new PKI certificate and related private key) while in the field, without having to return to a service desk. It delivers full, tamper-evident audit features that log all event activities for reporting, with unique, patented secure post-issuance update capabilities to help keep the organizaNovember 2014

25

tion’s authentication solution in force. Web-based self-service and help desk administration reduce the operational costs associated with the ongoing management and maintenance of the solution. ● HID Global’s ActivID authentication appliance – provides versatile strong authentication, including outof-band SMS Message Authentication, for users accessing a wide range of applications, such as VPN remote access, virtual desktops, terminal services, and private and public HID Global’s ActivID Versatility At-a-Glance ● Device support: smartphones, tablets, laptops, and other devices. ● Authentication methods: OTP hard tokens and soft tokens, smart cards (PKI), device IDs, adaptive authentication, fraud detection mechanisms, and Out-of-Band SMS, or e-mail OTP mechanisms for transaction level authentication. ● Applications: Business, Cloud etc., – such as Windows, Salesforce. com, SAP, Oracle, and Google Apps.

clouds. Through a single appliance, HID Global supports a multitude of authentication methods to protect the organization’s data, network and reputation assets. ActivID allows the organization to tailor authentication methods to the needs of specific groups of users, providing each the right balance of security, cost and convenience to meet business objectives. Templates and easy-to-define policies enable organizations to be as specific as they want, limiting access to particular devices within a particular area or looking at the role of the user (such as whether they are a CEO or a marketing manager) and determining what credential to provision and how to handle their access.

www.indiasafe.com

CMYK


CMYK

white paper

HID Global increases productivity by securely authenticating users remotely via their preferred smartphone, browser or computer through a variety of devices and authentication methods. The ActivID Appliance supports the broadest choice of authentication methods, from strong passwords to certificate-based authentication, including two-factor, OATH standards-based hardware tokens, soft tokens, and SMS Outof-Band OTP options. The ActivID Appliance reduces costs with easy installation, worry-free tokens that last up to eight years, and simple integration into the existing network infrastructure. HID Global’s advanced ActivID Threat Detection Service is a unique cloud-based device identification and global fraud network intelligence service that enables organizations to effectively add fraudpreventative measures to their existing authentication systems. The real-time device profiling and mobile location services can be used to provide an added confidence factor. With more than 300 live customers, 1.2 million new devices and 1.3 million transactions profiled daily, organizations have visibility into significant changes in the threat landscape to combat sophisticated cyber criminals and prevent online fraud. The ActivID Threat Detection Service gives them the ability to detect and block access from compromised or fraudulent computers; instantly identify stolen passwords, lock accounts and notify legitimate users of the need to change their password; and prevent fraudulent and other potentially high risk access.

ActivID CMS At-a-Glance ● Authentication devices: from smart cards and USB tokens to secure elements on mobile phones. ● Data: static passwords, biometrics and demographic data. ● Applets: OTP applications and PIV applets. ● Digital credentials: including PKI certificates through their entire lifecycle.

With HID Global, organizations can reap the benefits of secure mobile access, including access from personal devices

W

ith a long history in the identity and credentialing space, HID Global is able to provide organizations all the pieces they need to secure mobile access – from the credential management system and validation platform to the soft tokens and chips (and even on the phone or readers, if needed). HID Global protects the online banking and access to sensitive corporate and cloud applications of millions of users, across financial institutions, healthcare organizations, enterprises and government agencies; HID global is the partner of choice for the full range of customers’ identity assurance and strong authentication needs. The company brings this experience to the nascent, everevolving mobile landscape to can help organizations embrace mobility in a successful manner. With HID Global, companies can: ● Decrease risk – enable users to securely connect with their mobile devices, via robust multi-factor authentication that inhibits breaches and protect enterprise resources and cloud applications. Meet mandates to use strong authentication for moNovember 2014

26

bile access and ensure it is not the weak link in the organization’s security stance. ● Reduce costs – with versatile, multi-layered authentication technologies, organizations have what they need to secure smartphone, iPad, laptop and other mobile access to VPNs, Web portals and cloud applications. Centralized management simplifies processes, reduces paperwork and streamlines the overall operations associated with the organization’s identity assurance solution. The broad range of options enables organizations to choose the best solution for their different needs, eliminating the unnecessary costs associated with a ‘one size fits all’ solution. Organizations can choose the level of security they need for their different users, enterprise resources and applications and easily scale their deployments as their needs change. ● Improve control – employ a fully interoperable OATH-standards-based authentication solution to ensure users can securely access what they need to conduct business via their mobile devices. Easy to define security policies and business processes make is simple for organizations to issue and manage credentials and deliver varying levels of authentication for different resources and cloud applications to match the cost, security and complexity requirements of the business. ● Deliver user convenience – ensure users have the access they need, when they need it from wherever they are to maximize productivity. The easy to use solutions add security in a seamless way, without unnecessary disruptions to workflows.

www.indiasafe.com

CMYK


CMYK

27

CMYK


CMYK

WHITE PAPER

14 Best Practices for

Building Video Surveillance Networks By Subhasish Gupta – Country Manager, India & SAARC, Allied Telesis

Introduction

T

he shift from analog to Internet Protocol (IP) surveillance cameras has changed the way that video surveillance systems are built. Instead of running lengths of coax cable from multiplexers out to cameras, an IP-based surveillance system involves plugging the cameras into an Ethernet Local Area Network (LAN). There are numerous benefits to using an IP-based system, including simplified cabling, power reticulation over the cabling, native digital video, and greater camera control. Taking full advantage of these benefits requires making the right choices in the configuration of the underlying Ethernet LAN. In addition, using an Ethernet LAN presents its own challenges, as it is a significantly more intelligent and dynamic environment than a collection of coax cables. In order to maximize system capabilities and avoid potential pitfalls, installers need to have an understanding of the best practices in configuring Ethernet network infrastructure within a video surveillance system. This white paper explains the 14 best practice guidelines. These guidelines have been honed through the many years of experience that Allied Telesis have in working with customers to create robust, high performance video surveillance networks.

Allied Telesis equipment is used in successful surveillance networks all over the world. Examples include: ● City-wide installations comprising thousands of cameras. ● Systems operating in harsh railwaynetwork environments. ● Prison surveillance systems. ● Security networks for major international sporting events. ● Smaller installations in malls, schools, offices, hospitals, and more. The best practices listed here fall into four broad areas. Each has a core motivation or ‘goal’: ● Goal 1: Minimize data loss. ● Goal 2: Maintain security. ● Goal 3: Maximize flexibility. ● Goal 4: Future-proof the network. Each of these four goals has a brief introduction, explaining its significance to video surveillance systems, which is then followed by the individual pieces of advice or ‘tips’ that fall within the goal. There are 14 tips altogether, which if followed, lead to the best possible video surveillance solutions. Excellent outcomes are achieved by getting the details right at every level. The goals and tips range across all aspects of network design, from where to locate switches, right down to the finer details of protocol configuration. November 2014

28

Goal 1: Minimize data loss

I

n a traditional IP network – be it the Internet or a corporate LAN – the loss of some data packets, or even a brief outage, are recoverable events. Certainly, an outage of an e-commerce website can be expensive in terms of lost sales, but a brief outage will typically result in just a small blip in the overall sales figures. However, for a video surveillance network, even a brief outage at the wrong moment can mean failing to record the vital evidence that catches a criminal, or failing to alert security personnel in time to prevent a criminal act. With real-time video capture, there is no second chance. Once a particular moment in time has passed, there is no going back to record it again. One of the prime motivations for installing video surveillance systems is that they provide 24/7 vigilance, so lost data or network outages undermine a primary purpose of the system. The goal of minimizing data loss is therefore a driving principle in the design of video surveillance networks. This goal can be achieved in the following five ways:

Tip 1 – Protect the switches

W

hile video cameras must often be installed in exposed locations, the switches shouldn’t have to be. Wherever

www.indiasafe.com

CMYK


CMYK

white paper

possible, locate switches in places that are protected from environmental and human harm. Cameras can be up to 100 meters away from their associated switches, which provides plenty of scope for finding or building a secure, protected housing for switching equipment.

Tip 2 – Double up on data paths

T

he single most likely point of failure in a data network is the cabling. This is particularly so in a network that extends over some miles, or when data cabling runs along with other utilities like water, electricity, or telephone lines. Work on one utility’s infrastructure is notorious for causing outages to other utilities. Using resilient ring network design, and/ or using aggregated links that follow separate paths, enormously reduces the risk of outages due to cable damage.

Tip 3 – double up on power supply

T

he second most likely point of failure in a data network is in the power supply. Within switching equipment, the power supply unit runs at the highest temperature, and is statistically the most likely component to fail. Moreover, the reticulation of power to the switching equipment is vulnerable to interruption. Using switching equipment that supports dual Power Supply Units (PSUs), and installing two PSUs, guards against PSU failure. If the PSUs are hot-swappable, then the recovery from a failed PSU is completely non-disruptive – the replacement of the failed PSU can be carried out while the switch continues uninterrupted operation powered by the remaining PSU. Power reticulation failure can be guarded against by connecting a switch’s two PSUs to independent power sources, if they are available.

Tip 4 – guard against network storms

I

f Ethernet packets have an unblocked loop to circulate around, then they will – endlessly, at very high data rates. Packets endlessly storming around in circles can grind normal network operation to a halt. So, correct configuration of the network, using a robust ring resiliency protocol between the switches, and spanning tree or loop protection at the edge, are essential. If spanning tree is being used at the edge, then it is vital that spanning tree edge-port status is set on the edge ports, to prevent disruptive flushing of forwarding tables when ports link up.

Tip 5 – treat the cameras with care

T

his does not mean taking physical care with the cameras, although that is also a good idea. Rather, it is important to take care not to overload the cameras’ processors. By necessity, to keep costs and power consumption down, video surveillance cameras use Central Processing Unit (CPU) processors of modest capacity. The task of processing incoming image data, and pumping it out as IP data, will typically consume most of the power of a camera’s CPU. If a camera has the additional load of examining and processing unnecessary IP data coming into it off the network, then that can overload the CPU, causing deterioration of the quality of the video it is feeding into the network. Switches need to be configured so that they only send the required bare minimum of packets to the cameras. This can be achieved by: ● Avoiding flooding of multicast data, by never disabling Internet Group Management Protocol (IGMP) Snooping on switches. ● Avoiding flooding of multicast data by configuring edge switches to not November 2014

29

periodically age entries out of their forwarding tables. Edge switches have only a small number of video streams to forward – typically, one per connected camera – so they are operating well within the capacity of their forwarding tables. Moreover, the video streams they are forwarding do not change dynamically, as they are just regularly servicing the same set of connected cameras. Edge switches should therefore be put into a mode where they maintain permanent forwarding-table entries for all the video streams they are forwarding, rather than the default behaviour of treating all entries as potentially stale, and periodically aging them out in case table space is required for newly-added video streams. The periodic age-outs of the streams are invariably accompanied by brief bursts of video data flooded in all directions – most notably towards other cameras. ● Preventing multicast protocol signaling packets from being sent to cameras. IP multicast protocols use signaling packets to discover where video streams need to be forwarded to. The signaling packets are sent regularly, to maintain forwarding states, and are usually repeated once or twice, to make sure they get through. By default, these signaling messages are sent in all directions, as the protocol does not inherently know where receivers of video streams are located. This level of signaling chatter can be disruptive to the busy CPUs in cameras. Also, the signaling messages relating to video streams never need to be sent to cameras, as the cameras never need to receive video streams. So, in a video surveillance network,

www.indiasafe.com

CMYK


CMYK

white paper

switches should be configured to suppress the sending of unnecessary signaling messages to cameras.

Goal 2: Maintain security

A

n Ethernet network, unlike a collection of analog video cables, is an intelligent data network. This means it is a potential point of entry for those who wish to gain entry to an organization’s data network for malicious purposes. Video surveillance cameras are by necessity often installed in publically accessible locations. Therefore, their data connections present publically accessible opportunities for connecting into a data network. Unplugging a camera, and replacing it with a Wi-Fi access point, provides a criminal with the opportunity to steal data, or to launch Denial of Service (DoS) attacks to create a diversion or otherwise disrupt the surveillance network whilst a crime is being carried out. Therefore, the switch ports that cameras are attached to should be afforded the highest level of protection. This goal can be achieved in the following three ways:

Tip 6 – configure highsecurity authentication on all camera-connected ports

T

he best protection against malicious entry into the network via a camera’s data connection is to use port authentication. Switch ports should be set up to never allow data exchange with a connected device until that device has provided authentication credentials that have been verified by the network’s authentication server. Cameras support high-security authentication via encrypted digital certificates, which, unlike simple password authentication, cannot be guessed or discovered by data eavesdropping.

Tip 7 – configure switches to send alarm messages if cameras are ever unplugged

S

tandard network management protocols provide alarm messages that are sent upon port state change (ports being plugged or unplugged). Network Management Stations receive and display these alarms – immediately alerting staff to any attempt to tamper with camera connections.

Tip 8 – ensure that any switch ports to which cameras have not yet been attached are shut down

A

ny ports that are not in use need to be shut down, so there is no chance of them being hijacked in any way.

Goal 3: Maximize flexibility

N

etwork needs change over time. Networks expand, organizations merge, services evolve, facilities move to new locations. So the network design needs to be adaptable, and easy to rearrange.

Tip 9 – use multicast

V

ideo streams can be sent by unicast or by multicast. A unicast system is simpler to set up initially, and involves less protocol interactions than a multicast system. However, a unicast video surveillance network suffers from inflexibility in terms of where video streams can be directed to. The very nature of unicast data transmission is that the data is sent to only one destination. If video streams are to be viewed in one location, and recorded in another, then a process needs to be devised whereby either the recording or monitoring system will retransmit November 2014

30

streams to the other location. If the streams need to go to yet another location, for secondary monitoring or for recording onto a backup server, then the streams need to be retransmitted twice – and again for any subsequent locations. Multicast data is inherently capable of being delivered to multiple destinations. For a new device to begin receiving streams, it simply has to participate in the network’s multicast signalling protocol, and start requesting the streams. The network automatically replicates the streams and begins delivering new copies to the new location. A system based on multicast transmission is particularly able to accommodate dynamic redirection of video streams. For example, a multicast system can easily provide the ability to deliver video streams to particular monitoring stations in real time, in reaction to specific events.

Tip 10 – employ an intelligent network management framework

F

or a network to be flexible and adaptable, it must be able to roll out new features and new configurations across the network with a minimum of disruption. For any but the smallest of networks, performing network-wide tasks like upgrading software, improving security configuration, altering protocol settings or turning on new features can be problematic. These processes can be time consuming, error prone and disruptive. Using an intelligent network management framework like Allied Telesis Management Framework (AMF) enables the automation of network-wide tasks – saving time, and eliminating errors. The network can then be adapted to changing needs in an efficient, lowrisk manner.

www.indiasafe.com

CMYK


CMYK

white paper

AMF also simplifies or automates other routine tasks, for example applying configuration to new or replacement switches, backing up configurations, collecting network-wide stats, and many more.

Tip 11 – use a backbone design that supports multiple head-ends

W

hilst a network may initially be installed with just one core location for data recording and network management, disaster recovery requirements can drive the need to mirror the core to 2 or more sites. If the network design does not consider head-end mirroring right from the start, then attempting to fit this into the network at a later date can prove very difficult, and require major network redesign. Basing the network design on a resilient core ring, or a long distance clustered-switch backbone technology like Allied Telesis Long Distance Virtual Chassis Stacking (VCStack-LD), facilitates a smooth integration of mirrored head-end locations.

Goal 4: Future proof the network

F

lexible design facilitates the simple rearrangement of physical topology, the dynamic re-routing of traffic, reconfiguration of existing technologies, and much more. Better still is to also have a network that is well positioned to take advantage of new technical advances. It is highly desirable to be able to take advantage of new camera capabilities as they arrive, without needing to replace the Ethernet infrastructure.

Tip 12 – deploy PoE+

P

ower over Ethernet (PoE) has greatly simplified the process of installing video cameras. As the camera’s power is

delivered via the data cable, there is no need to run a separate power feed to the camera. Once the data cable is in place, the camera can be installed, and begin operation immediately. The original PoE standard provides 15 watts of power over an Ethernet cable. However, the capabilities built into video cameras have advanced over time. Zoom, pan and tilt actions have been enhanced; demisters and lens wipers have been added, and more. 15 watts is no longer enough to power all these features. Hence, a higher-power standard, referred to as PoE+ has been defined which provides 30 watts of power. As cameras continue to become yet more capable, PoE will become obsolete, and PoE+ will increasingly be the minimum expected standard. Even if a network does not need PoE+ today, it makes sense to install PoE+ capable switches, to provide an infrastructure that will support these enhancements for years to come.

Tip 13 – don’t skimp on bandwidth

T

he resolution of video images increases exponentially. The higher the resolution, the more information human and electronic analyzers have to work with. But, higher resolution images mean higher data rates. A future-proof network needs to have plenty of bandwidth. A 1 gigabit uplink from a switch connecting 48 cameras might be enough today, but may well be inadequate within a few years. Bandwidth should be provisioned to allow for up to a 5-fold increase in bandwidth requirements within the installation’s lifetime.

Tip 14 – be ready for IPv6

A

lthough the majority of video surveillance equipment in use to-

November 2014

31

day uses IPv4, the world is inexorably moving to IPv6. As more of the applications associated with video surveillance, such as sending feeds to mobile devices, operate over IPv6 there will be increasing momentum towards using IPv6 natively within video surveillance networks. Governments are also beginning to mandate the use of IPv6 in public sector networking systems. Installing an IPv6-capable infrastructure now enables a pain-free transition to IPv6 when the time comes.

Summary

V

ideo surveillance networks have their own set of specific requirements, as any type of network does. Understanding these requirements, and following best practices in satisfying those requirements, are at the heart of installing reliable, efficient and long-lived IP surveillance systems. Allied Telesis have the equipment, the technology, and the expertise to design and create the very best video surveillance solutions. Allied Telesis have been at the very forefront of IP video surveillance from the beginning. The scale, the range, and the proven reliability of video surveillance networks that have been created using Allied Telesis equipment, and Allied Telesis design consultancy, are a testament to Allied Telesis’ leadership in this field. Founded in 1987, and with offices worldwide, Allied Telesis is a leading provider of networking infrastructure and flexible, interoperable network solutions. The Company provides reliable video, voice and data network solutions to clients in multiple markets including government, healthcare, defense, education, retail, hospitality, and network service providers.

www.indiasafe.com

CMYK


CMYK

32

CMYK


33-34 ART CARD-I FRONT INFINOVA


35-36 ART CARD-I BACK ADIT


CMYK

CE certified products An ISO 9001:2008 company

Always a step ahead

7500+ Customer Base

400+ Channel Partners

10 Distribution Centers

HID Connect Partner

Inhouse Development

Time & Attendance

Access Control

Canteen Management

/CLOCK

BUZ CTRL

LED CTRL

/CLOCK

TA M P E R

12V

GND

BUZ CTRL

D 0 / D ATA

D1

LED CTRL

/CLOCK

GND GPI2 GND GND

/CLOCK

GPI4

D 0 / D ATA

GND

GND 12V

GPI5 GND GND

LED CTRL

GPI7

/CLOCK

D 0 / D ATA

GND

GND

GPI8

1

2

abc

LED CTRL

4

/CLOCK

GND 12V

jkl

7

TA M P E R RD8 - OUT4

5

ghi

D 0 / D ATA

BUZ CTRL

3

ESC

6

0

GND GND

tuv

SW1 GND SW2 SW3 SW4

9

8

pqrs

GND

def

mno

GND

ENT

wxyz

DOTL1 GND

LED CTRL D1

DOTL2

/CLOCK

GND

D 0 / D ATA

DOTL3

GND

DOTL

RD7 - IN4

BUZ CTRL D1

SWITCH

12V TA M P E R

GPI2

GPI6

BUZ CTRL

[

RD6 - OUT3

TA M P E R

D1

Enterprise Payroll Software

GPI1

GPI3

LED CTRL D1

Enterprise Attendance Software

Visitor Management

ETHERNET

RD1 - IN1 TA M P E R

GND

12V

D 0 / D ATA

D1

/CLOCK

TA M P E R

GND

12V

RD5 - IN3

RD2 - OUT1

BUZ CTRL

LED CTRL

GND

D 0 / D ATA

D1

12V

BUZ CTRL

TA M P E R

LED CTRL

D1

D 0 / D ATA

BUZ CTRL

Door Interlocking

GPI1

RD3 - IN2

RD4 - OUT2

TA M P E R

Elevator Control

GND

12V

DOTL4

LOCK1

LOCK2

LOCK4

GPO2

GPO3

NC

CO

NO

NC

CO

NO

NC

CO

NC

GPO1

NO

CO

NO

NC

CO

NC

LOCK3

NO

CO

NO

NC

CO

NO

NC

CO

12V

GND

NO

GND

PWR

GPO4

Quality Assurance

Reliable Support

Customizable Solutions

To learn more about Spectra :- Call : 079-40066004, Email : sales@spectra-vision.com, Visit us : www.spectra-vision.com Visit us at IFSEC India 2014: 11-13 December 2014, Pragati Maidan, New Delhi, India [Hall-11, Booth-C100] 37

CMYK


CMYK

NATIONAL ROUNDUP

Cisco Unveils ‘Cisco Smart City' As Model for Digital India; Marks Next Phase of Expansion in India Internet of Everything-powered Globalisation Centre East campus demonstrates how citizens can live, work, play and learn in a Digital India

I

n line with its commitment to collaborate with the government in its vision of a Digital India, Cisco has announced the ‘Cisco Smart City' as a blueprint for the future of smart and connected communities in India. The Cisco Smart City, unveiled along with the announcement of the next phase of the company's India site, symbolizes what the digitization of a country means for the future of work, education, healthcare and the electronic delivery of citizen services. R Chandrashekhar, President, The National Association of Software and Service Companies (NASSCOM); Srivatsa Krishna, Secretary to the Government Dept. of Information Technology, Biotechnology and Science & Technology, Government of Karnataka; Cisco's Executive Vice President for Industry Solutions and Chief Globalisation Officer, Wim Elfrink and President, Cisco India & SAARC, Dinesh Malkani inaugurated the Cisco Smart City.

As part of the inauguration, Cisco demonstrated the possibilities of the government's Digital India program where infrastructure would be offered as a utility to every citizen, governance and services would be on demand and citizens would be digitally empowered. Using the Internet of Everything, Cisco showcased how connected education, connected healthcare, smart buildings, connected transport and smart parking can transform the way cities and communities are designed, built and renewed to ensure economic, social and environmental sustainability. Spread over 2.6 million square feet, and designed as a campus-as-a-city for thousands of Cisco employees to work, play and learn, the Cisco Smart City is a spectacular showcase of how a pervasive physical network infrastructure can easily connect to devices (such as sensors, information access points and mobile devices) and with a high degree of security. The Cisco Smart City also demonstrated how intelligent networks

“We are very excited about the government's vision of a Digital India and the creation of smart cities. We want to collaborate with the government on its vision of digitally empowered citizens and believe that the Cisco Smart City is a great showcase of how the government can deliver governance and services to citizens digitally, build broadband highways, enable digital inclusion and deliver information for all. The foundation for a Digital India will be intelligent networks which will transform the delivery of citizen services from transportation, utilities and security to entertainment, education, and healthcare. The Cisco Smart City and the announcement of the next phase of our expansion of the Cisco India site underline our commitment to deepening our presence in India and helping transform the way citizens in a Digital India will live, work, play and learn.” – Dinesh Malkani President, Cisco India and SAARC November 2014

38

could enable digitally empowered citizens through the availability of government services in real time, online and on mobile platforms. During the launch, Cisco highlighted its collaboration globally with smart cities such as Barcelona, Spain, and showcased how Cisco and Barcelona Council have helped transform the city into a blueprint for sustainable urban development. The city of Canberra, the capital city of Australia, described the role of Cisco's technologies in achieving the city's digital strategy. The faculty and the students of R.V. College of Engineering in Bangalore displayed the role of technology, in the future of education, by showing how two-way video communications can broaden classroom experiences allowing students from any location to be connected in real-time with teachers, experts and other students. Based on Cisco's larger vision of Smart+Connected Communities™ which enables transformation of physical communities into connected communities, today the company's roster of 90 global greenfield and brownfield Smart+Connected Communities projects include the Delhi-Mumbai Industrial Corridor in India, where Cisco is developing the ICT master plan for four pilot cities in the $90 billion flagship public sector infrastructure project. In 2013, CII & Cisco released a report titled ‘Smart City in Indian Context' which stated that India faced a

www.indiasafe.com

CMYK


CMYK

National Roundup

shortage of 600,000 doctors, 1 million nurses and 1.2 million teachers in government schools. The Digital India program of the government is focused on the digital empowerment of citizens by enabling broadband in villages, universal phone connectivity, public internet access points, public Wi-Fi in schools and universities, digital inclusion, electronic delivery of governance and services, and job creation. Cisco's Smart City is a glimpse into the future of what will be possible in a Digital India. The Cisco Smart City, with LEED® Platinum Certified buildings, has also been designed to showcase the future of work – a future that is not just about connected devices, but also about when and where people work, and how companies can foster creativity, collaboration and productivity in the workplace. The Cisco Smart City allows the company's employees, customers and partners to experience what's possible when you realize the true potential of the Internet of Everything and digitize companies, cities and countries. IoE technologies showcased at the Cisco Smart City include the following: ● Smart Parking: Cities and companies can manage parking and increase revenue with the ability to offer real-time availability of parking spots, guide drivers to open parking spots and change pricing based on demand. Smart parking

“Rapid urbanisation brings with it a new set of challenges. More so, when the current infrastructure likes transportation, power, water and waste management are already overburdened. Technology will play an integral and key role in addressing these challenges. This presents new vistas of opportunity for the entire IT ecosystem and an opportunity to work cohesively with the government to help transform India. Cisco's Smart City is a great working example of how technology companies can help the government better appreciate and leverage the role of technology in tackling these infrastructure challenges and help realize its larger vision of a Digital India.” – R Chandrashekhar President, The National Association of Software and Service Companies (NASSCOM) solutions can help cities reduce the estimated 30% of urban traffic caused by motorists looking for parking. ● Smart Buildings: Smart buildings are built and operated, monitored and controlled for reduced energy and water consumption, reduced carbon emissions, lower costs and a better work environment. Smart building solutions can help cities, companies and citizens reduce the estimated 40% of energy consumed by buildings worldwide. ● Remote Expert: Cisco® Remote Expert Smart Solution transforms how services such as healthcare, citizen services, retail or banking can be delivered through a superior, on-demand video collaboration experience – an immersive, lifelike experience between the user and subject matter experts wherever they may be located. Remote Ex-

“Cisco has been a longstanding leader of the global green building movement and USGBC applauds their efforts to work with Prime Minister, Shri Narendra Modi and his bold and forward-thinking plan to build 100 smart cities in India. Here in India, all Cisco's buildings have gone on to pursue LEED Platinum, our highest level of achievement. They are a natural partner to work with the new government towards creating world-class, highly-performing cities that deliver value to its citizens and to the planet.” – Gopalakrishnan P Director & Head- Asia Pacific and Middle East, U.S. Green Building Council November 2014

39

pert can be delivered in real time, anytime, anyplace, and on any device. ● Connected Learning: Education is fundamentally a collaborative, interactive endeavor. Cities, companies and educational institutions can use connected learning solutions to improve access to education beyond local resources by using network-based collaboration technologies to improve student outcomes, increase efficiency, enhance safety and security, and expand research capabilities. ● Smart Work Spaces: Smart Meeting Spaces is a solution to enable employees to collaborate together anywhere, anytime instantly. The Smart Personalized Spaces solution makes work spaces available for employees when and where they need it, on demand. According to a global industry study by Cisco, 66 percent of employees desire work flexibility while 60 percent of employees believe they do not need to be in the office to be productive. Smart Work Space solutions accommodate and attract a new generation of workers, facilitate creativity and collaboration, and enhance overall effectiveness and efficiency.

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

Oncam Grandeye Opens Office in Delhi Introduces its leading 360-degree technology to local dignitaries and more than 120 businesses

O

ncam Grandeye, the security division of Oncam Technologies, formally launched its regional office in India at an event held on 14 October at the British High Commissioner’s residence in Delhi. The following day, representatives from more than 120 leading businesses as well as local dignitaries attended a technology seminar which

Minister Modi has encouraged international businesses to engage with India. U.K. businesses like Oncam are doing this in significant numbers.” India is experiencing a technology boom comparable to Silicon Valley. With 1.2 billion inhabitants, India is the 10th largest economy in the world relative to its GDP. Companies worldwide are actively introducing tech“Oncam Grandeye benefits its endnologies, injecting cash users with its unique 360 degree and creating new comview camera that provides images panies – lots of them. both in live and recorded mode According to a February with a 360 degree view. It thus acts 2014 report by SeedStar, as a strong forensic tool while innearly 2,500 startups vestigating a security incident.” were born in India, and – Anil Dhawan with nearly 50 percent of Country Head, Oncam Grandeye, India its total population unshowcased Oncam Grandeye’s award- der 47, that trend is certain to continue, helped greatly by an incredibly young winning 360-degree technology. St. John Gould, the British High Com- and savvy tech-oriented workforce. Oncam Grandeye is no stranger to mission Director for UKTI and Prosperity in India said, “Oncam is a great exam- the region. Last month, the company ple of a bright, innovative and advanced launched its new office in Singapore, company bringing British technology to and it has already invested heavily in Inthe global market. Their 360-degree cam- dia by opening a new office in Gurgaon era solutions are used widely in the U.K. and hiring local tech experts; it is already and other countries, and we look forward providing state-of-the-art, 360-degree to seeing their success in India. Prime surveillance for Orphans Village Delhi’s

Firas Bashee CEO and David Hudson Regional President at the launch of Oncam Grandeye at the British High Commission in Delhi, India

November 2014

40

new, purpose-built orphanage, comprising 24 buildings and an integral school. “As we expand into Asia, there is no better country than India for us to launch our new technology,” said Firas Bashee, CEO, of Oncam Technologies, “With one of the fastest growing economies in the world, its critical infrastructure, locational advantage, population, workforce, and one of the most developed higher education systems across the globe, we are excited at the opportunities and the partnerships we can create in India.”

Technical solutions seminar

T

otal Situational Awareness was the seminar’s news focus; a live demonstration powerfully illustrated how 360-degree surveillance, which offers live and retrospective analysis of an entire scene, could provide companies in the region with an efficient and scalable solution to immediately enhance the safety and security of their businesses – be they concerned with critical infrastructure, retail, banking, transport or any number of other sectors. Oncam Grandeye’s innovative and patented 360-degree technology was warmly received; attendees immediately grasped the benefits that the pioneering technology would bring to their companies as the demonstration clearly illustrated why the MGM hotels in Las Vegas – the Aria, MGM Grand, Bellagio and Mirage – as well as subways stores worldwide and Royal Caribbean cruise lines, among other entities, have chosen Oncam’s technology.

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

S

Sparsh Shines at IISE 2014

parsh, a pioneer and leader in manufacturing electronic video surveillance equipment in India held ‘Win a Car’ lucky draw contest in the recently concluded India International Security Expo (IISE) at Pragati Maidan, New Delhi. Launched for the first time by the Security Promotion Group of India (SPGI) to mobilize visitors for IISE 2014, this lucky draw contest was open to business visitors coming to the Expo. The competition was open from 25 to 28 September 2014 and saw massive participation. Participants had to reply to five questions related to Sparsh and SPGI, and drop their forms in the drop box placed at Sparsh’s booth. Guest of Honour Arvind Ranjan, Director General, CISF, drew the coupon and declared Lucknow based Alok Shukla as the lucky winner of the Hyundai i10 car, which was on display for four days, in the presence of eagerly waiting visitors, exhibitors and ITPO officials. ‘Made in India’ pavilion showcasing the products manufactured in India was a highlight of the expo. This year Sparsh launched a smart DVR for smart surveillance, and showcased HDAVI series of HD cameras & recorders for high resolution monitoring with traditional analog cameras, mobile DVR solution for moving vehicles, smart IP solutions and ATM solutions.

Also on display were “This has been another fantastic MEGADIS-1.3 MP senpromotion which has certainly sor camera series, HQIS seen very strong interest and parcamera series for SOHO ticipation from thousands of visisegment, Bravura camtors coming to IISE 2014. This era series for high-end clearly demonstrates Sparsh’s surveillance requirecommitment to turn every cusment, and number plate tomer’s experience into one that reader (NPR) solution. is delightful and more importantly, rewarding.” The booth also – Sanjeev Sehgal showcased the latest line Managing Director, Sparsh of end-to-end solutions for all SME surveillance needs. The range covered all resolution needs from Zsecure IP 1MP to 3MP. The NVR with a unique secure IP offers essential tools for feature that allows it to be used as 8 city surveillance for the protection channel 5 megapixel as well as can sup- of citizens from theft and other crimes. port up-to 32 channel 1.3MP cameras It is also very useful for surveillance of was also on display. public areas. The solution helps to creThe following categories of solu- ate a secure environment by informing tions were also presented: watchers of developing criminal situations. Zsecure range of cameras offers features like on-board storage, heartbeat Transport surveillance parsh showcased cameras and re- keep alive mechanism and analytics on corders specially designed for buses edge like motion detection, audio detecand vehicles. They withstand vibrations, tion etc. shock, and moisture and temperature fluctuations to ensure continuous opera- Bank & ATM solution tion. Mobile DVR comes with inbuilt he strategically located discreet GPS, and with 3G data the vehicle can cameras capture acute details about be monitored centrally. Features like criminals and crime. Also Smart DVR Google map integration enables easy has the capability of alarm integration tracking and shows the actual position which can send alerts on e-mail or SMS, on map. and can raise an audio alarm.

Z

S

T

NUUO Strengthens Presence in India

N

UUO, passionate in providing swift service and support, has been growing exponentially across the

world as ‘Trusted Video Management’ partner. To accelerate this growth and elevate the service experience to the November 2014

41

next level, NUUO in India has added an experienced team member Sivakumar Maruthaiyan on board. Sivakumar

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

lishing and managing their has joined NUUO India technical operations in India. team as ‘Technical ConEarlier, as part of ADI, Siva sultant.’ He carries more was providing customers a than 11 years of experigreat experience in service ence in varied roles of delivery. techno commercial, apSiva holds a Bachelor’s plication support, system degree in electronics and administration etc., in the communication engineerindustry. Sivakumar Maruthaiyan ing and a Master’s degree in Prior to joining Technical Consultant business administration. He NUUO, Siva was working with TOA Electronics India Pvt Ltd, is all set to be a proactive member of the where he played a pivotal role in estab- NUUO family and serve customers to

A

his best. NUUO Inc. is one of the leading global surveillance open platform solutions provider, known for its reliability, prompt service and innovative spirit. NUUO’s NVRs, VMS, CMS, video analytics software and hybrid solutions offer not only comprehensive recording and monitoring for IP cameras, but also an added value in integration with other surveillance and security solutions such as IVS, access control, LPR, POS and others.

Aditya Infotech Awarded at India International Security Expo 2014 police forces of the country. IISE 2014 has been the most visited and popular security show where officials from the state police organizations, paramilitary, coast guard, army, and the Ministry of Home Affairs are facilitated with the opportunities to easily contact the exhibitors and security equipment manufacturers. Stressing on the need to create sync with the latest indigenous technologies, Arvind Ranjan, DG, CISF said that new technology is a force multiplier in terms of detection, investigation and countering threats. An exclusive trial laboratory would be set-up at PraYogesh Dutta receiving the award gati Maidan on

ditya Infotech Ltd has won the prestigious CMD’s award for their comprehensive solutions in security and surveillance category in the recently concluded 17th edition of India International Security Expo 2014, a premier security event organized by India Trade Promotion Organisation (ITPO). The event was organized with the active support of the Ministry of Home Affairs and all paramilitary and state

November 2014

42

“This award is an acknowledgment of our overtime, best efforts and commitment to deliver excellence to all industry segments – the best of services in pre-sales, designing, logistics, sales, services, commissioning and technical support. This has reaffirmed our commitment and endeavor to ensure a better and safer India.” – Yogesh Dutta COO, Aditya Infotech ‘no cost committed basis’ for evaluation of various security gadgets in the practical ground environment. He conveyed his appreciation to ITPO for providing space for the evaluation center. Complementing ITPO and all stakeholders for holding IISE 2014, Vikram Srivastava, Advisor (Police Moderniza-

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

tion), Ministry of Home Affairs, Government of India, pointed out that the event has become more significant, especially when the industry is poised to touch new heights inspired by the ‘Make in India’ vision of the Prime Minister of India. Each year, IISE attracts foreign del-

T

egations looking for cost-effective and state-of-the-art equipment being manufactured in India. The 2014 exposition attracted around 15,000 visitors from India and overseas. Aditya Infotech Ltd. (AIL) – the technology arm of Aditya Group, is

India’s leading security products enterprise, delivering technology driven security and safety solutions with special expertise in electronic video surveillance products and solutions. AIL caters to 6500+ channel partners in more than 300 cities from 45 offices.

Wavesight Helps Overcome CCTV Challenge at Bangalore Turf Club

he Bangalore Race Course (BTC), located in a prime location in Bangalore city is laid out over 85 acres of land. BTC Management wanted to deploy a CCTV surveillance system to cover the race track in full without disturbing the structure of the race course. Recording the behaviour of the horses at the start of every race was also included in the scope of work.

The challenges

B

esides the large area of land that had to be brought under surveillance the different start positions for every race provided the greatest challenges to the system integrator who was appointed to execute the project.

The solution

T

he network deployed used 4 wireless point to point radios from Wavesight allowing the network to operate with minimal interference and over the area of space defined. The wireless

radios optimised for CCTV surveillance also helped transmit D1 quality images. The cameras used in this project were HD megapixel outdoor IP cameras from Dahua. The System Integrator involved was Bangalore based USP Integrated.

Matrix to Showcase its Newly Launched Access Control Solutions at IFSEC India 2014, New Delhi

M

atrix is participating in IFSEC India 2014 and will showcase its complete portfolio of security products encompassing a range of access control, time-attendance and video surveillance

solutions. Matrix will showcase its recently introduced access control panel and readers to enhance security in the organization. COSEC ARC is a unique IP based access November 2014

43

control panel having multiple benefits over conventional access control panel. Being PoE based, it eliminates complex wiring and local power requirements. Its din rail and wall mount option gives flex-

www.indiasafe.com

CMYK


CMYK

National Roundup

ibility to mount even where space is a constraint. “Along with this access control solution, we will also showcase our enterprise grade time-attendance solutions with new features,” said Jatin Desai, Product Manager of Access Control and Time-Attendance Solutions. Enhancing its video surveillance solutions, Matrix will launch SATATYA SAMAS, its Enterprise-grade centralized management software. SATATYA SAMAS is a fully distributed solution

designed for 24x7 video surveillance needs of multi-location, multi-server organizations. It provides features like sequencing, audio-visual alerts, SMS/ e-mail with snapshots notifications, integration with access control, basic intelligent video analytics (IVA), POS etc., for easy central and remote monitoring of organizations. “With successful entry into the SME and LE segment with the recording devices and understanding their require-

ments in detail, the SATATYA SAMAS will provide these enterprises with more security and more productivity, providing them with more opportunity for growth,” said Kaushal Kadakia, Product Manager of Video Surveillance Solutions. “IFSEC India is a great platform where we will be having tremendous opportunity to meet customers, distributors and potential clients,” said Dhruval Vyas, National Sales Manager.

Axis Hosts its Annual Solutions Seminar 2014 for Partners in Ahmedabad and Hyderabad Over 120 partners attended the seminar on Smart Surveillance for various verticals including government, city and education

A

xis Communications hosted its Solution Seminars for 2014 at Ahmedabad and Hyderabad. Held on September 24 and 26 respectively, the seminars witnessed over 120 partners. The core objective of the seminars was to re-connect with the partners and educate them on the recent developments in the company, and update them on the security surveillance trends witnessed in the India market. Through this, the company is expecting to reach out to more potential customers across the market. Reiterating its focus on intelligent solutions for safer and smarter cities, Axis Communications elaborated on the company’s India focus and business priorities. The vertical focus for the Hyderabad event included city surveillance, transportation and government while education, city and critical infrastructure were the focus areas in Ahmedabad. Key products includ-

ing Q6045/35-E, Q1922, Q1765-LE, P1425-LE, P1355-E, P3364-V, P1214, P1428-E, M3024-LVE and M3027PVE were displayed and demonstrated during the seminars. These products are smart and flexible video solutions that meet the fast-changing user expectations for increased and efficient business management. For standardized analytics the surveillance camera can be used for people counting, cross line detection, license plate recognition and facial recognition. Speaking about the outreach, Sudhindra Holla, Country Manager, Axis Communications, India said, “Our core objective is to provide smart and intelligent surveillance solutions to various verticals across the country. With increased focus on developing smart cities in India, we expect a surge in the demand for video surveillance and we believe our partners will help in caterNovember 2014

44

ing to this growing demand. Our annual solutions seminar is ideal for us to reach out to the partners, understand their requirements and talk to them about our plans as well. We owe a major part of our growth to our channel partners and are glad to be associated with them. Through these seminars, we also help our partners in better serving the customers and enable them to create new opportunities.” Axis Communications, which started its Indian operations in August 2007, is a leading provider of network video solutions for professional installations across verticals. The company’s customers in India include the International Airports in Chennai, Delhi and Hyderabad; D.Y. Patil Stadium in Mumbai, ITC Welcome Group Hotels, Café Coffee Day chain and most importantly the Junagadh City surveillance installation in the Gujarat region among others.

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

Securing Maximum Coverage in Full HD with Sony’s Mini-Dome IP Camera SNC-XM631

T

he SNC-XM631 is the latest addition to Sony’s X-Series camera range – part of the company’s 6th generation of video security cameras. The new minidome IP cameras comes with Sony´s high resolution Exmor CMOS sensor, View-DR wide dynamic range technology and eXcellent Dynamic Noise Reduction (XDNR) technology to deliver detail-packed full HD video images even in challenging lighting conditions. This allows the camera to minimize the effects of motion blur, and provide clear images even for moving objects. High quality imaging is assured by the advanced IPELA ENGINE EX™ processing engine that combines powerful signal processing with intelligent video analytics to reduce noise and optimize colour reproduction pixel-by-pixel. As an added intelligence, the DEPA advanced intelligent video analytics also allows user to set the XM631 to trigger an alarm based on rules defined by them. The XM631 is fitted with a wide angle lens of 113° with flexible threeaxis lens adjustment for greater installation flexibility and wider area coverage

F

with fewer cameras, with an option to switch to 83° and 51° lens to cater to different needs. The camera also allows for edge storage, and is powered using PoE (IEEE 802.3af) via a standard RJ-45 connector, further simplifying the installation process and eliminating the need for additional power cables. With changing market needs, the challenge was to develop a product that would allow proprietors to maximize their security coverage of indoor environments while minimizing the cost of ownership. The SNC-XM631 provides the perfect solution with its range of features, and can also be integrated with a range of solutions such as Sony’s CSeries and W-Series to broaden their security coverage. Users can also easily check the viewing angle and video images of the XM631 by remotely accessing the camera through the browser through a smartphone or tablet. Other features include a vandal resistant casing with IK10 rating,

a built-in stabilization to keep images clear amidst vibrations, and a sensor In/Out capability. Ideal for a wide range of indoor security and surveillance environments such as schools, transportation modes, banking and retail markets, the SNC-XM631 is now available in India. Sony India is one of the most recognized consumer electronics brand in the country, with a reputation for new age technology, digital concepts and excellent after sales service. In India, Sony has its footprint across all major towns and cities in the country through a distribution network comprising over 20,000 dealers and distributors, more than 300 exclusive Sony outlets and 25 branch locations. Sony India also has a strong service presence across the country with 365 service outlets. Manned by customer friendly and informed sales persons, Sony’s exclusive stores ‘Sony Center’ are fast becoming the most visible face of the company in India.

India Fire & Security Yatra (IFSY) Road Show 2014

SAI Delhi Chapter organized the India Fire & Security Yatra (IFSY) Road Show 2014 in association with UBM on 10 September 2014 at the Park Hotel, New Delhi. The road show was organized to spread awareness on fire safety & security through 11-cit-

ies. IFSY has aimed at promoting and advancing the use of fire safety and security systems that will foster a spirit of safe living among all citizens of India, and inculcate a proactive mind-set towards safety and security. IFSY 2014 showcased cutting-edge

November 2014

45

technologies, new products and services from leading global and Indian manufacturers and product companies. This enabled knowledge and expertise to be shared through technology sessions, panel discussions and live exhibits. The Delhi road show was a great success,

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

with about 170 delegates present for the event, and the audience comprised technical experts, building owners, architects, consultants, contractors and various personnel from fire, security & life-safety fields. The inaugural address was delivered by DK Shami, Additional Fire Advisor, Ministry of Home Affairs, Government of India. He stressed the fact that there needs to be a proper system and policies that need to be formulated for the development of smart cities. He also emphasised the fact that everyone has a role

to play to achieve a ‘smart city situation’ for which we require effective standards that we follow properly. The keynote address was given by GB Singh, FSAI’s Governing Council Member who said that the Narender Modi led government’s announcement of 100 smart cities in the near future is a very good idea, but we must keep a very important aspect in mind – the involvement of the public in sustaining these smart cities, which will require attitudinal changes in the outlook of the population. Post lunch there was a security panel discussion on ‘Smart Video Analytics – Opportunities and Challenges for Indian Environment.’ The panel discussion was moderated by Garry Singh, Vice President–Asia, Pinkerton, and among the

panellists were Sudesh Dhanda, Senior Consultant, Crises and Security Consulting, Control Risks; Saran Baweja, Senior Manager, Schneider Electric; and Ameen Katariya, Manager, Home Credit India. The last session of the day was the interactive discussion on ‘Engineering Life Safety Measures by Design at Choice – An Overview’ by Dr GC Misra, Chief Fire Officer, Delhi Fire Service supported by Prof (Dr) Virendra Kumar Paul, Head of the Department of Building Engineering and Management, School of Planning and Architecture, and GC Gupta, MEP Consultant, ICT Engineering Consultants Pvt. Ltd. The event brought together many fire security and safety enterprises based in Delhi. Over 100 major Indian and global industry players participated in the IFSY Delhi event, including reputed names such as Honeywell Life Safety, Tyco, Autocop, Hikvision, and Toshiba.

Introduces

CFast 2.0 CFX650/600 Memory Cards for Professional 4K UHD Video Recording W ith the rapid development in cinematography, the audience has also increased their demand for image quality. Transcend Information, Inc. (Transcend), a worldwide leader in storage and multimedia products, announces the launch of its CFast 2.0 CFX650 and CFX600 memory cards. Designed to support high-end 4K cameras and camcorders from the leading manufacturers and to meet the extreme demands of professional cinematography, Transcend’s CFX650 memory cards feature

the fastest transfer speeds available on the current market, while CFX600 boast the highest storage capacity. Both cards are best suited for the professional cinematographers shooting high-resolution 4K and Full HD videos.

Unprecedented transfer speeds and capacities

S

upporting the next generation CFast 2.0 specification with a SATA III interface, CFX650 memory cards boast the remarkable read and write speeds of

November 2014

46

up to 510MB and 370MB per second, more than three times faster than today’s CompactFlash cards. Saving 4K Ultra High Definition and Full HD video recordings requires a massive storage space; Transcend’s CFX600 cards fix the problem by offering the vast capacities of up to 512GB, surpassing the capacity limit of any existing card. With such space, the professional cinematographers can record all the high resolution videos at ease, saving the trouble to switch memory devices.

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

Full HD & 4K cinema recording for high-end cameras

4

K Ultra High Definition (UHD) provides 3840x2160 and 4096x2160 resolutions of standards, offering 4 times the pixel resolution of 1080p Full HD video recording and revealing vivid images with much more nuances and details. Designed to support the top-notch cameras and camcorders, CFX650 and CFX600 memory cards are fast enough to record high resolution videos and meet the demands of high-speed 4K video recording. The exceptional transfer speeds and capacities can increase the workflow efficiency of the professional cinematographers shooting high-resolution Full HD and 4K UHD videos. Besides the stun-

ning performance, each CFX650 and CFX600 card contains the built-in ECC (Error Correction Code) technology which automatically detects and corrects transfer errors, enhancing overall reliability.

Transcend exclusive RecoveRx software

F

or added value, each Transcend memory card includes a free download of Transcend’s exclusive RecoveRxTM photo recovery software – an extraordinarily effective tool that allows the users to recover accidentally deleted or lost files from Transcend’s brand storage and multimedia products. Transcend's CFast 2.0 CFX650 memory cards are available in 128GB (INR 29,899 approx) and 256GB (INR

56,899 approx), while the CFX600 cards are available in 128GB (INR 14,900 approx), 256GB (INR 29,899 approx) and 512GB (INR 56,899 approx) capacities. All Transcend CFast 2.0 cards are comprehensively tested for speed and reliability, and are backed by Transcend’s three-year limited warranty.

Introduces

A

CCTV Power Supplies

system is dependent on its operating power supply for reliability and ruggedness, and CP PLUS has introduced a wide range of power accessories to ensure smooth and hassle free operations of any surveillance system. CCTV cameras operate on very low voltage and they have little tolerance to increase in voltage above the rated input level. Most CCTV cameras have a DC voltage input rating of 12V with a

tolerance of +/- 10% – meaning thereby the maximum applied DC voltage that a camera can handle is 13.2 volts. A faulty power supply can create havoc leading to irreparable damage to the system, thereby reducing its reliability. Besides, incorrectly rated power supplies will damage and severely reduce the life of CCTV cameras and other equipment. The power supply is usually erratic in most places in India, with huge surge and voltage fluctuations which can damage the equipment and reduce their normal useful life span. The most commonly used generators as the power backup in the case of power cuts are also not without error. They also supply power with voltage and ripple wave fluctuaNovember 2014

47

tions. In both cases, safe running of the surveillance equipment is challenging. CP PLUS R&D team at TeknoLogix Labs has constantly been striving to develop rugged and safer devices. Taking all the data, facts and feedback from the industry, it has introduced a range of power accessories which ensures a constant power supply within safe working limits to the equipment, thereby increas-

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

ing their working life. The accessories offered by CP PLUS are metal case power supply adapters and plastic case desktop power supply. These devices work on standard power supply (Input voltage AC 100-240V 50/

60Hz 0.5A) and deliver an output voltage of 12V. In India, CP PLUS is the market leader with a leading market share in the security segment. Also, it has been ranked amongst Asia's top 10 security

& India’s No. 1 surveillance brand. CP PLUS’ success is attributed largely to its strong R&D and its willingness to listen to its customers, thereby delivering them best value proposition and solutions.

HoMAI re-launches as Authentication Solution Providers’ Association ASPA aims to be the world’s first and only non-profit representing entire authentication solutions industry

H

ologram Manufacturers Association of India (HoMAI), which was founded sixteen years ago on 1 December 1998 as the world’s second and Asia’s only Association representing holography, has now been re-launched this year with a broader mandate as Authentication Solution Providers’ Association (ASPA). By helping check counterfeiting, ASPA helps protect consumers, unlock revenue realization for brand owners and governments, as well as ensure steady growth of its members and the

industry in general. Counterfeiting today impacts various industries including pharmaceuticals, FMCG, finance, electronics, automobile parts, entertainment, apparel, software, manufacturing, tobacco, liquor and others. ASPA members already protect over 10,000 brands worldwide through the identification of genuine products and documents. As the world’s first and only industry body of its kind, ASPA aims to comprehensively cover the broader interests of the entire authen-

“According to Business Action to Stop Counterfeiting and Piracy (BASCAP) of the International Chamber of Commerce (ICC), the impact of counterfeit and pirated goods on the global economy today stands at a staggering $1 trillion. Like terrorism, counterfeiting is becoming a sophisticated and global menace that can have a crippling impact in any part of the world irrespective of its country of origin. We must develop a unified global strategy with powerful industry linkages and knowledge sharing platforms in order to stop this illegal trade effectively. ASPA is a call to unite various authentication solution providers across the world to galvanize our forces and strengthen this shield univocally. ASPA re-aligns our objectives to more accurately represent the transformation of products and services offered by our member companies. Our broader scope also covers a wide array of authentication technologies that have evolved over the years.” – Manoj Kochar ASPA President November 2014

48

tication solutions industry worldwide, including, but not limited to, holograms, optically variable devices (OVDs), taggants, security inks and substrates, watermarks, nanotechnologies, RFIDs, barcode/ QR code-based digital tracking and verification solutions, security and tamper-evident labels and any other brand protection and authentication solutions. ASPA’s tagline – ‘Diverse Technologies, Common Goal’– summarises its vision to become the global voice of the authentication solution providers that facilitate brand protection through anti-counterfeiting, anti-tampering, and tracking and tracing measures. Anil Rajput, Senior Vice-President, Corporate Affairs, ITC Limited, and Chairman of FICCI Cascade (Committee against Smuggling & Counterfeiting Activities Destroying the Economy), says, “I am glad to note the re-launch of ASPA, which will represent an even broader interest of the entire authentication solutions industry. Counterfeiting and smuggling plagues almost all industries and leads to loss of trust, money, lives and livelihoods. Proper authentication solutions are a must to help validate genuine products. On the technology vendor side,

www.indiasafe.com

CMYK


CMYK

National Roundup

ASPA complements FICCI Cascade’s consumer and industry efforts in curbing counterfeits, by bringing together all types of authentication solutions on one platform. I hope that this move will help in rapid adoption of anti-counterfeiting, anti-tampering and tracking and tracing solutions, which will yield significant direct and indirect benefits in the form of increased revenues, brand perceptions, reduced litigation costs, and greater customer retention.” Welcoming the move, Prof. (Dr.) N C Saha, Director of the Indian Institute of Packaging, an autonomous body under Ministry of Commerce & Industry, Govt. of India said, “It is heartening to note that HOMAI is reinventing itself as ASPA to take a higher responsibility to fight against counterfeiting in packaging. I remember when it was started in 1998 with an objective to promote the significance of hologram as an anti-counterfeiting device in the packaging industry. However, over a period of time, there have been rapid changes, and consumers’ behavior as well as their perception has become very complex in the

modern marketing scenario. At the same time, the market has also become highly competitive which, too, leads to the demand of innovations in the field of anticounterfeiting to protect consumer interest. As a result, it will be a great move to amalgamate multiple authentication technology providers under a single umbrella to offer strong brand protection. “I believe ASPA is poised to play a much-needed and vital role in consolidating the entire gamut of authentication solutions, and catalyzing their adoption in various kind of packaging across all industry segments. Authentication of a product is invariably carried out through integration between the authentication technology and the packaging, and Indian Institute of Packaging welcomes this move. I am confident that ASPA will meet the demand of modern consumers to effectively fight against the counterfeiters.” ASPA works closely with worldleading peers and authorities such as International Hologram Manufacturers Association (IHMA), Counterfeit Intelligence Bureau (CIB) and Interpol.

It actively participates on matters on policy, and also plays a constructive role in ensuring that its members uphold a high pedigree of business ethics and values as prescribed by the ASPA Code of Conduct. ASPA lays down guidelines to encourage adoption of best practices, quality standards and usage of advanced technology to provide truly customised, cost-effective and consistently reliable solutions. It also actively analyses industry trends and provides updates on global news, knowledge resources and best practices to its members. Members are bound by to ensure that they observe high standards of integrity and business ethics at all times. ASPA has also launched a brand new website – www.aspaglobal.com – which includes educational material on various types of authentication solutions, tips on selecting the most relevant and effective authentication solution, case studies, whitepapers, industry news, member profiles, details of activities being undertaken by the Association, reference material and access to ASPA’s quarterly journal, The Authentication Times.

Schneider Electric Engages Smart City Proponents A Smart City Can Create 40% More Economic Activity

S

chneider Electric India recently hosted an engaging panel discussion with subject matter experts to deliberate on India’s urban infrastructure and identify the building blocks for making the government’s ‘Smart Cities’ project a reality. ‘Changing India: A Smart City

Revolution’ put the spotlight on the socio-economic necessities that drive the Smart City objective, turning the table on the inadequacies of our country’s infrastructure and administrative mechanisms, and the skills that will guide the city planners, administrators and proponents to build and manage November 2014

49

Smart Cities. The contour of the discussion was shaped and led by Dr R K Misra, Founder Director, Center for Smart Cities and the panellists comprised an eclectic mix of eminent dignitaries namely Nilesh Purey, Vice President, ICT, Gujarat International Finance Tec-City

www.indiasafe.com

CMYK


CMYK

National Roundup

Co. Ltd; Shivendra Nath, Superintending Engineer (Project), Naya Raipur Development Authority; Manish Agarwal, Executive Director, Infrastructure Advisory, PWC India; Dr. Navanil Baruah, member of the Senior Leadership Council and Director of the Department of Neuro-Surgery at GNRC (formerly Guwahati Neurological Research Centre); Anil Chaudhry, Country President & MD, Schneider Electric India; Sanjiv Rai, Vice-Chair-Rosenbridges Infra IFS Ltd., Chairperson and Chief Solver-Billion Innovators; and Dr. Rahul Tongia, Fellow, Brookings India, Advisor, Smart Grid Task Force, Govt. of India, Adjunct Professor, Carnegie Mellon University. The inaugural speech was delivered by Leo Apothekar, Vice-Chairman and Independent Lead Director, Schneider Electric who said, “There are multiple components to a Smart City which need to be considered while planning such a project. These mainly include energy, mobility, water, public services and buildings & homes. India has embarked on a very exciting mission of creating Smart Cities and we are confident that contributions from all sections of the society, public and private, can make this dream a reality.

Only cities can accommodate population growth and there is a need for Smart Cities.” Mishra further set the context for the panel discussion and said that Smart Cities use infrastructure more efficiently and its four main pillars should be mobility, safety, cleanliness and being green. In the course of the discussion, Nilesh Purey shared his views on the skill sets that will enable city planners drive a Smart City project, “We need to develop good skill sets and learn from the West, especially in the areas of administration and municipality. This is something that we have successfully implemented at GIFT. Every employee at GIFT has visited at least two countries to understand and learn best practices in this area.” Shivendra Nath, who will be the first overseer of India’s first Smart City, said, “We need to keep consumer happiness at the core while ensuring that whatever we do is economically viable and gives the best output.” On the importance of PPP model in determining the success of Smart Cities, Manish Agarwal said, “PPP model is imperative for Smart City development and it should not be viewed just as a financing option. PPP brings in cerNovember 2014

50

tain level of service commitment and offers immense scope for innovation.” Dr. Navanil Baruah gave a very interesting perspective stating that it is important for people to be healthy to realise the dream of Smart City. Healthcare should be offered at affordable rates without compromising on quality. North East has a lot to offer towards Smart City development as it is rich in mineral resource and hydropower.” Sanjiv Rai put forth some remarkable statistics that one needs to look at in order to create a true Smart City. He said that Smart City means 10% more longevity of life compared to the benchmark, 20% more efficiency and 30% more sustainability. This will automatically result in 40% more economic activity. Elaborating on the challenges and resolutions of energy infrastructure, Rahul Tongia added, “India’s energy consumption is alarmingly high. Hence, these Smart Cities need to be really different. Business as usual will not work anymore. Smart grid is a journey and should be viewed only as processes in the overall scheme of things. We need to plan our processes better and this is where dialogue, democracy and government should step in.” Lastly, talking about integrating technologies in a brownfield surrounding and enmeshing loopholes to achieve energy efficiency, Anil Chaudhry shared Schneider’s experience as a developer of Smart Cities. He said, “Schneider is well positioned to contribute to the government’s vision of creating 100 Smart Cities. We are already working on various Smart projects. The physical and virtual worlds now need to come together; integration is required.”

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

Dr. Diwan Rahul Nanda Talks Indo-UK Partnerships with UK Prime Minister

I

nternational security leader and pioneering Indian entrepreneur Dr Diwan Rahul Nanda recently met with UK Prime Minister Rt. Hon David Cameron at the 16th Carlton Club Political Dinner in London. Since moving to London 6 years ago from Mumbai Dr. Rahul Nanda, the Executive Chairman of TOPSGRUP and The Shield Group, has sealed his position as a leading Indo-UK business success story, following his acquisition of The Shield Group in 2012. At the Carlton Club Political Dinner, Dr Nanda was seen speaking to Rt. Hon David Cameron, who was interested to hear more about the security empire that is TOPSGRUP and Shield, and the impetus behind Dr Nanda’s acquisition of the UK company. It is believed the two men discussed such pertinent topics as the vast contribution made by the Asian community to various facets of UK life

including the economy, and India’s ever-developing presence on the world stage. Just recently, Dr Nanda was honoured with the prestigious Entrepreneur of the Year award at the Asian Achievers Awards (AAA) 2014 by Rt. Hon Keith Vaz MP, Chairman of the Home Affairs Committee and Lord Navnit Dholakia. This eminent accolade constituted the 65th award in his career. The chief guest at the event was Rt Hon Phillip Hammond MP, Secretary of State for Foreign and Commonwealth Affairs. TOPSGRUP is one of India’s leading, multi-award winning security group, servicing 8,000 clients through 120 offices across the globe and employing around 93,000 trained and motivated employees. The company established in 1970 and completed 44

years of business excellence on 15th July 2014. TOPSGRUP’s stellar clients include TATA, IBM, Pfizer, Mumbai International Airport, Infosys etc. TOPSGRUP currently has a revenue of INR 1332 Crores and EBIDTA – INR 125 Crores (FY 15 – as per consolidated financials).

Nanded, India Deploys NICE Safe City Solution to Protect Citizens, Visitors and Historical Sites Using NICE Situator and NiceVision the city has set up a centralized control room for managing daily operations as well as emergency response

N

ICE Systems (NASDAQ: NICE) has deployed its Safe City solution in Nanded, India, a city with over half a million citizens. NICE’s solution provides Nanded’s law enforcement agencies real-time situational awareness for both day-to-day operations and disaster handling. At the heart of the Nanded Safe

“Nanded’s historical and religious significance make safety and security a high priority. The C-Cube was designed to facilitate better communications between law enforcement officials and the public, and to centralize safety and security management. With NICE’s support, we were able to bring our vision to fruition and even create a public address system that allows us to communicate quickly with our citizens. Although we just launched C-Cube, we’re already seeing an improvement in security, operations, communications, and the way incidents are handled.” – G Sreekanth Municipal Commissioner of Nanded City

November 2014

51

www.indiasafe.com

CMYK


CMYK

National Roundup

“We’re pleased to be helping the City of Nanded enhance the safety and security of its residents, guests and historical sites. This deployment reinforces our expertise in helping cities around the world manage dayto-day events, as well as large-scale incidents, from both a security and operational perspective. As more cities seek to become ‘safe cities,' they can look to Nanded as another example of how centralized situation management solutions can improve communication, collaboration and incident response.” – Chris Wooten Executive Vice President NICE Security Group City project is what has aptly been named the C-Cube, the command, control and communication center located in the city’s police headquarters. NICE Situator, NICE’s PSIM/ Situation Management solution, is the backbone

of C-Cube’s 24/7 monitoring. Nanded Safe City also includes NiceVision intelligent IP video surveillance and crowd control video analytics. The crowd control video analytics allows police to identify potential safety threats stemming from overcrowding, an ongoing concern due to the city’s influx of visitors. Situator’s ability to maintain, manage and enforce pre-configured standard operating procedures (SOPs) enables Nanded law enforcement to provide consistent, effective and compliant responses to unfolding security and disaster management events. Uniquely, Situator supports multi-language interfaces, so the system and SOPs are in the local Marathi language. The C-Cube Safe City concept was developed together with consultant MIPL, D. Sivanandhan, IPS retd. (former CP Mumbai & former DGP, Maharashtra), and system integrator

Samarth Security Systems (India) Pvt. Ltd. NICE’s security solutions help organizations capture, analyze and leverage big data to anticipate, manage and mitigate security and safety risks, improve operations, and make the world a safer place. The NICE security, intelligence and cyber offerings provide valuable insights that enable enterprises and government agencies to take the best action at the right time by correlating structured and unstructured data from multiple sensors and channels, detecting irregular patterns, and recognizing trends. The solutions have been deployed to help secure a broad range of organizations and events, such as banks, utility companies, airports, seaports, city centers, transportation systems, major tourist attractions, as well as sporting events and diplomatic meetings.

Odisha Police Sets Benchmark in e-Surveillance

Background

O

disha has largely been a peaceful state, but it has its own share of problems. Many parts of the state are Naxalite hit where law and order is sensitive. To proactively track the activities around the police stations, Odisha police has decided to equip itself with e-surveillance. The objective was not only to mitigate corruption, but also to keep track of suspicious elements and activities. Besides, the police adminis-

Client’s Name: Odisha Police System Integrator: Microsys Infotech & Telecom Pvt. Ltd

tration wanted to ensure fair treatment to civilians when they access them at the police stations.

Mission

O

disha police has set a benchmark by ensuring its functions are more transparent and people friendly. In a bid to modernize and ensure effective policing in sensitive areas, the Odisha police decided to secure the police stations with installations of closed circuit cameras (CCTVs). The police stations were selected based on their sensitivity and location. The police wanted to safeguard the human rights of the peoNovember 2014

52

ple and also wanted to keep a close eye on agitations and demonstrations, and record the incidences of the scripted instances which were aimed at tarnishing the image of the police. The other significant objective was also to bring about change in the behavior of the police.

Solution overview

C

P PLUS team was fully aware of the tactical and situational surveillance challenges at the police stations. The team had a challenging task of covering 200 police stations across 20 districts, and each

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

police station had varied risk from others. The team evaluated the risks and divided them into two parts. One was common risks and another was specific to that area. The local risks included, for example, frequent agitations by local public, loitering by anti-social elements, political agitations over local issues, etc. The specific risk was based on the history of incidences and their recurrence. Further, the task was also to ensure safety of the police staff proactively by tracking activities within and outside police stations. “We leveraged a number of cameras from different locations which were tied into the same network. For general situational awareness, we used standard definition cameras. For the highest tier of tactical surveillance, there was a compelling

need for really high-definition video to arrive at concrete decisions,” said Yogesh Dutta, COO, Aditya Infotech Ltd. The solution involved the following items: ● CP-EAC-TY60MVFL8-E: High resolution high range vari-focal IR bullet camera – 80m. This is 600 TVL high resolution analog IR camera with 12 Japanese LEDs and a capacity to view even in dark up to 80 meters. It also has AGC, AWB and BLC features that help produce enhanced images in hostile environmental conditions. ● CP-UAR-0808Q2D-XU: 8 channel full D1 1080P 1.5U standalone DVR. This has H.264 dual-stream video compression capable of delivering

a full channel D1 (4CIF) real-time recording. All channels can simultaneously playback and offer smart search. Smart video detection can report motion detection (MD), camera blank, and video loss.

Result

T

he responsive and precise capabilities of the cameras and DVRs with the extended day/ night video resolution equipped police stations with comprehensive all weather, round the year 24x7 surveillance. The surveillance system equipped police stations with the much required tactical and situational surveillance. After the huge success of the first phase implementation, Odisha police is contemplating to deploy the system to cover other areas of the state as well.

DuPont invites applications for 2015 Safety and Sustainability Awards Awards now open to companies in India and across the globe

D

uPont announces that its 2015 Safety and Sustainability Awards will be open to companies across the globe, including India. Until last year, companies in Europe, the Middle East and Africa (EMEA) region could apply for it. “Over the last decade, the DuPont Safety and Sustainability Awards have become widely recognized among industrial companies as a benchmark for workplace safety and sustainability,” said James R. Weigand, President, Du-

Pont Sustainable Solutions, “More importantly, they have helped to promote initiatives aimed at saving lives and protecting the environment.” DuPont Sustainable Solutions is now soliciting applications for the 2015 awards, which will be judged by a jury drawn from a range of respected safety, health and environment organizations. An application form should be submitted by Feb. 1, 2015. Complete entries, including a summary of the project, must be received by Feb. 27. November 2014

53

Since its launch in 2002, the bi-annual competition has attracted a growing number of applicants, with entries for 2013 increasing nearly 50 percent over those in 2011. Last year’s entries came from a wide range of industry sectors across EMEA – from the U.K. to Germany, Saudi Arabia, Kazakhstan, Turkey, France, the United Arab Emirates and Italy. DuPont is creating a new category for the awards this year – Operational Excellence. “The addition of this category

www.indiasafe.com

CMYK


CMYK

NATIONAL ROUNDUP

acknowledges the strong correlation between operational performance and corporate footprint reduction,” said Brian Rains, global practice leader for Operations Excellence, “Safety and sustainability improvements cannot be executed in a vacuum, but rather in concert with operational improvements.” The bi-annual DuPont Safety and Sustainability Awards competition welcomes entries from all companies or organizations that can demonstrate

significant achievements in one of the following three categories: safety, sustainability or operations excellence. Regional winners in each category will be announced in May 2015, and the global winner will be announced at the award ceremony in September 2015. Awards will be judged on criteria including management commitment, cultural evolution, performance improvement, innovation and stakeholder engagement. Winners will receive a trophy and a certificate at the

award ceremony. DuPont Sustainable Solutions is one of 12 DuPont businesses. Bringing customers the benefits of an integrated global consulting services and process technology enterprise, it applies DuPont’s real-world experience, history of innovation, problem-solving success, and strong brands to help organizations transform their workplaces and work cultures to become safer, more efficient and more environmentally sustainable.

Wavesight India and SmartWitness Join

Forces to Deliver Transport CCTV Solutions to the Indian Market W avesight Wireless Solutions Pvt Ltd has announced a new partnership with UK based SmartWitness and has signed an exclusive agreement with the market-leading

T

vehicle CCTV supplier to supply the SmartWitness range of transport solutions to the bourgeoning Indian market. SmartWitness, a division of global CCTV manufacturer and dis-

tributor Y3K, already distributes its VOSA-compliant products, which have been approved for use in commercial vehicles, to over 50 countries around the world.

IndigoVision Helps India Reach for the Stars

he Indian Space Research Organisation (ISRO) recently made the headlines with the success of the ‘Mangalyaan’ Mars orbit spacecraft, the first space agency to do so on its first attempt. ISRO are a long-time customer of IndigoVision, recently installing In-

digoVision’s BX HD PTZ dome cameras to manage security at the Mars mission control room in Bengaluru. Several Indian government and defence organisations have chosen IndigoVision’s solution, including Bharat Electronics and Hindustan Aeronautics. November 2014

54

www.indiasafe.com

CMYK


CMYK

product showcase

VIVOTEK Debuts its Compact Splittype Camera System VC8201

V

IVOTEK announces the debut of its compact split-type camera system VC8201, which comprises two camera units, CU8131 and CU8171, and a VC8201 video core. Designed separately, the bodies of the camera units are much more compact than general network cameras, making them easier to install and harder to notice. The CU8131 and CU8171, two camera units especially developed for the split-type camera system, are both designed as recessed dome type. With a 1-megapixel CMOS sensor and WDR Pro technology, the CU8131 can capture clear and detailed images in environments with sharp lighting contrasts. The 5-megapixel CU8171, featuring a fisheye lens, provides a 180°

panoramic or 360° surround view without blind spots. In addition, the VC8201 video core supports different combinations of the two camera units (up to two 5-megapixel fisheye camera units) with 8-meter long cables, dramatically simplifying the installation process. Incorporating some more advanced features like 3D noise reduction, tamper detection, 802.3af compliant PoE, SD/ SDHC/ SDXC card slot, and VIVOTEK’s 32-channel recording software, the split-type camera system is perfectly suitable for places with intricate interior design or complex layouts, such as retail stores, offices, galleries, museums, and vehicles. Steve Ma, Executive Vice President

of VIVOTEK, noted, “We are pleased to introduce our split-type camera system to the market. Considering trends in camera miniaturization and user-friendliness, VIVOTEK has come up with a very clever response in the split-type camera system. The installation flexibility and outstanding image quality of this new product are sure to meet our clients’ every need.”

Announces

Innovative Surveillance Solution with Full 360° Overview and Detailed Zoom AXIS Q6000-E network camera is an innovative network camera offering a 360° overview provided by four 2-megapixel camera heads, and when integrated with AXIS Q60-E it simultaneously offers high detail optical zoom on areas of interest, with just one click

A

xis Communications, the world leader in network video, announces AXIS Q6000-E, an outdoor-ready 360° network camera that integrates seamlessly with the AXIS Q60-E Series of PTZ dome network cameras, providing a unique surveillance solution. With just a single click, operators can optically zoom in on details of interest with high precision while at the same

time being able to maintain an overview of large areas of up to 20.000m² (215,000 sq. ft.) – about the size of four football fields. This makes the AXIS Q6000-E ideal for city surveillance applications such as monitoring of public squares and parking lots, as well as food courts in shopping malls and other open areas. “The AXIS Q6000-E addresses the November 2014

55

need for a simple way to monitor a wide area and, simultaneously, be able to optical zoom in on details,” says Erik Frännlid, Director of Product Management, Axis Communications, “The seamless integration with AXIS Q60-E Series of outdoor PTZ cameras provides a smart, innovative and space-efficient solution offering new and unique video surveillance possibilities.”

www.indiasafe.com

CMYK


CMYK

product showcase

being able to maintain This new product an overview of the enwill open up new optire monitored area. portunities to solve AXIS Q6000-E a common problem, provides multiple, infor example in the dividually configurable city surveillance field video streams in H.264 where there is a need compression to greatly for both a PTZ camoptimize bandwidth era to provide detail, The AXIS Q6000-E features and storage without and for a full overview four 2-megapixel cameras, compromising image camera to cover the enproviding a complete 360° quality. Motion JPEG is tire area. A single click field of view over large areas on any object in AXIS Q6000-E, using also supported for increased flexibility. Any AXIS Q60- E camera is quickthe one-click PTZ control feature, will trigger the AXIS Q60-E allowing opera- ly and easily mounted inside the AXIS tors to optically zoom in on the specific Q6000-E, allowing also existing AXIS object of interest. The use of two screens Q60-E installations to be upgraded to gives a full 360° overview from AXIS monitor wide areas, while simultaneousQ6000-E, and a zoomed-in view from ly capturing every detail of interest, with AXIS Q60-E, providing operators with a just one click. There’s no need for any high level of detail while simultaneously mounting brackets or extra equipment as

AXIS Q6000-E uses the same brackets and network cable as the AXIS Q60-E, minimizing time and cost of installation. Furthermore, AXIS Q6000-E is supplied with Power over Ethernet Plus (PoE+) through AXIS Q60-E, eliminating the need for power cables. AXIS Q6000-E is supported by the industry’s largest base of video management software through the Axis Application Development Partner Program. The camera includes support for AXIS Camera Companion, AXIS Camera Application Platform, ONVIF specification for interoperability of network video products and AXIS Video Hosting System (AVHS) with One-Click Camera Connection. AXIS Q6000-E is planned to be available in Q4 2014 through Axis distribution channels.

Hikvision adds Ultimate Gain Glass to Enhance Performance of EXIR Network Bullet Cameras H

omes, offices and smallto-medium enterprises are set to benefit from the addition of Hikvision’s advanced EXIR bullet network cameras to its easy IP solution lineup. The DS-2CD2T series of 2- and 3-megapixel cameras feature high-performance LED light sources and a revolutionary rectangular lens for seamless HD formatting but now boast Infrared Gain Glass for ultimate light transmittance and unparalleled levels of night-time surveillance. The DS-2CD2T series also features 3D DNR and DWDR image enhancement technology, dual video streams,

Power over Ethernet capability and an IP66 environmental protection.

Improved infrared light transmittance

B

oth the 2- and 3-megapixel DS2CD2T series cameras use specially coated Infrared Gain Glass for improved infrared light transmittance. This delivers even clearer images and is November 2014

56

especially well suited to applications that require high resolution images to be captured in low-light environments. With an IR range of up to 80 metres from its four EXIR LEDs, the DS-2CD2T-I8 is ideal for perimeter intrusion detection, especially at night time.

EXIR technology

T

he DS-2CD2T series also incorporates Hikvision’s EXIR infrared array technology to provide industryleading illumination in any low- or zerolight environment. Benefiting from an advanced, highly efficient light source

www.indiasafe.com

CMYK


CMYK

PRODUCT SHOWCASE

that provides up to 30% more illumination efficiency compared to other LEDs and a revolutionary rectangular lens for uniform scene illumination and seamless HD formatting, Hikvision’s EXIR cameras deliver the most advanced levels of night-time surveillance available on the market today.

Part of easy IP solution

T

he DS-2CD2T series network bullet EXIR cameras are part of Hikvision’s Easy IP solution, boasting Easy Installation and Easy Viewing with the combination of Hikvision plug & play

NVR and video surveillance software. Installation is a simple 2-step process that’s even easier than Analog – plug the camera(s) into the NVRs PoE port(s), then connect the monitor and you’re ready to enjoy HD video recording instantly without IP address forwarding. Easy Viewing allows you to watch and play live video anytime and anywhere. Users just need to simply download the Hikvision EZVIZ smartphone app for free, by scanning the QR code on the back of camera through EZVIZ app, live video viewing and playback will be available over the internet

remotely. It’s completely configuration free and it’s that easy. Enabling users to excellently monitor environment day and night, this new EXIR camera series gives users the confidence that their property is securely protected.

Available models

D

S-2CD2T22-I3/ DS-2CD2T22I5/ DS-2CD2T22-I8 – 2.0 MP EXIR network bullet cameras; DS2CD2T32-I3/ DS-2CD2T32-I5/ DS2CD2T32-I8 – 3.0 MP EXIR network bullet cameras.

Grundig Security’s new IP Camera Range Features Quad Scan WDR and Low Light Capability

G

rundig Security’s impressive new IP camera range, showcased at Security ESSEN, is designed by Grundig Engineering. The new range includes compact, indoor and outdoor vandal-resistant domes, integrated bullet cameras and a 6MP Fisheye camera. The indoor domes, outdoor vandalresistant domes and integrated cameras have 2 and 3MP options. Specialist features of the range include Quad Scan WDR, enabled by the Sony Exmor™ CMOS sensor, which enhances low light sensitivity and dual noise reduction (DNR) to significantly reduce image noise. Sensitivity is improved further with an option to run the cameras at 60FPS. The higher-spec camera models have Xarina™ digital signal processing (DSP), which enables analytics features, such as facial

detection. All the new IP cameras include IR LED illumination for night vision. The 2MP cameras have 3 to 10.5mm varifocal lens. The 3MP models have a Tamron 3 to 9mm auto-focus zoom (AFZ) lens with P-Iris (an automatic ‘precise iris’ function), which increases image contrast, clarity, resolution and depth

November 2014

57

of field. The outdoor vandal domes are IK10, vandal-resistant rated and, along with the bullet cameras, are IP66 weather resistant-rated for challenging, outdoor environments. The new Fisheye 360 panoramic view camera is designed for retail and overview environments and offers a cost-effective solution to many applications. It includes on-board ‘dewarping’ software producing up to two corrected video stream views. SD/ SDHC card slots, PoE and ONVIF Profile S integration are standard across the new IP range, making Grundig cameras compatible with most leading VMS solutions. Webserver access for smartphone (iOS and Android) and tablets can be set up, allowing users to remotely view, monitor and control Grundig IP cameras from anywhere in the world.

www.indiasafe.com

CMYK


CMYK

PRODUCT SHOWCASE

Releases the Full HD, IP version of

R

X-SERIES™ Rugged Dome

edvision’s new RVX-IP30™ rugged PTZ and dome camera range adds IP technology to its hugely successful X-SERIES™ range. The Full HD camera, designed and manufactured in the UK, produces up to three, simultaneous, real-time video streams. Resolution options include a primary stream of 1080p, for recording and 720p, D1, VGA and QVGA stream options, which are op-

timized for lower band recording, display and transmission. Video compression formats include H.264, MPEG4 or JPEG at up to 12Mbps. The RVX-IP30™ uses the same rugged design as the well-established, analogue X-SERIES™. It converts from a dome to a ball PTZ camera by the removal of an optional top cover; it is immediately compatible with Redvision’s full range of mounts and brackets; it comes in black or white as standard with RAL colours and marine finishes also available. The standard RVX-IP30™ model has a 30x optical zoom, with 12x digital zoom. IR illumination, dual light (combined IR and white light) and

a wiper can be added. The IR and white light illumination are effective up to 120 metres and 100 metres respectively, allowing operators to reliably recognise people at up to 40 metres. The technologically advanced RVXIP30™ cameras use a 1/2.8” CMOS image sensor, with wide dynamic range (WDR). It has exceptional low-light sensitivity, operating at 0.35 Lux in daylight mode and 0.05 Lux at night in infra-red (IR) mode. Each camera has 100 pre-sets, 24 tours, 16 alarm contacts and up to 24 privacy masks. Full integration with leading NVR and video management software (VMS) solutions ensures seamless, network operation in most applications. The RVX-IP30™ camera has a flat, optically-correct, toughened glass camera window for image clarity. Low power consumption and a high mean time before failure (MTBF) reduce the camera’s total cost of ownership and maintenance overhead.

Announces

Software Update to ViP

Video Internet Protocol Door-Entry System

L

ast month, Comelit UK, the Hertfordshire-based division of the global Comelit Group, invited a selectgroup of architects, consultants and systems integrators to attend a special seminar hosted aboard Will, a former Thames river sailing barge. The purpose of the seminar was to up-

date clients about the latest developments and new capabilities of ViP, Comelit’s market-leading video Internet protocol door-entry system. As part of the event, guests were also treated to a clay pigeon shoot, as well as food and beverages, as they navigated their way along the River Thames in central London. November 2014

58

New call logging software

A

t the seminar, Comelit staff introduced the company's new call logging software, which enables the interception and recording of video and audio between the entrance panels and internal monitors. The software also re-

www.indiasafe.com

CMYK


CMYK

product showcase

Comelit UK, said of the cords a log of who called, seminar, “This event is now the duration of the call and firmly established in our who released the door. event calendar as an opporDuring the event on the tunity to update our customThames, Comelit also demer base about our continually onstrated its commitment to evolving full-IP door-entry investing in new products system, ViP. Our aim is to and technology by unveilhelp our clients realise the ing two new additions to its benefits of Comelit’s IP techrange of stylish and modnology and the fact that it is ern IP entrance panels: the Architects, consultants and systems integrators gather for a special now a real alternative to tra3-One-6 Analogue and the seminar hosted aboard Will, a former Thames river sailing barge ditional analogue systems.” Red Dot Design award-winon the number of entrance panels ning 3-One-6Sense, both of which were and monitors in the system. The sys- A wide range of available for demonstration to guests on tem can be expanded as necessary to applications board the barge. accommodate new buildings within iP can be used in many commera site-wide complex. In comparison, cial applications, but is particularFull-IP video door-entry analogue systems are more complex ly well suited to high-volume residential system and time-consuming to modify or ex- buildings, schools, hospitals and offices he overall objective of the seminar pand, which can add significantly to since these facilities already have their was not merely to update customthe cost of installation and upgrades. own LAN network. To create a highers about the new software and hardware that have been added to the ViP ● Plug and play – ViP uses a CAT5 performance video entry phone system, cable network to which all devices the external and internal ViP units are range, but also to help them embrace the can be connected simply via an RJ45 simply connected to the existing LAN concept of IP door-entry systems as a plug. This adds to the ease of instal- network. This enables one to be ‘prewhole. Comelit’s ViP system is fully IPlation and requires little or no IT sent’ at all times without physically bebased – external unit and building riser, skills to programme the system. ing onsite. as well as the monitor in each apartment, The system can also be used to which is a fully functioning IP device in ● Integration – ViP incorporates video entry, intruder alarm, CCTV, identify and assist visitors remotely by its own right. In comparison with tradihome automation and access control broadcasting, over long distances, audio tional analogue or closed systems, the on a single platform. and text messages from a central unit. ViP system offers a host of additional benefits that enhance performance and ● Dual application options – ViP can In short, the ViP system eliminates the be used to create either a dedicated, problems associated with onsite and resimplify the installation process. proprietary network, or else it can be mote services that traditional analogue integrated into an existing LAN, cre- systems have hitherto been unable to Some of the major benefits of ViP inating a video entry system that runs overcome. clude: in parallel with other digital devices For more than half a century Comelit ● Reliability – ViP is a peer-to-peer and services – and requires no addi- has been a leading global manufacturer system (non-server based), thus tional cabling infrastructure. of video and audio door-entry systems, eliminating any central point of fail● Messaging – ViP system allows text access control, video surveillance, telure. and image messages to be sent from ephones and telephone switchboards. ● No-limits performance – ViP conthe concierge or remote software, in Their systems are the most up-to-date nects an infinite number of users the form of a Communications Man- in the industry and continue to evolve as in simultaneous audio and video ager, to apartment video monitors. technology moves forward. conversations,with no distance limiFrancesca Boeris, Sales Director, They also offer the most compretations. There are also no restrictions

V

T

November 2014

59

www.indiasafe.com

CMYK


CMYK

product showcase

hensive range of monitors, from standard monochrome up to the latest touchscreen 7’’ colour monitors, all of which

are instantly recognisable by their sleek, modern and aesthetically pleasing design. The new range of 3-One-6 IP en-

trance panels recently won the Red Dot Design Award and is testament to dedication to manufacturing excellence.

CEM Systems Releases New Version of AC2000 Security Management System Latest version of AC2000 offers solutions to improve security, a range of new integrations and enhances the functionality of emerald, the intelligent access terminal

C

EM Systems, part of the Security Products business unit of Tyco (NYSE: TYC) has announced the release of version 6.9 of the AC2000 suite of access control and security management software. This new version of the software offers improved security features and increases the performance of the AC2000 software suite including AC2000, AC2000 Airport and AC2000 Lite. “AC2000 is an integrated security management system that is designed with the customer in mind, providing flexible solutions that help increase security and improve operational effectiveness,” said Conleth Donaghy, Senior Product Manager, CEM Systems, “The latest release of AC2000 further reinforces this, offering improved security features with the addition of the SmartCard Utility and support for AES encryption across all CEM DESfire readers. The latest enhancements to emerald also provide an additional security level, where personnel image can be immediately verified at point of entry.” An exciting enhancement of AC2000 is the addition of user defined

keys through the AC2000 SmartCard Utility application. This application is a convenient and flexible approach to smartcard key management by allowing users to take full ownership of their smartcard personalisation process. This means if encryption keys become compromised, updates can be implemented with minimal impact to security and daily operations using the AC2000 SmartCard Utility. AC2000 v6.9 now also supports 128-bit AES (Advanced Encryption Standard) encryption across the CEM DESFire reader versions of the emerald terminal, the S610 reader range and the sPass reader. This encryption standard provides a future proof access control solution, increasing security and reduc-

November 2014

60

ing the risk of card cloning. Version 6.9 of AC2000 also offers enhanced functionality of emerald, CEM’s award winning intelligent access terminal. emerald is a touch screen reader and controller in one, with built in Voice over IP (VoIP) intercom functionality, that uniquely enables AC2000 data to be accessed securely at the door. With the release of AC2000 v6.9, emerald now supports Image on Swipe mode, which allows the terminal to display the cardholder’s image, and grants or denies access based on this verification.Also with the release of AC2000 v6.9, emerald remote apps are now more user friendly with new intuitive menus and improved response times. In v6.9, AC2000 now supports full two way integration with Exacq’s exacqVision video management system and integration with Future Fibre Technologies’ CAMS 3 perimeter intrusion detection system. These latest integrations build on the existing range of AC2000 video, perimeter, fire and intrusion integrations, making AC2000 a powerful security management system.

www.indiasafe.com

CMYK


CMYK

PRODUCT SHOWCASE

Launches Video Series on Infrastructure Solutions Informative Videos Deliver Overviews on New Innovative Products

A

ltronix has launched a series of eBridge enhances Ethernet infrastruc- ‘more than just power’ including LINQ informative video/ whiteboard ture to reach distances up to 500m with- network communication modules, PACE long range Ethernet adapters, eBridge animations on the company’s line of in- out repeaters. In the Pace video, you’ll learn how coax over Ethernet adapters, NetWay frastructure solutions. These three new videos provide informative and clear to easily extend IP devices up to five PoE solutions, HubWay UTP video sooverviews on the benefits of eBridge™ times beyond standard Ethernet range lutions, VertiLine rack mount power supplies, ReServ UPS, WayPoint outEthernet over coax products, Pace™ long without repeaters. The NetWay video demonstrates the door power supplies, and StrikeIt NAC range ethernet adapters and NetWay™ best ways to deliver PoE, PoE+ or Hi- power extenders. Altronix’s U.S. corpoPoE solutions. “Our new video series is designed PoE – both indoors or out – to a variety rate headquarters located in Brooklyn, NY occupies 100,000+ square feet, with to help educate customers in a clear of edge devices. Altronix Corporation is the leading the latest manufacturing technologies and concise manner on the far-reaching benefits Altronix delivers for upgrading to, and enhancing IP infrastructure,” said Alan Forman, President, eBridge™ IP over Coax Products Pace™ Long Range Ethernet Adapters NetWay™ IP Solutions Altronix. An informative video on eBridge designer and manufacturer of quality for the highest levels of quality and pershows just how easy it is to upgrade and low voltage electronics for the video sur- formance. Altronix is an ISO 9001:2008 expand security and surveillance utiliz- veillance, security, fire, access control registered firm. All Altronix products ing coax, while supporting PoE, PoE+ and automation markets. The company carry a lifetime warranty and are manuand Hi-PoE devices. You’ll also see how continues to deliver products that deliver factured in the U.S.

Introduces Two New Products

Industry’s Widest Bandwidth High-Performance Microwave Vector Signal Analyzer and Fast Switching Continuous Wave Signal Generator New instruments address evolving requirements in applications such as semiconductor device test, radar testing, and signal intelligence

N

I (Nasdaq: NATI), the provider of solutions that enable engineers and scientists to solve the world’s greatest engineering challenges, recently announced the industry’s widest bandwidth high-performance 26.5 GHz microwave vector signal analyzer (VSA)

and a fast tuning 20 GHz continuous wave signal generator. The two new instruments complement the extensive NI modular instruments offering and expand the measurement capabilities of the PXIplatform. High-Performance vector signal November 2014

61

analyzers deliver a combination of low noise floor, high linearity, and low phase noise. NI’s new 26.5 GHz VSA combines these attributes with up to 765 MHz of instantaneous bandwidth. With the VSA’s bandwidth, engineers can analyze some of the industry’s widest

www.indiasafe.com

CMYK


CMYK

PRODUCT SHOWCASE

bandwidth signals in a single acquisition including radar pulses, LTE-Advanced transmissions and 802.11ac waveforms. In addition, the VSA’s fast measurement speed helps engineers decrease time to market and ultimately lower their cost of test. Finally, engineers can program the VSA’s user-programmable FPGA with LabVIEW system design software

to customize instrument behavior and address the most advanced RF test applications. The new 20 GHz signal generator features an ideal combination of exceptional phase noise and fast tuning time (100 µs). This instrument addresses applications including blocking/ interferer generation, high-performance intermod-

ulation distortion test benches and various electronic warfare applications. “The NI 20 GHz PXI source offers an excellent combination of phase noise and tuning time in a small form factor – a perfect combination for testing our nextgeneration radar systems,” said Lennart Berlin, Senior Specialist for Microwave Measurement Techniques at Saab AB.

Launches

X600 Series for Large Installations

S

CATI VISION X600 Series is a powerful hybrid video-recording platform that can manage up to 32 IP and analogue cameras with maximum performance, facilitating the migration of CCTV installations to IP video.

SCATI, a manufacturer specialized in complete CCTV solutions for the control and protection of resources in all types of security installations, offers its customers the SCATI VISION X600

Series, a multi-tasking recording system that can capture, record and store video, and also display both real-time and stored video. The X600 series can record up to 800/ 960fps in high resolution and can manage up to 32 megapixel camera streams with maximum quality. These recorders are available with analogue, hybrid and IP capabilities, and can be fitted with up to 24 TB of storage. The X600 recorders include realtime video content analytics with functionalities such as tampering or aban-

doned object and movement detection, enabling the user to carry out intelligent video management. Thanks to its pre-configured SCATI VISION software, these video recorders offer a wide range of possibilities to optimise the CCTV system, thanks the storage management and bandwidthadaptation capabilities. When fully integrated with SCATI EYE cameras and other SCATI SUITE elements, the X600 series recorders constitute a complete video-surveillance solution with seamless operation among its different components, specifically designed for large installations with enterprise-class CCTV requirements.

OnSSI Demonstrates Ocularis Video Management Software and Innovative Partner Integrations at Security Canada

O

n-Net Surveillance Systems, Inc. (OnSSI) demonstrated its industry-leading Ocularis Video Management Software (VMS) as well as innovative technology integrations, at Security Canada Central Conference and Expo

presented by the Canadian Security Association (CANASA), which was held October 22-23 at the Toronto Congress Centre. Show attendees had the opportunity to experience firsthand the robust feaNovember 2014

62

tures of Ocularis, which provides the highest VMS performance for mid-level and enterprise solutions. OnSSI also highlighted the benefits of their partner integrations with ConvergenceTP’s (C2P) Event Streaming Engine solution

www.indiasafe.com

CMYK


CMYK

product showcase

and ION Series servers from Iomnis Surveillance Solutions that further expand the effectiveness of Ocularis. “By continually adding features, functions and integrated technologies to Ocularis, OnSSI continues to deliver better VMS performance with added value that helps our customers save money. These exciting integrations with C2P and Iomnis expand users’ capabilities while enabling them to easily scale their video surveillance systems using cameras of their choosing,” said Ken LaMarca, Vice President of Sales and Marketing, OnSSI, “We are giving attendees the opportunity to see for themselves why Ocularis is the clear VMS choice for customers of all sizes.” The C2P-Ocularis integration provides data in the form of a video stream for easy, intuitive management. The integration allows users to easily locate and access the video they need using textbased events via C2P’s powerful search engine.

Ocularis

Users save time and costs through the certified integration of Ocularis and Iomnis ION Series servers. This easy-todeploy solution delivers the functionality of OnSSI’s Ocularis PS and Ocularis IS video management software plus the confidence that there will not be any conflicts or integration issues. Because the Ocularis software is preloaded on the ION servers, users are assured of fast and easy deployment and seamless operation. OnSSI’s Ocularis IP video management solution is an open-architecture, non-proprietary, video-centric software platform that allows viewing, manage-

ment and recording of video from an unlimited number of IP and non-IP video surveillance cameras. Ocularis also allows for video storage management and can correlate and fuse video and nonvideo events and alerts resulting in automatic video delivery to subscribers of interest. OnSSI offers breakthrough VMS technology that’s field proven at thousands of installations globally. The company’s flagship Ocularis IP security and surveillance platform delivers open architecture, scalability and superior process automation. Ocularis is available as a stand-alone software solution, or pre-installed in best-in-breed servers to simplify implementation with extreme cost-efficiency while affording future expansion. For remote applications, Ocularis Web and Mobile utilize OnSSI’s High Definition Interactive Streaming (HDIS) to provide the fastest and highest resolution mobile and web access video delivery solution available.

Total Connect™ Remote Services

Enhanced with Addition of GPS Vehicle and Asset Tracking Helps security dealers boost RMR and reach new markets; Expands connected home and business offerings

H

oneywell (NYSE: HON) has introduced Honeywell Total Connect Tracking Services, a solution that employs GPS technology to let home and business owners remotely track vehicles and assets in real-time using their personal computers, smartphones or other Internet-enabled mobile devices. The service is an excellent way to keep tabs on teenage and elderly drivers, recover missing vehicles and stolen goods, improve productivity and help users make critical, timely decisions.

“Whether it’s a concerned parent wanting to know that their teenager arrived safely at school, a homeowner monitoring their boat, or a business owner keeping tabs on his fleet and making sure equipment arrived at a job site on time, Honeywell Total Connect Tracking Services can be deployed in countless scenarios – helping dealers reach customers they never could before,” said Dean Mason, Senior Communications Product Manager, Honeywell, “We’re excited about the incredible potential for November 2014

63

growth and RMR.” The new service is the latest addition to Honeywell Total Connect Remote Services, which lets consumers control their security and automation systems, view live video and receive important alerts on web-enabled devices. Honeywell Total Connect Tracking Services can be offered as a standalone solution or combined with security, video and energy management from one seamless, integrated platform. Honeywell offers three devices to meet unique tracking needs:

www.indiasafe.com

CMYK


CMYK

PRODUCT SHOWCASE

● Honeywell Total Connect Vehicle Tracker (TCVT2): The TCVT2 enables tracking of most vehicles on the road today and is ideal for passenger cars, light trucks and service vans. It plugs into the vehicle’s on-board diagnostic system port (OBD-II), which has been required on all cars and most trucks sold in the United States since 1996, and does not require charging. A vehicle tracker extension cable (VT-EXT) is also available. ● Honeywell Total Connect Asset Tracker (TCAT): The TCAT is recommended for powered assets such

E

as boats, jet skis, ATVs, RVs, motorcycles and construction equipment, as well as non-OBD II complaint vehicles and older, classic cars. ● Honeywell Total Connect Asset Tracker with Extended Battery (TCAT-EB): The TCAT-EB is ideal for assets without constant power, such as shipping containers, heavy machinery, generators and outdoor inventory. The service provides on-demand location, speed of travel and history information 24 hours a day, seven days a week. Users can track up to 20 vehicles and assets via Google Maps, view

five-minute tracking ‘breadcrumbs’ and access a 90-day event history. In addition, they can receive text messages and e-mail alerts when vehicles or assets have been moved, exceed speed limits or travel outside pre-determined geographic boundaries (for example, a 20-mile radius from a business or a one-mile radius from a school). “Honeywell Total Connect Tracking Services delivers a great user experience, provides tremendous peace of mind and value, and satisfies the growing demand for an affordable, easy-touse tracking solution that everyone can use,” added Mason.

Elpas Debuts New Generation of Infant Protection Bracelet

lpas, part of the Security Products business unit of Tyco (NYSE: TYC), has introduced a new version of its Infant Protection Bracelet, part of its Infant Protection Solution. The Infant Protection Solution consists of a small, baby-friendly Active RFID Tag, and the Elpas Charm that, when used as part of the Infant Protection Bracelet, enables wireless deterrence of infant abduction and mother-baby mismatch in maternity, obstetrics, neonatal and pediatric departments from the time of birth/ admittance until discharge.

“Technology offerings for the maternity and neonatal environments must be efficient, easy to use and provide hospitals with the flexibility to fit the patient care and security protocols of their facility,” said David Fensterheim, Vice President, Product Management for Elpas, “Our new Infant Protection Bracelet expands the capabilities of our current Infant Protection Solution offerings to this market.” The Elpas Charm, as part of the Infant Protection Solution, provides realtime indoor positioning data so that medical personnel can always know the location, movement and status of the protected infant. With its nylon plastic enclosure, the Elpas Charm is easy to clean and use. The average battery life of the Elpas Charm is approximately two years. The Charm communicates directly November 2014

64

with an Elpas Mother Bracelet, which allows the nurse or mother to verify the mother/ baby match with the press of a button on the mother’s bracelet. This provides nursing staff with a reliable and ubiquitous method for preventing unintended mismatches. The system can integrate with CCTV systems, providing visuals of all alerts, and can also be used for panic alarms, wander control, asset tracking and wireless nurse calls. The infant RFID bracelet is small, lightweight and equipped with a tamper band that alerts when the bracelet is opened – even when submerged in water. For added security, the Infant Protection Bracelet also supports instantaneous near-exit location alerting to help guard against unauthorized departmental transfers and to assist in enforcing staff and family escort policies between hospital departments.

www.indiasafe.com

CMYK


CMYK

PRODUCT SHOWCASE

L

Introducing New Rugged IP PTZ Domes – IPS3102E, IPS2102E ning, users can accurately position the camera to identify specific targets. With a focal length of 4.9 ~ 49mm, and up to 128 programmable preset positions, the IPS3102E and IPS2102E are ideal for a variety of applications.

ILIN introduces its latest IPS3102E, IPS2102E rugged HD IP PTZ domes designed for indoor usage. Both PTZs have built-in Micro SD/ SDHC slot for practical local data backup. Equipped with high speed and precision pan/ tilt/ zoom system, LILIN IPS3102E and IPS2102E PTZ domes bring greatest possible coverage available from one spot. The integrated 10x optical zoom lens, back light compensation, and IR LEDs ensure the best possible image and provide illumination to the utmost. The new PTZs are equipped with microphone and speaker connector for 2-way audio communication possibility. Combine this with Digital Noise Reduction technology and adaptive tone reproduction and the contrast of images in bright or dark areas is dramatically improved. Capable of making 360° continuous pan-

Features ● ● ● ● ● ● ● ● ● ●

10x optical zoom lens (4.9~49mm). Power over Ethernet. 360° endless panning, 128 preset positions. 1/3” MOS sensor camera. With anti-fog function. 16m IR night vision distance. Effective heat dissipation function. ONVIF-compliant. Superior clarity with megapixel resolution (1080P). Day/ night camera with minimum illumination of 0.5 lux (color) and 0 lux (IR on).

EasyConnect

New Automatic IP Camera Addressing Feature, Highlights exacqVision 6.4 Release Latest launch also includes VideoPush video wall feature

E

xacq Technologies, part of the Security Products business unit of Tyco (NYSE: TYC), introduces the new EasyConnect automatic IP camera connector feature with the version 6.4 of exacqVision, a video management system (VMS) software used for video surveillance. EasyConnect provides the power of IP cameras with the simplicity of analog. Version 6.4 also includes the new VideoPush video wall feature, updates to the Exacq Mobile app and

web browser client, and improvements to Enterprise System Manager (ESM), a health monitoring program for use with exacqVision Enterprise networked video recorders (NVRs). The new EasyConnect feature allows users to find, address and connect multiple IP cameras to their network automatically. The exacqVision client scans the network to find new IP cameras and the selected cameras are assigned IP addresses and connected to November 2014

65

a server. This feature saves time and greatly simplifies the process of adding IP cameras to a modern day, networkbased video surveillance solution. EasyConnect supports IP cameras from multiple manufacturers with plans to expand compatibility to most or all of the leading IP camera brands. The initial launch includes support for cameras from Illustra, Axis Communications and Arecont Vision totaling more than 400 cameras.

www.indiasafe.com

CMYK


CMYK

product showcase

“As more users are adopting IP video, the addition of EasyConnect is one of the most significant features that has been added to exacqVision,” notes Scott Dennison, Director of Marketing, Exacq Technologies, “EasyConnect simplifies IP video to the point where it’s almost as easy as installing analog cameras.” VideoPush gives exacqVision Enterprise users the ability to instantly push selected cameras, layouts, tours, groups or entire views to another exacqVision client monitor including other users or

even a public view monitor (PVM). Beyond typical video wall functionality, VideoPush allows any client to be configured to receive video and users to be assigned permissions to push video. Ideal for retail applications, VideoPush adds the opportunity for collaborative viewing of video between multiple locations and users. The latest Exacq Mobile app (Version 3.8) for iOS, Android and Windows Phone 8 devices allows users to set camera tours to regularly peruse important cameras. In addition, the Exacq Mobile app has made camera selection easier. Support for SpeedSearch is now available in the exacqVision web service which provides significantly faster search results when using the web browser client. This is an ideal solution

for low-bandwidth applications. In addition to the new EasyConnect feature, version 6.4 of exacqVision adds support for over 130 new IP cameras including several ‘fisheye’ or panoramic models. The exacqVision VMS now supports over 2,000 IP camera models from the industry’s leading manufacturers. The exacqVision VMS is accessed with the freely distributed exacqVision client software (Windows/ Linux/ Mac), the exacqVision free web browser client available for all leading web browsers (Google Chrome, Firefox, Internet Explorer, Safari and Opera), as well as the free Exacq Mobile app for iOS, Android and Windows Phone 8 devices. The VMS software is included with pre-configured exacqVision NVR servers or it can be installed on third-party Windows or Linux based systems.

Launches Control Center 5.4

Latest release enables proactive surveillance from a single, user-friendly platform

A

vigilon Corporation recently introduced the latest release of the Avigilon Control Center (ACC) software to its innovative product portfolio. Intuitive and user-friendly, ACC 5.4 enables more than just monitoring, search and recording of video analytics events, but also complete video analytics configuration and management support for Avigilon’s HD dome and HD bullet cameras with adaptive video analytics and Rialto analytics appliances. The end-to-end solution provides users with highly accurate real-time alarms for proactive incident monitoring and response in a unified platform. “The combination of ACC’s powerful high-definition video management capabilities with Avigilon’s best-inclass video analytics technology pro-

vides users with an unmatched level of protection and event detection to keep both people and property safe, as well as business intelligence that they can use to make better business decisions,” said Dr. Mahesh Saptharishi, Senior Vice President of Analytics and Data Science, Avigilon, “The launch of the latest version of ACC marks the next successful phase of integrating intelligent video analytics into Avigilon’s industry-leading end-to-end security solution.” Additionally, ACC 5.4 improves enterprise functionality by enhancing support for multi-site locations and simplifying system deployment and management with the following features: ● Site families: Access rights are November 2014

66

now built into your site hierarchy, providing users at a large number of distributed sites secure access to the system. Enabling cross-site user and group administration delivers more efficient management of multi-site deployments. ● Cross-site virtual matrix: Large ACC deployments can display video from multiple physical locations in a central virtual matrix site, which enables customers to centralize incident response management, reducing cost and improving efficiency. The Avigilon Control Center 5.4 software has been demonstrated a the recently held Security Essen tradeshow in Germany and at the ASIS tradeshow in Atlanta, USA.

www.indiasafe.com

CMYK


CMYK

product showcase

XProtect Access Control Module 2014 ®

Access Control Integrations Handle Physical Security from the Easy-to-Use Milestone XProtect Video Interface

Industry trade shows in the U.S. and Europe showcase many new interoperable IP solutions

M

ilestone Systems open platform IP video management software (VMS) integrated with access control systems from multiple Milestone Solution Partners has been presented at this month’s security industry events: SECURITY Essen in Germany and ASIS International in Atlanta, Georgia. Numerous Milestone Solution Partners are using the new XProtect® Access Control Module 2014 to offer unified integrations of their access control systems into Milestone XProtect® video surveillance solutions. The ability to tie video and access events together in this way greatly improves the speed and efficiency of incident investigations and response. Providing the primary and most commonly used access control functions as an integral part of the XProtect® Smart Client interface, the Milestone XProtect Access Control Module 2014 eliminates the need for users to work with disparate independent systems. It also makes it possible to integrate different access control systems within the same XProtect customer installation. The XProtect Smart Client provides the consolidated interface for operating integrated access control systems with such dedicated functions as monitoring access events with video verification, manually assisting passages (controlling doors, gates, etc.), conducting investigations of specific access points or cardholders, easily exporting video evidence

and generating reports. Video of access incidents visually confirms and informs on situations as they happen for better response, and provides documentation for analysis, rectification or prosecution. The Milestone partner ecosystem worldwide is teeming with more than thirty integrations of access control systems with the Milestone video platform, to fill market demands for this kind of solution. Many of these are achieved using the XProtect Access Control Module 2014. Of these access control Milestone Solution Partners, ISONAS is the first to get certification on their ISONAS ACX integration using the XProtect Access Control Module. This means that the integrated solution with their pure-IP access control that is operable from within the XProtect Smart Client interface has been tested and proven for best-practice implementation and documented with optimized configurations. “Milestone XProtect now has the ability to handle both video and access control. The ISONAS-Milestone integration allows customers to seamlessly deploy access control with the same topology as their cameras. This eliminates the need for additional power at the door, resulting in dramatically lower cost-ofownership, providing a more flexible and scalable solution while avoiding the need to re-train Milestone XProtect users. This integration has the ability to dramatically change the way video and November 2014

67

access control are implemented and managed with best-in-class video as the front-end,” says Rob Mossman, CEO at ISONAS. Axis Communications is also entering the physical access control market by introducing in Europe a network door controller with built-in web-based software. AXIS A1001 Network Door Controller is a complement to the existing Axis portfolio of innovative network video products and creates unique integration possibilities for partners and end users, including interoperability via the Milestone XProtect Access Control Module 2014. “By leveraging the embedded functionality of AXIS Entry Manager, Milestone XProtect Access Control Module plays an important role in integrating visual validation of controlled door passage with the AXIS A1001 Network Door Controller,” said Johan Lembre, Director, Global Sales Solution, Enterprise & Medium Business, Axis Communications. XProtect Access Control Module 2014 is part of the Milestone Integration Platform Software Development Kit (MIP SDK), available through Milestone channel partners. This was presented by Milestone Systems at Security Essen and ASIS International. The integrations with the access control systems from Milestone Solution Partners are available through their respective sales channels.

www.indiasafe.com

CMYK


CMYK

68

CMYK


CMYK

white paper

Networked Video Security for

Banks and Credit Unions Fight fraud and lower costs with intelligent video surveillance

Executive summary

across the more than 450 satisfied financial customers already using March Networks solutions. These institutions have increased the quality of their video surveillance, enhanced protection of their customers, members, employees and assets, and dramatically improved the productivity and cost-per-investigation of their fraud teams.

V

ideo security has evolved rapidly over the past decade. As most security and fraud detection experts will recognize, physical security budgets for financial institutions were traditionally allocated to the purchase, operation and maintenance of CCTV surveillance equipment alone. When digital surveillance systems became the industry standard, budgets had to be expanded to include IT infrastructure costs such as user and management PCs, network equipment, and increased bandwidth and storage. Working with many of the world’s leading banks and credit unions, March Networks® has developed networked video security solutions that considerably broaden the standard range of applications to assist those groups fighting some of the most damaging banking exposures today – the fraud investigation and loss prevention teams. These video-based solutions provide customers with real returns on investment. Safeguarding assets, reducing risk and increasing profitability are all part of the equation. This paper discusses the comprehensive view banks and credit unions will want to consider in order to compile a full competitive assessment, including all equipment and infrastructure costs, as well as fraud investigation expenses versus recoveries, and more.

Table 1: Value of March Networks Financial Solutions

Fraud and loss prevention costs

T

he U.S. Secret Service estimates that the financial industry is losing more than a billion dollars annually to incidents of ATM skimming. Add to this all incidents of bank card and cheque fraud, perpetrated by individuals and organized crime rings, and the problem is staggering – affecting banks and credit unions alike, as well as their customers and members. Losses can range from several hundred dollars to many thousands in a single fraud incident. Depending on the amount and bank specific policies, customer accounts may simply be credited for disputed transactions, leaving the bank to absorb the losses, legitimate or not. In many cases, disputes below a certain threshold are not referred to an investigation team due to the time and cost of correlating the necessary video and data evidence. Increasing investigator workloads also strain their responsiveness, just when speed of detection and resolution

Introduction

M

arch Networks solutions provide banks and credit unions with important and often unique returns. Specific budgets will vary by financial institution size and structure, however system enhancements can reduce costs and aid recoveries by 50 percent or more. Thousands of dollars may be saved per retail branch, and can double or even triple a fraud team’s cost effectiveness and success rate. The details outlined in Table 1 are expanded on in the following pages. The product comparisons are intentionally generic but representative. The benefits are those experienced November 2014

69

www.indiasafe.com

CMYK


CMYK

white paper

are critical in order to stem losses more rapidly and protect customer loyalty. Experienced criminals can install a bank-card skimming system – a card reader and pin-hole camera, readily available over the Internet – in 60 seconds or less. Valuable card data is extracted wirelessly and dozens of bank cards are fraudulently replicated, enabling cash to be harvested from the accounts of unsuspecting customers. Such sophisticated criminal activity calls for equally tough defenses. March Networks provides some of the most advanced surveillance and detection tools to help customers in this fight, including Searchlight Skimming Detection and License Plate Tracker – powerful applications that enable fraud investigators to tackle more cases in less time. Searchlight software leverages March Networks’ video analytics and Financial Transaction Investigation (FTI) database to add a level of intelligence that video or data alone cannot provide. It scours ATM data and video records in parallel and, using a customizable rules engine, alerts investigators to potential skimmer installation or cash harvesting incidents. Violations are e-mailed automatically to fraud team members, and correlated video and data evidence, that might otherwise take hours or days to collect, is available in minutes in a simple, organized dashboard complete with thumbnail images that allow investigators to quickly review each potential incident and drill down where needed to get more detail. Searchlight’s Image Tracker feature uses facial detection analytics to add a photo image to each record, while an integrated color detection analytic allows searches based on the color of a suspect’s clothes or vehicle. License plate numbers offer a valuable search dimension to the database and can be detected using standard cameras at minimal cost. Records are saved separately on the server, and can be stored there almost indefinitely enabling investigators to link fraudulent transactions with past occurrences. In spite of the prevalence of electronic banking, cheque fraud is still an area of considerable concern. However, by creating rules that fulfill internal policy guidelines, the March Networks system can ensure that cheque fraud is quickly detected and dealt with. For example, cheques from other banks that exNovember 2014

ceed a certain amount, which generally require additional signing authority, would be flagged, an image saved with the transaction, and the data forwarded to the internal auditor for review. Investigation costs vary enormously depending on the circumstances; however a comparison between traditional methods and the video intelligence applications reveals distinct advantages as outlined in Figure 1. Savings over traditional methods can be as high as 50 to 70% based upon the use of automated alerts, ‘watch lists’ complete with correlated video

Figure 1: A System that Saves Time and Money

and data, versus the fully manual processing of files and surveillance video. More importantly, fast forensic analysis leads to rapid identification of fraudsters, a reduction in losses and client litigation, and consequently improves customer confidence and loyalty in their financial institution. Based upon direct feedback from some of the larger financial institutions, Figure 2 provides a graphical overview of the immense time saving that’s possible when using sophisticated software tools to conduct successful investigations.

March Networks Searchlight applications provide robust, advanced software tools that help detect, investigate and resolve fraud swiftly and cost effectively 70

www.indiasafe.com

CMYK


CMYK

white paper

One major U.S. financial institution has deployed more than 800 March Networks hybrid network video recorders (NVRs), and in four years has had to repair only two of them storage and bandwidth requirements, while an industry-first GURU smartphone application saves installers and technicians time and money in the field. GURU, which is available as a free download for Apple and Android mobile devices, frees partners from typically time-consuming tasks by automating product warranty and RMA shipment status lookups, and providing an interactive LED utility for immediate Figure 2: Average Incident Investigation Time/Cost (3 incident example) NVR diagnostics. When used in conjunction with QR codes on the front panel of the company’s 8000 Series Hybrid NVRs, GURU’s onetouch express Physical security costs rom installation to expansion to ongoing maintenance, RMA completely streamlines repair processing requests. March Networks hybrid surveillance systems are among the most reliable, scalable and cost-effective systems in the IT and infrastructure costs industry. Banks and credit unions can save or avoid signifiigital surveillance systems add IT resource and infracant costs per retail branch annually. For example, one major structure costs to overall security budgets. The quantity U.S. financial institution has deployed more than 800 March and type of network equipment, bandwidth usage, mainteNetworks hybrid network video recorders (NVRs), and in four nance and other items required by surveillance systems varies years has had to repair only two of them. Others have extended considerably. March Networks is a leader in optimizing system their storage capabilities by weeks or even months without a configurations and minimizing the resulting costs for its cusreduction in video quality or the expense of external archiv- tomers. Here are some examples of how this is achieved. ing. Some have cut maintenance costs by thousands of dollars annually. Network/ equipment utilization March Networks has added further applications to enhance arch Networks systems the user experience and reduce costs further still. An online are especially userSystem Design Tool allows users to quickly estimate their friendly, with features and capabilities that enable them to “Before we had the March Networks system, our fraud adapt to almost any customer investigators would first have to access our mainframe IT environment without comand pull reports of each suspicious transaction, one at promising performance. a time. Then we would access our NVRs and search for ● As part of the rapid video video one location at a time. This would take at least search process, March 15 minutes for each search. Now, we simply type in an Networks Investigator account number and a date range, and obtain all the software provides users information we need from all locations, within seconds. with a series of thumbnails This has allowed us to nearly triple our fraud recoveries, evenly spaced across the and the team is very proud of that…” video timeline, providing – Investigation Director, highly efficient previews Major U.S. Financial Institution of all video instead of forc- Figure 3: GURU Smartphone App

F

D

M

November 2014

71

www.indiasafe.com

CMYK


CMYK

white paper

need to download the video to their desktop. Only required evidence clips are downloaded, once again reducing network traffic. ● The 8000 Series Hybrid NVRs support optimized H.264 video compression, allowing the capture and storage of higher quality video without increasing bandwidth and storage requirements. ● Once the required video evidence is pinpointed, March Networks recorders offer robust bandwidth throttling controls that ensure downloads adapt to the network infrastructure available including links with speeds as low as 56 kbps, often found in remote locations. Settings can be varied automatically by time and day to accommodate changing network traffic patterns, or a preset change can be triggered by an event. For example, pressing a ‘holdup’ or panic button will temporarily provide maximum bandwidth to investigators in order to help generate timesensitive evidence. There is no need for a separate video network, and operation is highly efficient without straining the IT budget.

March Networks 8000 Series Hybrid NVRs are the industry’s highest performance recorders, delivering crystal clear video and unparalleled reliability. Together with a suite of advanced software tools, fraud investigators can rapidly zero in on critical forensic evidence, assemble case files and compile sophisticated watch lists.

FEATURES

● 16 and 32-channel models. ● Fully hybrid NVR supporting both analog and IP video streams, or up to 32 all IP channels. ● Multi-level H.264 encoding. ● Embedded Linux OS. ● Docking station option for faster installation and maintenance. ● Optional video analytics enabled on the recorder box with image.

System and network security

M

arch Networks places considerable emphasis on system and network security. Our recorders use a robust Linux operating system, embedded in flash memory. They are impervious to hacking attempts, worms, viruses and other malware that plague Windows based systems, and eliminate the need to install firewall software on these platforms. Because the operating system does not reside on the hard drives, a hard drive fault will not result in system failure. The NVR will continue recording to the other drives – up to four highcapacity drives per device. Better still, a disc mirroring feature protects the video data, and if a drive does fail, it is field

Table 2 - Physical Security Costs and Savings

ing full reviews to find desired clips. Video search efficiency is significantly increased and network requirements are reduced. ● Authorized users can access and play video from any March Networks recorder on the network without the November 2014

Our recorders and software have been subjected to ‘ethical hacks’ by prospective customer IT teams in an effort to test their defenses. The hackers have never succeeded in compromising our systems 72

www.indiasafe.com

CMYK


CMYK

white paper

can lead to savings in maintenance costs. Such features provide a tangible return on investment by optimizing the efforts of support staff, minimizing system outages, and preventing loss of video data.

replaceable in a matter of minutes. Advanced encryption in our video transmission streams, and tamper-proof seals on all exported video evidence provide additional security. March Networks recorders and software have been subjected to ‘ethical hacks’ by prospective customer IT teams in an effort to test their defenses. The hackers have never succeeded in compromising our systems, and those users

Conclusions

F

inancial institutions have no shortage of choices in selecting a video surveillance system. When forward-thinking banks and credit unions examine the multi-layered costs and benefits, a clear leader emerges. The March Networks hybrid IP/ analog video surveillance system is finely tuned to the needs of financial institutions of all sizes, and proven in leading banks worldwide including: ● 6 of the top 10 U.S. banks. ● 5 of the 7 largest banks in Mexico. ● The majority of Canada’s top financial institutions. ● Leading banks across Europe, the Middle East and Asia Pacific.

“In nearly 4 years of supporting March Networks systems, we have only had to change one hard drive. That’s it! I have never worked with a product as bullet-proof as that.” – Lead Technician, Canadian Security Integrator are among the many on our list of satisfied customers. They are convinced that March Networks recorders offer them the highest protection against hacking, viruses and video loss, at no added cost.

“Ranked the #1 supplier of video surveillance equipment in the Amercas banking market.” – As ranked by IMS Research

System maintenance

W

here IT teams are responsible for the programming and maintenance of the video surveillance infrastructure, staff will benefit from the features highlighted earlier under Physical Security Costs. March Networks leads the industry in cost-effective, enterprise-class system management and maintenance capabilities. A single, centrally located workstation can program, control and administer any number of dispersed recorders and their associated user community. System health is not merely checked once a day, but is monitored automatically and continuously, in near real-time. Rapid detection and notification of any problems in network connections, system components or cameras ensures a near fault-free video system. Table 3 summarizes those areas where specific features

Table 3 - System Maintenance Costs and Savings

November 2014

73

Superior recording, storage, cameras and value-added applications and management are significant features that make them standout from the crowd. And they do so with the highest reliability and investment protection, together with the lowest cost-of-ownership in the industry. March Networks®, an independent subsidiary of Infinova®, is a leading provider of intelligent IP video solutions. For more than a decade, the company has helped some of the world’s largest commercial and government organizations transition from traditional CCTV to advanced surveillance technologies used for security, loss prevention, risk mitigation and operational efficiency. Its highly scalable and easy to use Command™ video management platform incorporates a web-based client interface to enable rapid system deployment and complete system control. It is complemented by the company’s portfolio of high-definition IP cameras, encoders, video analytics and hybrid recorders, as well as outstanding professional and managed services. March Networks systems are delivered through an extensive distribution and partner network in more than 50 countries. www.indiasafe.com

CMYK


CMYK

application/ case study

Dahua Video Surveillance Provides Peace of Mind in over 100 Brazilian Cities

B

razil, the fifth largest country in the world, is known for its vitality and passion. As a member of the BRIC countries, it has become one of the fastest growing major economies. The country is now home to more and more international events, in addition to being one of the dream destinations of tourists from around the world. However, all the signs that demonstrate its strength and ever-lasting developing also lead to a reality – the fast urbanization and expansion brings security issues, so how to deal with them is a question. The Brazilian government started to launch a national safe city project years ago, and Dahua was one of the brands they used in the security deployment in over 100 cities, which lie across the coast from the southern part all the way up to the north, from the state of Santa Catarina to Roraima, including

cities such as Florianópolis, São Paulo, Rio de Janeiro etc. Over tens of thousands of pieces of Dahua devices have been adopted in the whole project, and below is an example with safe city project in Florianópolis. Florianópolis, the capital city of Santa Catarina, is known for its beautiful beach scenery and high quality life; its pillar economies are information technology, tourism and services. Although it is one of the highest economic well-being city in Brazil, lessdeveloped regions do exist as well, just like any city elsewhere in the world. Naturally, the products and deployments are required to be different, and under the goal of two ‘M’s – to minimize crimes and maximize citizens’ safety. For the upmarket zone, cameras are mainly installed at the crossroads, public entrances, schools gates and elsewhere

November 2014

74

with high traffic flow, though you need to pay more attention to the privacy in the area, and privacy masking function provided in Dahua DVR is perfect for the region, which allows one to set a maximum of four masking areas for each channel. As for the lesser ordered areas, more focus is put on the key observation sectors, according to the data provided by police; thus, domes and fixed cameras are used as combination to better fix and follow a target. Moreover, the data is processed in Dahua DVR, and the volume is transmitted to its higher platform for overall management. The whole system runs Dahua comprehensive central management software and some customized functions are integrated to CMS to give a more timely response. Meanwhile, a series of customization have been offered in this case. Dahua re-designed user interface and added USB and wireless Wi-Fi modules; in addition, a network wizard in judging errors was built into the device to help technicians diagnose problems in a more effective way. As for cameras, image parameters and switching time (day/ night) were customized as well. Moreover, Dahua prepared a lot of special materials in this case, such as special printing, color packaging, labels, specifications and CD, all the work was carefully double-checked and received good feedback.

www.indiasafe.com

CMYK


CMYK

application/ case study

“It is noteworthy that we successfully accomplished a large project like this,” said Thomas Ma, Sales Manager of Latin-America and Africa at Dahua Technology, “Actually, we see this project as an impressive safe city experience

accumulator, during which we spent a lot of time in communication and gave strong support to make sure everything went right.” “We reinforced our strength in an all-around way, and learned to have

more alternatives and approaches to deal with a problem and then take care of it; finally work out with a solution in both a time and money saving way, and that is why experience matters,” Ma added.

Largest Scottish University Centralizes Security

M

Milestone-Axis IP video solution from Boston Networks provides control of multiple campus locations

ilestone Systems open platform IP video management software (VMS) and network cameras from Axis Communications are helping all of the campus locations for the University of the West of Scotland to more efficiently manage security through one unified surveillance solution, designed, delivered and maintained by Boston Networks. The University of the West of Scotland (UWS) is one of the country’s largest modern universities, providing higher education and innovative research, with campuses in Ayr, Dumfries, Hamilton and Paisley which indicates an important regional role in the communities. The university is organized into different academic schools across the campuses, offering a wide range of academic, social and sporting facilities and delivering a range of courses, post-graduate programs, masters and research degrees. The university currently has over 18,000 students and approximately 1,300 staff. Ensuring their safety is a top focus. The four campuses across the west coast of Scotland had all been previously running disparate security systems. The university recognized that a centralized

approach to the control and maintenance of its entire security estate would create a more effective solution and safer campuses. UWS had already begun the migration of its infrastructure to a more streamlined IP video solution, resulting in multiple variations of Milestone VMS which were not yet centralized. Boston Networks then worked with the university to review each of its existing installations across multiple campuses, to produce a detailed migration plan which incorporated the following:

November 2014

75

● Centralized Milestone XProtect® Expert VMS to control the largest campus. ● Integration of all Axis digital cameras to provide ubiquitous surveillance. ● Maintenance and support service to ensure ongoing maximum system performance. The initial phase of the migration included the introduction of additional Axis IP cameras across indoor and outdoor areas of the Paisley campus to pro-

www.indiasafe.com

CMYK


CMYK

application/ case study

vide surveillance throughout key areas, including hallways and corridors, libraries, building entrances and exits, car parks and outdoor campus areas. Boston Networks then began the integration of more than 200 new IP cameras and the consolidation of the existing VMS platforms to a central monitoring station at the Paisley campus. The platforms were then wholly upgraded to one standard Milestone XProtect Expert platform. The use of industry-leading technology coupled with the professional consultancy, design and deployment services from Boston Networks has enabled the university to increase security with enhanced image quality and centralized control. The advanced Axis network cameras and Milestone XProtect Expert open platform IP VMS provide HDquality footage with a powerful management interface to effectively control the university’s multi-campus surveillance in a single, uniform system.

Paul Goodbrand, Director of Intelligent Buildings, Boston Networks says, “This solution provides many benefits for the university: superior image quality from Axis cameras, future-proof integration capabilities from the Milestone open platform software and distributed intelligence with IP scalability and cost effectiveness. Moreover, Boston Networks will continue to work with the university to maintain its system and ensure that performance and security are never compromised.” Milestone XProtect Expert VMS was chosen for its strengths as a central management tool. The software interface delivers a wide range of dynamic resources to streamline the system administration of the university’s multi-campus solution, including device group management which ensures efficient and structured handling of hundreds of cameras. The XProtect System Monitor also gives real-time

feedback on system performance to drive proactive administration, and there are intelligent configuration reports. High-performance video recording is achieved with the XProtect 64bit recording server, which allows the university to efficiently run more cameras on less hardware. Unlimited system scalability gives full flexibility to add additional servers and expand the system to suit the university’s changing requirements over time. Multi-live streaming of live footage, with optimized bandwidth and viewing performance, are ideal for the university’s multi-campus estate. Boston Networks continues to work with the university to maintain the new security system, in its entirety. The maintenance service provides direct access to the Network Operations Centre (NOC) and 24/7 vendor-accredited support to deliver maximum service availability.

HID Global Provides Secure Mobile Banking Solution and Multi-Factor Authentication to Hypo Alpe-Adria-Bank in Croatia

H

ID Global® has announced that its ActivID® Authentication Appliance and ActivID Soft Token identity assurance solutions have been deployed by Hypo Alpe-Adria-Bank in Croatia to provide their customers secure mobile and internet banking. Hypo AlpeAdria-Bank ranks in the top five banks in Croatia that offer financial services to individuals, sole proprietors, and corporate entities. Since entering the Croatian market in 1994, the bank has focused on

being at the forefront of innovation and offers a broad range of products and services. To address the growing, sophisticated needs of banking customers for ‘anytime, anywhere’ access throughout the country, Hypo Alpe-Adria-Bank was seeking an integrated, authentication platform that could secure its internet and mobile banking, while also offering a flexible, future-proof framework for adding multi-factor authentication to November 2014

76

respond to current and evolving online threats. In addition, it was critical for the bank to deploy a convenient and innovative authentication solution that could provide their customers with an exceptional experience. “HID Global is a recognized brand and offers secure identity solutions to ensure our customers’ trust in online and mobile banking,” said Alberto Skendrović, Executive Director Organization/ IT with Hypo Alpe-Adria-Bank

www.indiasafe.com

CMYK


CMYK

application/ case study

in Croatia, “We do not see any authentication solution that can compete with HID Global.” “Our goal is to deliver an exemplary experience to our customers,” said Harm Radstaak, Managing Director EMEA with HID Global, “We are delighted that HID Global’s advanced identity assurance solutions have enabled Hypo Alpe-Adria-Bank to increase their customers’ loyalty and deliver on its promise to offer innovative and secure mobile and internet banking services.” The bank implemented two-factor authentication for its innovative mobile

● HID Global’s ActivID Authentication Appliance and ActivID Soft Token solution selected by Hypo Alpe-Adria-Bank. ● Company’s integrated, authentication platform enables bank to offer customers secure mobile and internet banking. ● Solution resulted in the bank offering their customers a higher level of security without compromising a convenient and seamless user experience. banking solution. This deployment of HID Global’s ActivID Authentication Appliance was a critical component

for providing their customers peace of mind when accessing banking services from anywhere and from multiple devices. It also strengthened Hypo AlpeAdria-Bank’s multi-channel strategy by applying consistent security across multiple service channels, thus adhering to common best practices for online banking. Based on its continued successful relationship with HID Global, the bank continues to confidently rely on Genuine HID® solutions to secure new service offerings for small- and medium-sized retail, corporate and mobile banking customers.

Vivotek Secures British Lighthouse Luxurious lighthouse Bed and Breakfast shares beautiful scenes and maximizes security using state-of-the-art VIVOTEK cameras

T

he Belle Tout Lighthouse is a decommissioned lighthouse and British landmark located at Beachy Head, East Sussex. The lighthouse has been coined ‘Britain’s most famous inhabited lighthouse’ because of its breathtaking location and numerous televised appearances. In 2008, the lighthouse was purchased by David and Barbara Shaw, whom engaged in a 2-year, £1.2 million renovation project to convert the landmark into a luxurious bed and breakfast (B&B). Since then, the Belle Tout Lighthouse has achieved the second highest rating on Tripadvisor for the Eastbourne region and received several certificates of excellence. Moreover, the Belle Tout Lighthouse website accumulates approximately 100,000 visitors a year, the bulk of which are potential visitors and interested media.

Reputation and publicity are key factors that govern the sustainability of B&Bs. For accommodation-based businesses, reputation can be maintained by improving the overall safety of the establishment; whereas the sharing of those beautiful scenes around the place is the primary method of gaining publicity. In this context, Rob Wassell, writer, light-

November 2014

77

house enthusiast and IT expert, adopted VIVOTEK’s network cameras in the effort to satisfy both factors. In addition, the solution must be extremely robust and flexible to withstand harsh outdoor and erosive conditions and to capture quality images that not are only attractive to visitors, but also clear-cut to identify potential risks.

www.indiasafe.com

CMYK


CMYK

application/ case study

Live viewing the magnificent scenery online

B

ased on the client’s requirement, VIVOTEK created a solution comprising two state-of-the-art bullet-style network cameras - the IP8332-C and the IP8332. Regarding camera specifications, the IP8332 and the IP8332-C are relatively similar. Both cameras feature a 1MP CMOS capable of capturing video at 1280x800 resolution at 30fps, and removable IR-cut filters and IR illuminators (effective range of 15m) for surveillance under low-light conditions. The primary difference between the two models is the mounting bracket featured on the IP8332-C for cable protection. Moreover, both cameras are encased in an IP66-rated housing and

weatherproof casing to withstand rain and dust. The cameras were installed on the east (IP8332) and west (IP8332-C) side of the lighthouse, and the video feeds were linked to the lighthouse’s website. Potential visitors could then log on to the website and take a firsthand glimpse of the magnificent scenery of Beachy Head, such as the panoramic English Channel or the enigmatic Seven Sisters. In addition, management also employed the cameras as a monitoring mechanism to guard against vandalism, avoid potential hazards, and ensure visitors receive a world-class experience 24 hours a day.

The versatility and the

excellent quality made VIVOTEK’s solution a great success

R

ob Wassell asserted, “The VIVOTEK solution is a great success. The versatility of the IP8332 and the IP8332-C supports a wide range of applications, such as video recording, snapshot recording, and writing to NAS or FTP. In fact, with so many configurable options, this solution has been able to satisfy all my needs. Having used numerous brands in the past, the VIVOTEK camera has outperformed each and every one of them in terms of workmanship, reliability, security, ease-of-use, and quality. There has yet to be a requirement that VIVOTEK cannot fulfill.”

NEC Asia Pacific to Implement Solutions for

SMRT Corporation to Enhance Bus Service Excellence First telematics system in Singapore to monitor bus drivers’ driving behavior

N

EC Asia Pacific, a leading infocomm technology provider and

wholly owned subsidiary of NEC Corporation, will be implementing soluTelematics system provides visual cues to bus drivers when speeding, braking, accelerating or when driving abruptly, to encourage safer and more sustainable driving for an enhanced commuter experience

November 2014

78

tions for SMRT Corporation, a Singapore public transport service provider, that will enhance bus service excellence through improving bus drivers’ driving behaviour and bus operations. NEC Asia Pacific had recently implemented Singapore’s first telematics system consisting of eco-drive sensors that monitor and analyse driving behaviour. The sensor indicators will light up when a bus driver speeds for a prolonged period, accelerates or decelerates quickly, or changes lane abruptly, and provides visual cues for bus drivers to adjust their driving speed. The bus performance data is transmitted from each bus to a real-

www.indiasafe.com

CMYK


CMYK

APPLICATION/ CASE STUDY

time centralised tracking software solution monitored at the control station via Global Positioning System (GPS). The telematics system will be installed on SMRT’s fleet of 1,200 buses. As part of the collaboration, NEC Asia Pacific will be implementing business analytics which leverage on Big Data technologies to identify high-risk driving behaviours, through analysing data collected from the driver profiles, driving behaviour, historical route-related information, as well as others. This will enable SMRT to align risk management and performance monitoring strategies to enhance passenger safety and mitigate risks. In addition, NEC Asia Pacific will

also be implementing smart fleet solutions to manage operations and monitor the buses’ exact locations. Coupled with GPS, proprietary dead reckoning algorithms will also be implemented as part of the solution to provide bus locations in real-time for a finer level of control. With this solution, the distribution of buses can be monitored with greater real-time accuracy by route coordinators on an on-screen map, to help in quick decision-making. As part of the smart fleet solutions, the self-equalising headway engine solution will also be implemented. It will recognise when bunching or gapping of buses occur, and will automatically suggest options that can help maintain

regular spacing between buses to reduce passenger waiting time. “NEC Asia Pacific is excited to be the technology partner for SMRT’s telematics and fleet management system to help deliver a better commuting experience to the public. The telematics project marks the first public transportation programme launched in Singapore targeted to enhance driving behaviour of bus drivers. We are glad to leverage on our expertise in implementing innovative smart city and public infrastructure solutions to deliver state-of-the-art transport solutions that will benefit public commuters,” said Lim Kok Quee, Managing Director, NEC Asia Pacific.

Quintron’s AccessNsite Brings Security and Peace of Mind to Kettering City Schools Q

uintron Systems, Inc. (quintron. com), the recognized leader in advanced interoperable voice systems and physical access control/ intrusion detection systems, has announced that its access control system, AccessNsite, has been installed district wide in the Kettering City Schools (Kettering, OH) by Copp Integrated Systems. “This security system brings centralized user administration and control over all perimeter doors, eliminating access by unauthorized people providing a safer environment within the schools,” said Bill DeFries, CEO and Owner of Copp Integrated Systems, “In addition, the keyless entry minimizes the security risk of lost keys, reduces locksmith costs, and allows more convenient access for faculty and staff after-hours and on weekends.”

“Prior to this security installation, the facilities lacked electronic perimeter control of the pedestrian doors,” said Phill Hacker, Kettering City Schools Supervisor of Buildings and Grounds, “Now all of our buildings in our entire school district are secure, and policies are in place to use only designated entry and exit points.” Kettering City Schools ordered a comprehensive security study of their facilities to evaluate the need for improvements and upgrades. The conclusions specified a need to replace and upgrade perimeter doors with electrical systems integration for access control and video surveillance, as well as a new intercom communication system. In the end when all of the access control competitors were compared, Quintron AccessNsite was

November 2014

79

selected due to its capabilities and price. “Copp has a long standing history in the Dayton area for being a full-service electrical systems integration company that provides quality work and stands behind what they do,” said Richard Finnegan, VP and General Manager, Security Systems Division at Quintron, “We’ve worked with them for years and consider them to be a valuable dealer and partner.” AccessNsite provides unlimited system scalability, flexibility, and reliability for any facility, from a small business to a large enterprise, protecting it against unauthorized access. Its intuitive user interface makes accessing personnel profiles and setting up permissions, managing alarms and events, and running simple to complex reports easy, even to the novice user.

www.indiasafe.com

CMYK


CMYK

INTERNATIONAL UPDATES

Apple NFC Could be Lightning Rod for Change in Access Control Industry F

or more than four years now, one of the most talked about trends has been near field communication (NFC). NFC was supposed to change the face of the access control industry by eliminating the need for cards, subsequently reducing the administrative burden on organizations of all sizes, all while increasing security. However this has not yet come to pass, with suppliers offering little more than pilot projects, with limited real-world installations. NFC isn’t a new concept. In 2006, Nokia released the first NFC phone, followed by Samsung in 2010 which released the first Android NFC phone. In 2011, Samsung announced its SecuNFC technology. According to Samsung, the Secu-NFC chip combines a NFC controller and a secure element storing personal information and security keys with advanced encryption technologies. In 2013, Samsung and Visa announced a major partnership for mobile payments. The list of NFC enabled phones today is extensive. Examples include Alcatel, Asus, BlackBerry, Nexus, HTC, Kyocera and LG among many others. Historically, most NFC installations were instigated by partnerships between handset manufacturers and financial institutions, producing closed systems with limited opportunity for developers to expand the concept to uses beyond mobile payment. IHS believes this has been one of the main barriers for implementing NFC in the access control industry. On September 9th, Apple announced NFC would be a feature of the new iP-

hone 6. While Apple Pay is primarily a mechanism for secure mobile payments, there appears to be plenty of opportunity for other applications, since iOS 8 will also have an Apple Pay application programming interface (API) available for developers. Already, many retailers and restaurants have implemented Apple Pay into their own applications, allowing patrons to skip lines and pay/ order directly from a mobile device. According to Apple, the mobile payment transaction occurs by assigning a unique device account number, which is encrypted and securely stored in the secure element, a dedicated chip in the iPhone. When a purchase is made, the device account number alongside a transaction-specific dynamic security code is used to process the payment. So the actual credit or debit card numbers are never shared with merchants or transmitted with payment. The true benefit of this announcement for the access control industry is the potential use of the open API for developers. Although Samsung Galaxy has an embedded SE and countless other devices offer subscriber identification module (SIM)-based SE, there has been limited traction for access control. So what exactly is the secure element? There are many forms of secure element, including the universal integrated circuit card (UICC) – NFC SIM, embedded SE, external (sticker or sleeve) and microSD. The most used formats are UICC and embedded, with the new iPhone 6 featuring an embedded SE. According to the 2014 IHS report on November 2014

80

NFC, globally 18.2 percent of cellular handsets shipped in 2013 were NFCenabled (up from about 8% in 2012). IHS forecasts the number of phones that are NFC-enabled to reach about 1.17 billion by 2018. The report also estimates that about 70% of NFC secure element implementations into cellular handsets were embedded and 27% were on the SIM card in 2013.

What does this mean for the access control industry?

T

he announcement by Apple addresses one of the barriers the access control industry has faced with regards to NFC, i.e., loading an identifier onto the secure element. With the API mentioned by Apple, it is possible that access control manufacturers – among others in the supply chain – could load and command an identifier directly onto the secure element. Currently, most providers of NFC-based access control are using encryption methods which are located in the ‘sand box’ (host operating system) of the handset only, not the SE. By using host card emulation (HCE), providers are able to offer NFC outside of the SE. Although this isn’t deemed a ‘best practice’ the only other means to provide mobile access control through NFC would be to partner with all the cellular carriers and providers, which can be an incredibly arduous process. By partnering, the access supplier is allowed access to the SE, which is typically either embedded or in the SIM card. One example of such a partnership

www.indiasafe.com

CMYK


CMYK

INTERNATIONAL UPDATES

is HID and Oberthur Technologies. In 2013, HID announced a partnership with Oberthur Technologies to carry Seos Digital Keys on NFC SIM Cards. As mentioned above, the Apple announcement could make it easier for access control suppliers to provide mobile credentials with the true security provided by the secure element. Beyond the buzz, the market opportunity for access control remains unclear and only time will tell if Apple providing mobile payment will jumpstart NFC usage for access control. Some access control manufacturers speculate that the use of the secure element may not always be necessary and that the encryption provided for access control data on the handset is sufficient for most end-users. So how quickly could this announcement impact access control? Today, data suggests that less than 3 percent of retailers, or 220,000 out of about 9 million, will be utilizing the mobile payments at the start. One of the main reasons for low adoption is the lack of infrastructure in stores. However, every

credit card in the U.S. will be required to have EMV chip-and-pin technology by October 2015. As a result, merchants could decide to move forward with NFC capabilities since they will need to upgrade their system anyway. Interestingly enough, Apple is only launching in the U.S., which has the lowest penetration rate of mobile payments compared with all other regions. There is tremendous upside though. Access control end-users already have the infrastructure in place to support NFC, e.g., the smart card reader (13.56 MHz). While some pieces of the system may need upgraded such as incompatible hardware and software, the system is mostly ready. So unlike the retail space which has to replace millions of terminals and retrain employees, access control is already primed for the transition. Overall, Apple could instigate change for the access control industry; however, adoption will remain low due to the other barriers which have not been addressed, such as mobile phone issuance to colleagues and identifying which department in an organization

will manage the mobile credentials, since in most cases, the phone would be managed by IT and the security credential would be managed by the security department. New policies and procedures will have to be created and many end-users will still be issued badges for identification purposes. Lastly, Bluetooth is becoming a viable alternative to NFC. Security suppliers have been working for the past several years to work with NFC and implement it beyond pilot projects to little avail. As a result, many are turning to Bluetooth, which is deemed by many to be a more robust option for security purposes such as access control since the read range can be modified, among other reasons. Additionally, Bluetooth has a longer history than NFC with smartphones, with Bluetooth being introduced in 2000, NFC in 2006. So while the Apple announcement gets the ball rolling for NFC in the physical security space by providing more outlets for app developers to create a unique user experience, other barriers still need to be overcome prior to reaching critical mass.

SeeTec AG and BCDVideo – A Joint Solution for Powerful and Reliable Video Surveillance

S

eeTec AG and BCDVideo, a global manufacturer of high-performance IP recording systems for the video surveillance market, announced their Technology Partnership for SeeTec Cayuga and the BCDVideo product family. As both companies are leading in their segment the cooperation provides high standard for video surveillance projects of any size. Since the year 2000 SeeTec has been

“We always have our eyes open for reliable and cutting-edge solutions in the market to expand our portfolio. We are more than happy to announce our Technology Partnership with BCDVideo as they have a great experience in their field of work and a big customer base. Using the combination of SeeTec and BCDVideo, we offer customers an improved performance. That’s what we are eager for.” – Daniel Bechler Strategic Alliances Manager, SeeTec November 2014

81

www.indiasafe.com

CMYK


CMYK

International Updates

“SeeTec’s customers can be assured that their project will run seamlessly on a scalable and reliable platform, tested to support Cayuga. We take great pride in both our ability to fully support SeeTec’s family of products as well as our ongoing technology partnership with SeeTec.” – Jeff Burgess BCDVideo Company, Founder & President developing and distributing software solutions for video security applications. SeeTec has become one of the leading VMS vendors in Europe, providing solutions which can be tailored to the individual needs of industries and customers. As HP’s authorized global OEM IP video

partner, BCDVideo delivers a proven, reliable solution built to perform for the duration of the customer’s IP video project. The BCDVideo Technology Center and the SeeTec Technology Trust have certified each other’s product and agreed on an official technology partnership.

The joint solution of BCDVideo recording server and SeeTec software offers customers a powerful and reliable system. The entire family of BCDVideo products are optimized for robust video surveillance, ensuring stable recording, with a lower Total Cost of Ownership than traditional non-video optimized IT servers. That way video system users benefit from high reliability and simple and intuitive working. The combined approach is suitable for a wide range of video surveillance projects – covering mid-size and large projects, as well as different industries like logistics, retail, finance, critical infrastructure and many more.

Survey Reveals Continued Strong Trend Towards Network IP

According to the latest annual Centre for Retail Research (CRR) survey into the use of CCTV in retail – commissioned by Axis Communications – over 60% of UK retailers are planning to adopt network IP in the next three years and nearly a third have adopted it already, up from a quarter in 2012

O

f the 278 UK retailers that responded, encompassing some 20,350 stores, the data showed that 92.8% currently use CCTV. Of these, 32.1% have already upgraded to network IP technology – representing a 2.5% rise in take up from the previous year’s figures. This trend is even more pronounced across the wider northern European region, with 58.5% (weighted average) of analogue users now planning to switch to network IP – representing a significant increase of 17% on 2012 figures. The survey, now in its fourth year, polled 2,200 retailers, and received 673 responses from across northern Europe. The results of the survey were presented

at the Retail Fraud Show in Leicester by Atul Rajput, Regional Director, Northern Europe at Axis Communications and Professor Joshua Bamfield, Director at the CRR. Reacting to the results, Atul commented, “The migration from analogue CCTV to network IP continues to be of huge importance to the retail industry with the majority of UK retailers (60.3%) now planning to convert in the next three years, with over three quarters (77.1%) of those owning a retail estate of between 26 and 500 stores. This is therefore likely to be the biggest single factor impacting on retail security as digital surveillance and network video November 2014

82

become the standard. Certainly for the UK, I believe that the migration to network IP has become the norm and it is no longer a question of ‘if’ but ‘when’ the technology will be adopted. “The survey suggests that customer theft is still the biggest security challenge facing retailers at the moment, as nearly a quarter (24.2%) said that their main reason for using CCTV is to prevent or investigate theft and a huge 80% of respondents cited prevention of internal or external theft and better safety as the main driver for the use of CCTV. “The UK as a whole has embraced the benefits that CCTV can bring and the country’s retailers are no exception. 22%

www.indiasafe.com

CMYK


CMYK

INTERNATIONAL UPDATES

of those surveyed stated that the main benefit of CCTV was to reduce theft with an estimated average fall in loss of 15% – the highest prediction in northern Europe and up on the previous year. Couple this with the fact that 14% of respondents cite ‘quality of image’ as an important driver for the use of network video – a 40% increase on the previous year – and it’s clear to see that the high definition images that network video can offer, are critically important for retailers in driving down theft and improving safety.” The survey also asked respondents about their attitudes toward potential future application systems and networks for digital surveillance, including nonsecurity issues. Over a quarter (27%) cited ‘integration with business intelligence applications’ as the main reason for adopting network IP – the highest in the UK and across northern Europe. “High street stores are still the origin of most retail transactions but carry the highest overheads, so the need to reduce cost and complexity of in-store

surveillance systems and, at the same time, ‘sweat the assets’ further, is vital. This is where network IP really has the advantage as it can be used to improve both service and sales, not just security, to deliver a real return on investment. “The use of cloud-based video systems has shown an increase in interest from UK retailers and so too has the interest around non-security applications. Nearly half (49.9%) of respondents were interested in queue management and people counting (49.2%) as new tools to improve both operational sales and marketing performance. “As well as the rise of non-security applications, big data, cloud and mobile technologies are all trends that are impacting on the retail sector. As network video is an open platform solution and can seamlessly allow integration with these technologies, it can help to maximise the return on in-store video investment by extending its use beyond pure surveillance into a business optimisation tool.” Professor Joshua Bamfield, Director at CRR added, “The survey clearly

highlights the continued move towards IP-based camera systems across the retail sector, a growing trend that is driven by the need for HD-quality images and the increased adoption and use of business-focussed analytics – two areas where IP systems demonstrate a clear advantage over older technologies. It further suggests that retailers continue to appreciate the added benefits that an IP-based system can deliver which is evident in the high convergence rate each year.” The ‘CCTV in Retail’ survey was commissioned by Axis Communications and was run in conjunction with the Centre for Retail Research in Nottingham. Now in its fourth year, it surveyed 2,200 retailers both large and small from a wide variety of sectors and attracted 673 responses from retailers in the UK, Ireland, Denmark, Finland, Norway and Sweden. The research was carried out by the CRR between July and August 2014 and follows similar Axis-commissioned surveys in 2013, 2012 and 2010.

Nigeria Launches Electronic Identity Cards Based on Cryptovision Technology W

Africa’s most populous country has gone live with one of the most ambitious e-ID projects in the world on the largest of scales

ith 160 million inhabitants, Nigeria is the most populous country in Africa. Now this emerging country can claim another title – after several years of preparation time, the National Identity Management Commission of Nigeria (NIMC) has now launched the first national electronic identity card with a payment application.

At the end of August 2014 the first lot of Nigerians received their copy of this multifunctional e-ID document, a contact smart card similar to a traditional credit card. This polycarbonate e-ID replaces the current printed plastic identification document. To make the card usable, a sophisticated e-ID infrastructure has been deployed, which inNovember 2014

83

cludes registration authorities, identity management systems, and secure card production facilities. Additionally, mobile devices for enrolling, reading and even updating some data stored on the card are important infrastructure components. In the first phase, the Nigerian e-ID is used for three applications: as a proof

www.indiasafe.com

CMYK


CMYK

International Updates

of identity, for digital payment (based on the EMV standard), and for digital signature with biometrics. The Nigerian e-ID is the first national project in the world that combines e-ID functionality with a payment system. Following the motto ‘Bank the Unbanked’ this feature provides first time access to electronic payment to millions of Nigerian citizens. In the next project phases the multifunction card will be extended to support additional electronic uses like driving license, health information card, tax record and voting functionality. Other technical aspects of the Nigerian e-ID project are impressive as well. With full card issuance it will represent one of the largest and most complex Public Key Infrastructure (PKI) deployed worldwide. This PKI comprises eight certification authorities and will issue over 300 million certificates. This infrastructure is necessary to protect the e-ID system and the card itself from hacker attacks. The various applications that run on the Nigerian e-ID card have been implemented with Java Card technology. This open standards based approach delivers

a high level of transparency and independence for the customer. In addition, the modular architecture easily enables future extensions and changes. A new card profile was developed especially for the Nigerian identity card in order to support this functionality. Within this framework it is possible to implement such a large range of applications on a single smart card. To encourage the electronic uses of the e-ID card, every e-ID cardholder is entitled to use a special NIMC branded middleware which includes the necessary cryptographic interfaces and libraries to use biometrics and digital signature on personal computers running Windows, OS X, or Linux. All aforementioned core software components (PKI, card applications, and smartcard middleware) are delivered by cryptovision. “We are thrilled that our entire solution range is applied in this unique project,” says Markus Hoffmeister, CEO and Managing Director of the Gelsenkirchen-based company. cryptovision acts as key part of a consortium consisting of leading technology companies including NXP, Trüb,

Austria Card, MasterCard and Datacard. The cooperation of each of these different vendors has enabled this unparalleled scope of this project. This project approach requres the overall architecture of the e-ID system to be based on established standards and documented interfaces. Without a prime systems integrator, the major part of the deployment work takes place onsite in close cooperation of the consortium members. This paradigm facilitates the Nigerian government to develop in-house expertise and alleviates any dependence from the respective technology providers. This approach was favored over a turnkey solution delivered by a single vendor, as the complexity of the resulting system could be a major problem for the operator without inhouse experience at all of the infrastructure components. Markus says, “We are greatly indebted to NIMC because they are not only a reliable partner, but also have the expertise and courage to implement such an innovative approach.” The new Nigerian e-ID card is a multifunction document and was launched in August this year.

Germany’s Biggest-Ever Bilateral Cooperation for Rescue Services Germany and China to showcase world-unique project at INTERSCHUTZ 2015

G

ermany is helping China to modernize its emergency rescue services under a long-standing and successful partnership that was taken to a new level a few days ago with the signing of an action plan for cooperation on healthcare during the China-Germany intergovernmental consultations in Berlin. The action plan includes rescue and emergency medical services. China and Germany

plan to profile their cooperation, including this exciting new intergovernmental development, at a joint pavilion at INTERSCHUTZ 2015, the world’s leading exhibition for rescue, fire prevention, disaster relief, safety and security, which will be held in Hannover, Germany, in June 2015. The German side of the cooperation with China is spearheaded by the November 2014

84

Björn Steiger Foundation under the joint medical directorship of Dr. Roland Huf, of Munich University Hospital (KUM), and Dr. Stefan Lührs, a noted emergency medical specialist. Dr. Lührs said, “The cooperation project, which has now received official government blessing, is Germany’s biggest-ever bilateral cooperation project in the field of emergency and rescue services.”

www.indiasafe.com

CMYK


CMYK

INTERNATIONAL UPDATES

The Björn Steiger Foundation was instrumental in setting up Germany’s modern emergency rescue service. In terms of its involvement in China, the Foundation is responsible mainly for designing and structuring China’s emergency rescue service and for overseeing the provision of state-of-the-art technical equipment. It has already developed a master plan for modernizing and developing the country’s emergency rescue infrastructure with the aim of creating an integrated land- and air-based service modeled on the German system. The master plan will initially be implemented in two cities: Wuhan, the capital of Hubei Province, and Jieyang, Guangdong Province. “We are proud to have the opportunity to present this bold and ambitious project next year at INTERSCHUTZ in Hannover,” said Dr. Jochen Köckler, a member of the Managing Board of Deutsche Messe AG, the company that

organizes INTERSCHUTZ, “Needless to say, our primary interest is in the humanitarian benefits that a state-of-theart rescue and disaster relief service can deliver. Having said that, we are also pleased to say that the cooperation is a boon to the economies of both countries. Both aspects will be evident at the German-Chinese joint pavilion.” Several German companies are playing a key part in the cooperative project and have already agreed to exhibit at the German-Chinese joint pavilion at INTERSCHUTZ. Among them are

Airbus Helicopters, Daimler, Strobel, Volkswagen and Ziegler. Several of these firms already have branch offices in China, where their activities are creating jobs for local people. The modern rescue service infrastructure they are helping to build is also making the participating Chinese cities more attractive for foreign experts and investors. Germany and China have been working together closely in the field of rescue services and disaster relief for several years. The cooperation is supported by Germany’s Ministry of Health, which in March this year hosted a high-level meeting at which the Mayor of Jieyang, Dong Chen, signed a Memorandum of Understanding on cooperation in the area of emergency rescue services. Chen and his delegation of Chinese government and industry representatives also signed numerous economic agreements in the course of their trip to Germany.

Residential Security – Something for Everyone T he residential security market will never be the same. In 2012, several MSOs (multiple-system operators) in the USA began offering home automation in conjunction with security which has altered the perception and demand from end-users. Prior to this paradigm shift, the use of a residential burglar alarm system was often a purchase to protect a property and in many cases, an ‘after the fact’ purchase as a result of a break in. While many reasons exist to

why a homeowner may purchase security equipment, the reason is no longer solely security, with many users looking to add additional features which are life safety and convenience driven. IHS estimated the world market for security devices in traditionally monitored homes (for example – ADT) to be worth about $2.9 billion in 2014, compared with $670 million for smart homes (for example - ADT Pulse). By 2018, the revenue of smart homes is forecast to top $2.4 billion,

November 2014

85

according to a recent report from IHS. These rapid changes to the residential security market have been mostly positive; however, the influx of competitors has dramatically changed the make-up of this industry. Ten years ago, professionally installed, centrally monitored systems were the main offer available to end-users. However, this has changed and today products are offered by monitoring companies, MSOs, electric companies, retailers and DIY (do-

www.indiasafe.com

CMYK


CMYK

INTERNATIONAL UPDATES

it-yourself) equipment manufacturers. End-users can find innovative products from new market entrants such as Google and Apple which until recently did not have an offering for the residential security or home automation space. So what does this mean for ‘smart’

residential security market moving forward? For manufacturers, it means despite the increase in competition, the market offers ample opportunity for all due to the current, low penetration rate of smart products. For end-users it means more product/ solution and pric-

ing options are available than ever before. Finally for the dealers, installers and monitoring companies, the release of new, innovative products/ solutions creates better sales opportunities by being able to better meet customers’ needs and budgets.

Invixium Expands Distribution Agreement with Ingram Micro Canadian made biometric access control products now more accessible globally as it expands distributorship to India

I

nvixium Access Inc., a Canadian manufacturer of next-generation biometric products and solutions, announced that it has expanded its distribution with Ingram Micro whereby Ingram Micro India Ltd. will now distribute Invixium’s IXM product line of modern biometric access control solutions to channel partners throughout India. The partnership is expected to fulfill the ever growing demand in India for exquisitely designed products with robust quality for various biometric access control installations, including government, corporate enterprise, IT, healthcare, construction and manufacturing industries. The IXM product line incorporates the industry-leading biometric fingerprint sensing technologies, allowing for multi-factor authentication with PINs and access cards, all within a slim and stylish enclosure. The products also support storage for up to 100,000 users and 500,000 log records with multiple connectivity options such as TCP/ IP, PoE, Wi-Fi, or Bluetooth and include a playful and intuitive web-based software which allows for quick configuration

and monitoring of the network. Invixium products are made in Canada. “The sign-up with Invixium is inline with our stated objective of building a robust and complete product portfolio in the Physical Security vertical. We expect to fully leverage our broad channel network to establish Invixium as a leading brand in its space,” said Jaishankar Krishnan, Managing Director of Ingram Micro, India operations. “India is leading the way in mass adoption of biometrics,” says Shiraz Kapadia, CEO of Invixium, “The market in India has enormous potential for biometrics mostly due to government and multinational enterprise driven initiatives. As a leading technology distributor in India and worldwide, Ingram Micro has an impressive network of re-sellers to build-up the market for our products in India.” Headquartered in Toronto, Ontario, Invixium is a designer and manufacturer of next generation fingerprint biometric products and solutions for the access control and time & attendance markets with extensive knowlNovember 2014

86

edge in the commercial security sector. Invixium products incorporate trusted technologies and offer a plethora of innovative features distinctively unique to the brand. With a sophisticated reseller network in over 20 countries worldwide and growing, Invixium is intensely passionate about delivering a fresh experience to Biometric User Authentication. Ingram Micro India Ltd. (IMIL) is a subsidiary of Ingram Micro Inc., USA. Established in 1996, it is one of the largest distribution companies in India with nationwide presence at nearly 42 locations. IMIL partners with more than 90 vendors to serve a customer base of +10,000 partners. Ingram Micro has extensive market expertise in providing a comprehensive product line from a single source and enjoys an excellent reputation and market credibility as a leading wholesale provider of computer systems & components, peripherals and printers, networking solutions, computer storage systems, supplies and accessories, application software and support services.

www.indiasafe.com

CMYK


CMYK

International Updates

INTERPOL World Launches

Strategic Partners Programme

to Design Innovative Security Solutions with Industry to Address Global Challenges

I

NTERPOL World has launched a Strategic Partners Programme with leading private-sector security solutions providers to jointly create innovative solutions to real-world security challenges faced by global police organizations, government agencies and the private sector. As part of the programme, stakeholders across the public and private sectors, international organizations and various security domain experts will come together several times in the course of the year to identify current and future security challenges and to design innovative solutions. These will be presented at the Expo and Congress of INTERPOL World, an event owned by INTERPOL and supported by the Singapore Ministry of Home Affairs. The Strategic Partners Programme is part of INTERPOL World 2015 which will be held from 14-16 April 2015 at Marina Bay Sands, Singapore. The inaugural event will focus on four domains: Cybersecurity, Safe Cities, Border Management and Supply Chain Security. This innovative programme pushes the boundary of public-private partnerships in the security sphere and complements INTERPOL’s ongoing efforts to engage the private sector more actively in finding new, technology-driven solutions to security challenges. Strategic partners in the Cybersecurity domain, RSA, The Security Division of EMC, Symantec Asia Pacific and Microsoft will discuss and suggest

solutions to improve enforcement capabilities such as malware detection, digital forensics, authentication of security systems and cybersecurity research and development. “RSA is the premier provider of intelligence-driven security solutions. We have chosen INTERPOL World 2015 to showcase our solutions to help the world’s leading organizations solve their most complex and sensitive security challenges,” said Susan Henderson, Marketing Director of RSA Asia Pacific and Japan. Motorola and Thales Solutions Asia will tackle key issues related to the management of Safe Cities such as command and control and prediction, modelling and simulation systems. The Expert Panel also identified the need for an intuitive platform that can integrate all information to improve situational awareness, decision making and information sharing between government agencies for incident or crisis management. Elaborating on Motorola’s role as a strategic partner to INTERPOL World, Shamik Mukherjee, Vice President of Marketing, Asia Pacific & Middle East, Motorola said, “Motorola Solutions helps cities harness all the information that surrounds them, synthesize it to find patterns and make smarter decisions, and then distribute it securely and instantly to the teams who need it the most.” On Border Management, strategic partners Securiport, Entrust of Datacard Group and 3M Identity ManageNovember 2014

87

ment will work on the development of passenger data systems, simple and effective border screening systems as well as the establishment of next generation global information or data protection standards. “Through INTERPOL World Strategic Partnership programme, Entrust continues its strategic partnership with INTERPOL to provide innovative solutions in support of a safer world. Entrust is excited to be engaged with the Expert Panel of INTERPOL World to specifically bring focus to passenger and identity data and processes in the delivery of efficient and secure border controls,” said Mark Joynes, Director of Product Management for Public Key Infrastructure & Government Solution, Entrust. Digital Coding and Tracking Association (DCTA) and SICPA Security Solutions are tackling Supply Chain Security issues. In a bid to improve efforts in countering counterfeit and illicit trade, the INTERPOL World Expert Panel has tasked these supply chain security specialists to propose improved product verification technologies and track and trace systems that can be used not only in the pharmaceutical industry but also in the luxury goods and fast moving consumer goods (FMCG) industries. Other issues such as counterfeiting, piracy, smuggling of legitimate products and tax evasion also remain a challenge in this domain. Mark Hill, Director of DCTA explains, “INTERPOL has demonstrated

www.indiasafe.com

CMYK


CMYK

INTERNATIONAL UPDATES

its belief that the key to combating illicit trade and ensuring the security of supply chains lies in innovative security solutions and enhanced collaborative action between governments, the law enforcement community, the private sector and consumers. This is in line with our organization’s mission.” The strategic partners will work on developing innovative solutions in product verification, empowering the public, private industry and frontline law enforcement officials in the global fight against illicit trade. At INTERPOL World, these solutions will be presented to INTERPOL’s

190 member countries, Expert Panels comprising international organizations and key decision-makers in government and police organizations, as well as security professionals in the private sector. The Expert Panels will be chaired by Dr. Madan Mohan Oberoi, Director, Cyber Innovation and Outreach, INTERPOL; Michael O’Connell, Director, Operational Police Support, INTERPOL; Anselm Lopez, Director, Capability Development & International Partnerships Directorate, International Cooperation & Partnerships Division, Ministry of Home Affairs Singapore; Kingsley Eji-

ofor, Deputy Director and Head of Legal Division, National Agency for Food and Drugs Administration and Control (NAFDAC), Lagos, Nigeria; and Michael Ellis, Assistant Director, Trafficking in Illicit Goods and Counterfeiting Sub-Directorate, INTERPOL. The solutions shared at the event will be analyzed and then customized to suit the security needs of INTERPOL’s 190 member countries and, in the long run, encourage greater cooperation between the public and private sectors, international organizations and academia to make the world a safer place.

Vanderbilt Industries Agrees to Acquire Siemens’ Security Product Business Move consolidates company’s fast growing presence in global security systems industry

V

anderbilt Industries, a global leader providing state-of-the-art security systems, announced that it has entered into an agreement to acquire Siemens’ Security Products business, part of the Siemens’ Building Technologies Division. The business will be renamed Vanderbilt International. Security industry veteran Joseph J. Grillo will be Managing Director, working from the new operational headquarters in Germany. ● Acquisition will significantly boost Vanderbilt’s market position in the European security systems market through a wider and more comprehensive range of products and solutions. ● Siemens’ Security Products (SP) complements existing Vanderbilt business portfolio as a leading supplier with widely recognized brands

and long-term relationships with pre-eminent customers. Joseph stated that this transaction will considerably expand Vanderbilt’s presence in the security industry by broadening the company’s competitive position in a highly fragmented market with great growth potential. “The acquisition of Siemens’ Security Products, which fits our corporate strategy perfectly, matches Vanderbilt’s solid foundation and strong legacy built from nearly three decades in the security industry,” said Joseph. “Vanderbilt saw an opportunity to expand its product offering and geographic market coverage. The addition of SP represents significant value potential with its established installed base of customers and loyal resellers. The market trend is for integrated security November 2014

88

management systems and more open solutions from trusted suppliers. SP clearly provides a vehicle to offer these solutions to a broader customer base,” Joseph added. Siemens’ SP consists of products in the access control, intrusion alarm, and video surveillance categories, which complement Vanderbilt Industries’ fully integrated product offerings. The acquisition includes such well-known and established brands as Bewator and Cotag in the access control segment and Alarmcom and Europlex in the intrusion alarm space. Financial details of the transaction were not released. The transaction is subject to customary closing conditions. The closing of the transaction is expected to occur by the end of the first quarter of 2015.

www.indiasafe.com

CMYK


89-90 ART CARD-II FRONT MR IMPEX


91-92 ART CARD-II Back IFSEC


CMYK

93

CMYK


CMYK

INTERNATIONAL UPDATES

HDcctv Alliance Members Look to the Future

HDcctv Alliance Members Offer First Looks at 2nd Generation HDcctv-Compliant Equipment and 3rd Generation HDcctv Technologies at Security China 2014 Dahua and Shany demonstrate Plug ‘n’ Play HDCVI 2.0-compliant products, while Semtech and Intersil demonstrate advances in HDcctv DT technology

S

urveillance video standards organisation the HDcctv Alliance will host a technology and product gallery at Security China 2014, in Beijing October 28-31. The first certified HDcctv 2.0-compliant products will be shown by Dahua and Shany. Intersil and Semtech will demonstrate long-reach solutions considered for the HDcctv DT 3.0 standard. The HDcctv 2.0 standards – ratified in February 2014 – have been developed and agreed for HD surveillance equipment designed to deliver high-fidelity HD video within secured buildings. The specialized HD transport solutions codified by the HDcctv standards deliver significant advantages in surveillance applications, with 100% multivendor plug’n’play (PnP) capabilities,

including control over cable. HDCVI 2.0 (previously known as HDcctv AT 2.0) equipment delivers HDTV signals over any legacy CCTV coaxial cabling, along with PnP remote control capability, while HDcctv DT 2.0 (Digital Technology) equipment adds PnP remote control up-the-coax to the underlying bit-perfect HDcctv 1.0 format. In the HDcctv Gallery shared by Alliance Members at Security China 2014, Dahua and Shany will demonstrate HDCVI 2.0-compliant cameras plugging and playing with a compliant DVR. Intersil and Semtech will showcase new, HDcctv DT 2.0 and DT 3.0-related technologies and equipment. Telecom & Security will demonstrate its uniquely cost-effective cable termination solutions.

“We are witnessing a historic transition for our industry. Today is Day One! It may take 6 to 9 months before a full range of 2.0-compliant cameras, DVRs, and accessories is available worldwide through distribution: we must certify each individual product as compliant, implement any adjustments required to achieve compliance in our manufacturing line, re-label the housings and gift boxes, update our websites and collateral, and help customers, as well as our own sales force, to transfer their love of CVI to a love of HDCVI 2.0. There is also an obvious educational process which needs to take place throughout the Industry over the coming months.” – Tim Shen Director, Overseas Marketing at Dahua November 2014

94

Todd Rockoff, HDcctv Alliance Executive Director said, “Support for the HDcctv local-site transport standards has made HD surveillance as reliable, as convenient, and as affordable as sub-HD surveillance. The migration to HD surveillance is taking place practically overnight, thanks to the specialized local-site transport technologies transforming our industry. Security China 2014 is the largest trade show in the history of the surveillance equipment industry and a fitting venue to demonstrate the firstever 2.0-compliant products.” The Alliance has made the decision to adopt ‘HDCVI 2.0™’ as the compliance mark for HDcctv AT 2.0 in order to provide buyers with a simple guide to PnP interoperability. At its press conference during the show the Alliance will reveal the winners of its awards for innovation and compliance certification leadership, as well as unveiling an important commercial announcement. The Alliance will further deliver a keynote presentation on ‘The Global Battle for the HD Surveillance LocalSite Transport Market’ as part of the China International Security Forum. The HDcctv Alliance is the industry association that develops, manages, and promulgates technical specifications for secured-site transport of high-fidel-

www.indiasafe.com

CMYK


CMYK

INTERNATIONAL UPDATES

ity, high-definition video surveillance: the HDcctv standards. The Alliance promotes adoption of HDcctv-compliant products and provides education

throughout the surveillance equipment industry. Only certified HDcctv-compliant products bear a distinctive HDcctv compliance mark, which is the manu-

facturer's guarantee of electrical performance and interoperability with other manufacturers' HDcctv-compliant products.

MasterCard and Zwipe Launch the

World's First Biometric Contactless Payment Card with Integrated Fingerprint Sensor M asterCard and Zwipe have announced their partnership for the launch of the world’s first contactless payment card featuring an integrated fingerprint sensor. The launch of the card comes af-

tric sensor and the Zwipe secure biometric authentication technology that holds the cardholder's biometric data. It contains an EMV certified secure element and MasterCard’s contactless application.

“Our belief is that we should be able to identify ourselves without having to use passwords or PIN numbers. Biometric authentication can help us achieve this. However, our challenge is to ensure the technology offers robust security, simplicity of use and convenience for the customer. Zwipe's first trial is a significant milestone and its results are very encouraging. Safety and security in everyday payments are at the heart of MasterCard’s business. We will continue to work with innovators, like Zwipe, to ensure we stay ahead of fraudsters and provide a seamless payment experience, as ultimately it is consumers who decide how they choose to pay.” – Ajay Bhalla President, Enterprise Security Solutions, MasterCard ter a successful live pilot with Norway's Sparebanken DIN, aligned to the Eika Group, as an answer to the complex challenge of providing a fast, convenient payment solution that does not compromise on security. The Zwipe MasterCard payment card is the world's first fingerprint authenticated contactless payment card. It includes an integrated biome-

The card is the first of its kind to combine the security of biometric authentication with the speed and convenience of contactless payment. Cardholder fingerprint data is stored directly on the card, not in an external database. After activation by a simple fingerprint scan, the Zwipe MasterCard card can be used to make contactless payments. The biometric authentication replaces the PIN entry, thus enabling cardholders to make payments of any amount, unlike other contactless payment cards on the market. Zwipe is now working on the next generation of its card that will be the same format as a standard card and designed to work with all payment terminals for release in 2015. This new card will harvest energy from the

“Feedback from our pilot with Sparebanken DIN has been very positive. Cardholders love how easy the card is to use with the added security feature. We have also had exceptionally good feedback from retailers participating in the pilot. This pilot enabled the partners to gather valuable customer feedback, experience and best practice for the enrolment and deployment phase.” – Kim Humborstad Founder & CEO, Zwipe November 2014

95

www.indiasafe.com

CMYK


CMYK

International Updates

payment terminals without the need for a battery. “We will offer biometric authentication and contactless communication for all our cards since it combines convenience and security for both our cardholders and merchants,” said Morten Danielsen, Business Development Director,

Sparebanken DIN. Founded in 2009, Zwipe is a fast growing company in the center of a quickly evolving industry. Zwipe has a strong portfolio of patent applications and is continually developing more. The Zwipe product is a contactless card with which users authenticate themselves not through

something they know (pin/code) or solely carry (a standard card) but through something they are (their fingerprint). The card is based on an NFC (Near Field Communication) platform with no external database containing sensitive information as the fingerprint data is only stored inside the Zwipe card.

HID Mobile Access Included as Enterprise Solution in the Samsung Enterprise Alliance Program (SEAP)

H

ID Global® has been named a silver partner in the Samsung® Enterprise Alliance Program (SEAP). The partnership brings the company’s awardwinning HID Mobile Access® solution for opening doors using smartphones,

Partnership brings HID Mobile Access® and HID Trusted Tag® Services into the Samsung® Enterprise Alliance Program (SEAP) network. and HID Trusted Tag® Services that add trusted identities for everyday objects for ‘Internet of Things’ applications, into Samsung’s extensive product sales and marketing ecosystem. “HID Global is pleased to be working with Samsung to offer exciting new secure identity capabilities to its smartphone customers,” said Debra Spitler, Vice President, Strategic Alliances with HID Global, “Helping Samsung users transform their smartphones into trusted credentials will deliver a new era of functionality, from opening doors without needing a key or smart card, to authenticating objects in a growing range of consumer uses cases and applications.”

Powered by Seos®, HID Mobile Access makes it possible for customers to use NFC- and Bluetooth Smart-enabled Samsung Galaxy and Samsung Note smartphones to open doors by ‘tapping’ the phone to a door reader or electronic lock. The solution also enables users to access doors and gates from a distance via Bluetooth Smart and the company’s patented ‘Twist and Go’ gesture technology. Samsung devices also support use of the HID Mobile Access Configuration Application that is used by system installers to quickly dial-in and optimize the read range of Bluetooth-enabled iCLASS SE® readers based on environmental conditions. The company’s mobile access solution delivers an overall user-friendly deployment experience by enabling users to quickly download the HID Mobile Access App to their Samsung smart device; administrators can Powered by Seos® and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.

November 2014

96

HID Trusted Tag Services makes it possible to authenticate everyday objects across ‘proof of presence,’ Electronic Visitor Verification (EVV) and a wide range of Internet of Things (IoT) applications.

also easily issue and revoke Mobile IDs via the HID Secure Identity Services™ portal. In addition to HID Mobile Access, Samsung devices can also be used with HID Trusted Tag Services. By combining HID Trusted Tags, NFC technology and secure cloud authentication services, HID Trusted Tag Services offer the innovative capability of adding unique and trusted identities to everyday objects. These objects can be read by NFC-enabled Samsung smartphones for ‘proof of presence’ applications, ranging from tapping a smart poster for an interactive brand experience, to verifying the visit of home health staff in a patient’s residence or confirming student attendance on college campuses. The services can also be used for brand protection and other ‘Internet of Things’ applications.

www.indiasafe.com

CMYK


CMYK

ASIS 2014 Draws Thousands of Security Decision Makers to Atlanta Networking, education, and exhibits exceed attendee and exhibitor expectations

M

ore than 19,000 security professionals from 97 countries, including the United States, attended the ASIS International Annual Seminar and Exhibits (ASIS 2014), held in Atlanta, GA, Sept. 29–Oct. 2, 2014. This year marked the 60th Annual Seminar and Exhibits held by ASIS International, the leading organization for security management professionals worldwide. This year’s Seminar left many looking forward to ASIS 2015. From the President’s Reception, the Seminar’s premier networking event, to the headline-driven education programs, to the solutions-oriented exhibit floor, security management professionals and exhibitors alike found much, much more than they expected. “From providing an excellent platform for training, product demonstration, networking, and the general sharing of ideas, ASIS 2014 did not disappoint,” stated Senior Vice President, Pelco Video Line of Business, Herve Fages. Keynote speakers included Jon Huntsman, Jr., 16th governor of Utah and former U.S. Ambassador to China, and General Colin L. Powell, USA (Ret.), 65th Secretary

of State. The Closing Luncheon featured Scott Moore, United States Navy SEAL Rear Admiral (Ret.), who spoke on ‘Building Teams with the Military’s Most Elite’ Three general sessions delivered expert insight on effective threat modeling, bribery and corruption in foreign markets, and the dramatic change taking place now in China. More than 250 education sessions in 24 tracks reflected a wide range of topics of interest to those who are responsible for protecting their organization’s human, cyber, and physical assets. Recent global events also were reflected in the programming with special sessions on the Ebola outbreak and the evolving threat of ISIS, which drew a standing roomonly crowd. New data on the uptick in spending for security in the U.S was released at a special session, along with insight into what is driving the increase to $410 billion in 2014 – up from $388 billion in 2013. Senior security executives from over 20 countries registered for CSO Roundtable events, which offered exclusive briefings with keynote speakers and a private meetNovember 2014

97

ing with Governor Tom Ridge, chair of the U.S. Chamber of Commerce’s National Security Task Force. Gov. Ridge led discussions between members of the Task Force and the CSO Roundtable. Covering more than 223,000 net square feet of the Georgia World Congress Center, companies exhibited a wide array of leading-edge products and services. Exhibitors experienced a marked increase in not only the level of booth traffic, but, specifically noted an increase in the quality of leads generated. Exhibitors also noted the value of meeting with end-users directly, one-on-one, to introduce their products and services to potential buyers, and to connect with current customers. For the fourth year, the (ISC)2 Security Congress colocated with the ASIS Seminar, broadening the scope of education and connection opportunities for members of each organization. Plans for the 61st Annual Seminar and Exhibits, taking place Sept. 28-Oct. 1 in Anaheim, Cal., are well underway. Eighty-four percent of the ASIS 2014 exhibitors contracted to exhibit at ASIS 2015.

www.indiasafe.com

CMYK


CMYK

Users can select key management solutions for single location applications such as museums or correctional facilities or for multiple site enterprise level installations at university campuses. There’s even a system designed specifically for fleet management applications. Innovative features that make the user experience more exceptional include scheduled reports, automatic e-mail notifications, easier to use on-screen icons, key reservations, mobile capability and checking key ring inventory. KeyWatcher Touch has been updated to incorporate new easier to use onscreen icons. The enterprise key control and management system has a large touchscreen and user-intuitive interface including KeyAnywhere and KeyFind operations. It offers the convenience of scheduled PDF reports that are automatically emailed to authorized recipients. E-mail delivery of customized or standard reports can be scheduled for any frequency or specific time. System administrators have access to view or run reports as needed. The system also enables security management to easily notify a user via e-mail when a key becomes overdue. Morse Watchmans’ smartphone app provides access to live reports, such as updates that a key is in or out, in addition to live transactions. It enables authorized users to see a wide range of live information and to interact remotely with the KeyWatcher Touch key control and asset management system. It’s a highly efficient and easy to use tool that greatly simplifies key control management while on the go. Also on display were the KeyBank® Key Control System that provides total accountability of large quantities of keys; KeyPro™ Software; KeyRings™; PowerCheck® Guard Tour System and TourPro™ Data Sorting Software.

Morse Watchmans Previews New Voice Cues with Full Line of Solutions at ASIS

M

orse Watchmans has given booth visitors a preview of their new voice cues at this year’s ASIS show. The new feature was demonstrated along with the company’s portfolio of key control and asset management systems, offering organizations of all sizes a full range of choices to access the benefits of managed key control. The product offerings are easy to implement and all include the same qualities and benefits for which Morse Watchmans products are known – innovative design, reliability and state of the art technology. “Key management is a vital tool in ensuring a safe and secure facility, and voice cues make it even easier for the user to incorporate key control into their security program,” said Fernando Pires, VP Sales and Marketing, Morse Watchmans, “The breadth of innovation in our product portfolio builds on that capability by giving users more exciting and easy to use options for creating an integrated and comprehensive state of the art security system.” At the show, Morse Watchmans previewed a KeyWatcher system that uses voice cues to prompt the user to open the door, remove the key, return the key and close the door. While the feature is not currently offered with new systems, a positive response from show attendees will speed its incorporation into new systems in the future.

OnSSI Enhances Technology, Value and Support for all Ocularis Models

O

nSSI delivers new and innovative integrations for its industry leading Ocularis Video Management System (VMS). With an increased emphasis on new technologies, a compelling value proposition, and a higher level of technical support, OnSSI raises the bar – benefiting Integrators and end users. November 2014

98

www.indiasafe.com

CMYK


CMYK

ogy, optional on-board storage up to 32GB via an SDHC card slot; CorridorView™ capability that allows the camera’s image to be rotated 90 degrees for better coverage in hallways and corridors; and an extended ability to scale images to different resolutions to better meet system bandwidth and storage requirements. Additional performance features found in MegaDome® 2 day/ night megapixel cameras include remote focus/ zoom p-iris lenses, Wide Dynamic Range (WDR) up to 100dB, integrated infrared illuminators, and wide angle or telephoto options. MegaDome® 2 day/night megapixel cameras are available in a wide range of models with resolution up to 10MP. “Our MegaDome® 2 cameras have always offered the most advanced technologies, now with STELLAR™ and a host of other enhancements, they are even better than before,” said Raul Calderon, Senior Vice President, Arecont Vision®, “The new features in our MegaDome® 2 cameras further extend their industry-leading performance and capabilities to provide the highest levels of video security, even in the most challenging lighting conditions.” MegaDome® 2 (1.2 MP model) is the first Arecont Vision® camera to feature STELLAR™ Low Light Technology, which expands low-light performance by reducing motion blur and noise, enhancing contrast and enabling color imaging in near complete darkness. This industry-leading technology will be available on additional Arecont Vision® cameras in the near future. In addition to these new features, MegaDome® 2 cameras also offer Arecont Vision®’s WDR technology which provides a dynamic range of up to 100dB at full resolution without lowering frame rates. By combining long and short exposures in the same field of view, WDR maximizes the amount of detail in both bright and dark areas of a scene. The WDR performance of Arecont Vision® cameras represents up to 50dB improvement (300x) in dynamic range compared to conventional cameras. MegaDome® 2 cameras offer additional performance features including: H.264 (MPEG-4 Part 10)/ MJPEG dual

OnSSI’s Ocularis provides the highest VMS performance for mid-level and enterprise solutions with new integrations with Samsung’s WiseNet III cameras with in-camera NVR capabilities that can be part of a larger Ocularis system with server-based NVRs or as part of a stand-alone system. In addition, there are integrations for the native dewarping of popular 360° Samsung cameras and Immervision-enabled cameras and the release of a new Android app for mobile devices. “OnSSI’s Ocularis provides the best value and performance available for enterprise and medium-sized deployments. These new and exciting integrations, coupled with the exceptional value proposition provided by our Mix & Match camera license architecture and analog camera/ encoder licensing structure, makes Ocularis the right VMS choice,” said Ken LaMarca, Vice President of Sales and Marketing, OnSSI, “In addition, there is free technical support, and now a new Global Professional Services program. Our Global Professional Services program assures that we will always be there for you anywhere, anytime.” OnSSI continues to enhance Ocularis’ features with more advanced and predictive functionality. Integrations with more than 300 powerful technology partners allow Ocularis’ Event Fusion Engine to turn simple alarms into meaningful alerts. These meaningful alerts result in the ability to manage more cameras with fewer operators, freeing up manpower for other important duties. Addressing only meaningful alerts saves valuable time when responding to a situation – getting you closer to prevention.

Arecont Vision® Enhances Popular MegaDome® 2 Megapixel Cameras with Additional Features STELLAR™ Low-Light Technology, On-Board Storage and More Deliver Added Security

A

recont Vision® has added a number of significant enhancements to its popular all-in-one MegaDome® 2 day/ night megapixel cameras as displayed at ASIS 2014. New features include Arecont Vision®’s groundbreaking STELLAR™ (SpatioTEmporal Low Light ARchitecture) Low Light TechnolNovember 2014

99

www.indiasafe.com

CMYK


CMYK

encoders; privacy masking; extended motion detection with 1,024 distinct motion detection zones; pixel binning for increased low light sensitivity (3MP, 5MP and 10MP models); flexible cropping to adjust image sizes; IP66 environmentally rated and IK-10 impact resistant dome enclosures; and the ability to choose PoE (Power over Ethernet) or external power. MegaDome® 2 Telephoto cameras are available with long distance infrared illuminators in resolutions of 1080p, 3MP, 5MP and 10MP.

Christie Showcases Versatile and Low Cost Control Room Solutions at ASIS 2014 From high resolution video walls to revolutionary network-distributed open content management, Christie delivers customized end-to-end solutions

C

Altronix e-Bridge™ Enables IP over Coax Full Duplex 100Mbps New Models Accommodate High Speed Edge Devices Using Coax Infrastructure

A

ltronix showcased its expanded line of eBridge™ Ethernet over Coax adapters with new models featuring full duplex 100Mbps at ASIS 2014. eBridge is a cost-effective solution to upgrade and expand security and surveillance utilizing coax, while supporting PoE, PoE+ and Hi-PoE devices. eBridge can reach distances up to 500m – five times standard Ethernet range. “eBridge is the simple solution to deploy advanced IP cameras and devices over coax infrastructure,” said Alan Forman, President, Altronix, “These new additions to the eBridge line accommodate the latest edge devices that require faster data rates.” New eBridge models include 100Mbps receivers with one, 4, 8 and 16 ports. The eBridge 100Mbps outdoor transceiver features a NEMA 4X IP66 rated enclosure, and accommodates up to two PoE/ PoE+ cameras or devices, or one Hi-PoE (60W) camera. As with all Altronix products, eBridge 100Mbps Ethernet over Coax adapters are made in the U.S.A. and backed by a lifetime warranty. November 2014

hristie® brought a generation of leadership experience to designing and implementing high-performance mission critical control room solutions to ASIS 2014 in Atlanta. From high resolution flat panel displays, to video processors and the Christie Phoenix™ open content management platform, Christie showcased versatile and cost-effective solutions for the ultimate in mission-critical communications, performance, and reliability. Among the products on display were a 2x2 ultra-narrow bezel Christie FHD552-X HD LCD-based flat panel video wall featuring ultra-sharp HD resolution, high pixel density, and su-

perior image sharpness and brightness. Significantly thinner than conventional panels, Christie flat panels automatically map in any array configuration, either in portrait or landscape mode. They are quick and easy to set up and use less than one watt of power in standby mode for low-cost operation. Also on display was a 2x2 set-up of the 70-inch Christie Entero™ HB front access display cube – the first and only LED display cube to offer wireless control through Wi-Fi® capability. Christie’s video wall displays are fed by the Christie Phoenix™ open content management platform. “Christie brings more than 80 years of leadership in visual displays and generations of experience in designing and implementing 24/7 mission-critical operations for some of the

100

www.indiasafe.com

CMYK


CMYK

world’s largest organizations,” noted Dave Muscat, Senior Director, Americas Region,Visualization, Simulation and Control Room Solutions, at Christie, “Whether for government, law enforcement, power, utility or telecommunications, Christie offers customized, end-to-end control room solutions specifically tailored to the customer’s needs and budget.”

T

Collaborative visual solutions for missioncritical monitoring

oday’s control rooms go beyond traditional displaying and monitoring, and Christie’s collaborative visual solutions are removing boundaries and enabling expansive collaboration for many of the world’s most mission-critical operations. By integrating stunning zero-maintenance displays with the power of the network, Christie is completely redefining the control room space, and setting the stage for an increasingly distributed control room environment. Across every sector in business, commerce and government, Christie is raising the bar beyond today’s stringent control room requirements. Christie Digital Systems USA, Inc. is a global visual technologies company and is a wholly-owned subsidiary of Ushio, Inc., Japan, (JP:6925). Christie is recognized as one of the most innovative visual technology companies in the world. From retail displays to Hollywood, mission critical command centers to classrooms and training simulators, Christie display solutions and projectors capture the attention of audiences around the world with dynamic and stunning images.

System Galaxy v.10.4 Access Control Platform Delivers Enhanced Versatility and Ease of Deployment ● New Support Capabilities, Enhanced User Features and Easier, Faster Installs. November 2014

● New Pre-Configured Network Appliance Reduces Installation Time and Effort. alaxy Control Systems, a leading provider of integrated access control, video and security solutions, highlighted myriad new features available on the company’s popular System Galaxy Software at ASIS 2014. The new release, System Galaxy Software v.10.4, adds installation and user conveniences, as well as support for more third-party devices. Also on display was a new fully integrated TCP/ IP appliance embedded with System Galaxy Software v.10.4. “The upgrades to our System Galaxy Software streamline the installation and further improve the user experience, resulting in enhanced efficiencies and a more comprehensive access control and management solution,” said Robert Laughlin, President, Galaxy Control Systems, “Deployment of System Galaxy Software is even easier with our new pre-configured network appliance, which can reduce the time and effort needed for onsite system setup, application installation and customization.” System Galaxy v.10.4 includes a wide range of enhancements: ● Support upgrades for integration with ASSA wi-fi locks, inclusion of a DSI-based RS485 input module to reduce cost of installation and provide faster data rates, and a log distributor to support SSL SMTP mail servers such as Gmail. ● User upgrades with the ability to record ID editing separated from common ID fields and e-mail invalid attempts in log distributor only after X number of times within a specified time frame. ● Installation upgrades with the ability for software’s part 2 database to allow the Galaxy Control Systems client password to be specified, and faster SQL server installation. ● System upgrades which include an internal rework for more robust services, and improvement of error behavior when database connection is severed. Galaxy System’s new TCP/ IP network appliance comes complete with System Galaxy v.10.4 embedded which dra-

G

101

www.indiasafe.com

CMYK


CMYK

matically reduces installation time. By launching a shortcut from any LAN-connected PC, the user has the ability to connect to the network appliance and utilize the Galaxy Client through an online connection. This capability also greatly reduces the installation time by eliminating the need to deploy or install software and servers. The network appliances are pre-configured and offer support for a pre-determined number of doors.

PPM Demonstrates the Power of Incident Management Intelligence at Asis 2014 New features and services create a more valuable and powerful end-to-end solution

A

s the leading authority on incident management solutions, PPM 2000 showcased a number of introductions and enhancements to their offerings at this year’s ASIS show. Visitors to the company’s booth got a chance to test-drive the new features and functionality available in Perspective V4.5, the company’s flagship incident management software, including more analytical options, an embedded report designer, and new ways to view data. Also introduced was PPM’s Virtual Analyst, which offers an on-demand or prescheduled service for custom reports, metrics, and analysis. Beyond the booth exhibit, PPM’s Incident Command Center provided show attendees the opportunity to see first-hand how the process from alarm identification to incident report can take less than 45 seconds. “Our presence at this year’s ASIS is all about demonstrating the power of incident management intelligence,” said Elaine O’Sullivan, President & Co-CEO, PPM, “The new offerings further support and characterize the value of incident management software in connecting systems, people, and processes to drive intelligence-led situational awareness and complete security operations management.” Perspective V4.5 includes an expanded Analysis Expert (AE) complete with a new structure, convenient query management features, more criteria options, and built-in pivot taNovember 2014

bles. A streamlined interface enables less experienced users to more easily find saved queries while data analysts can dive deeper into the powerful, more comprehensive layers of the tool. As an added convenience, queries can now be run in the background, allowing additional functions to be initiated. Also new to Perspective V4.5 is an embedded and featurerich Custom Report designer. Working from the AE results, this new feature allows reports to be created with any layout, look, or content – all without leaving the Perspective platform. A newly introduced Mapping component provides the capability to visualize activity, incident, and dispatch records on a map. With a click on a location pin, the associated record is brought forward. PPM’s innovative new Virtual Analyst is an industry-first offering that provides Perspective clients with custom intelligence compiled and analyzed by board-certified CPPs and experts in security metrics. The offering is a value-add exclusive to Perspective SaaS users while fee-based options are available to other users. A pioneer in the field of incident management, PPM’s Perspective is an end-to-end enterprise solution that addresses the unique needs of both security operations and investigations. By sharing event data and related information, both disciplines can collaborate to identify trends, take meaningful action, and reduce risk. PPM offers dedicated service and support for single site and global implementations. PPM helps organizations meet their risk, performance and intelligence objectives with incident management solutions that leverage technology and process for a powerful knowledge base. Perspective by PPM is an end-to-end software solution for responding to, reporting on, and analyzing enterprise security events – from dispatches to activities, incidents to investigations. Users intelligently action and query

102

www.indiasafe.com

CMYK


CMYK

their data to manage resources, make informed decisions, and prevent incidents. Perspective is highly customizable and can be configured for a single location or implemented worldwide, dedicated to corporate security or expanded across multiple departments. With the ability to integrate to any application, Perspective is an essential part of an organization’s Physical Security Information Management (PSIM) initiatives.

New Smart Thermal Camera from SightLogix Increases Performance and Lowers Costs

S

ightLogix displayed the third generation of the company’s innovative SightSensor thermal camera at ASIS 2014. The new SightSensor provides the most accurate security solution for outdoor applications while solving a fundamental economic challenge for the industry. At one-third the size and with reduced power consumption from prior generations, the new SightSensor avails solar and wireless capabilities that vastly reduce infrastructure requirements often needed for outdoor security projects. “Our new SightSensor smart thermal camera is redefining the expectations for outdoor security by shifting the emphasis from surveillance to crime prevention,” said John Romanowich, SightLogix President and CEO, “This new third generation SightSensor builds on SightLogix’ heritage of outdoor detection accuracy, fulfilling a long-sought promise of using smart thermal cameras as an outdoor burglar alarm.” Outdoor security projects encompass many infrastructure expenses that typically dwarf the cost of security cameras themselves. These include plans and permits for construction and trenching, installing electrical and communication wiring to remote areas, and on-site provisioning. The result has been a significant capital investment each time an organization needs to secure a facility. The new SightSensor reduces costs in two November 2014

ways: lower power consumption enables solar and wireless operation, and large coverage areas decrease the number of sensors needed when compared to any other smart camera solution. The result is a significant reduction in installation costs, making SightSensor ideal for a broad range of mainstream applications. With lens options that range from wide areas (90˚ FOV) to 600m distances, and a NEMA 4X, nitrogen-purged enclosure, SightSensor thermal cameras provide high Probability of Detect (PD) and a low Nuisance Alarm Rate (NAR) day and night, in all weather conditions. New features of the third generation SightLogix SightSensor thermal camera include: four times the on-board video processing of previous generations; greatly reduced power consumption, size and weight; support for ONVIF, H.264; audio messages triggered in response to alarm conditions; simplified video cabling and connections; and a flexible browser-based configuration option.

Seagate Delivers New Surveillance Hard Disk Drive Featuring Recovery Services Surveillance HDD with Rescue Services and 6TB high-capacity storage, optimized for reliable 24x7 video surveillance systems unveiled

S

eagate Technology plc (NASDAQ: STX) took the wraps off the industry’s first dedicated surveillance hard disk drive (HDD) featuring Seagate Rescue™ services – the Seagate® Surveillance HDD. Engineered specifically for surveillance and video analytics applications, the Surveillance HDD is a worldclass drive that employs data recovery services designed to restore data from malice or accidental failure, keeping systems in the field longer and reducing post deployment expenses. “Over 413 petabytes of data were produced in just one day by video surveillance cameras installed worldwide in 2013 – that’s 150,000 petabytes of data every year, most of which are stored on high-capacity surveillance systems for archive or video analytics purposes,” said Scott Horn, Seagate Vice

103

www.indiasafe.com

CMYK


CMYK

President of Marketing, “That data is invaluable to the user to either meet industry regulations or leverage for content analysis or security – so when data loss occurs it’s an expense to the customer. Seagate’s Surveillance HDD with Rescue services addresses this issue head on and alleviates these concerns.” A fast and easy recovery process, Seagate Rescue services can typically restore data within two weeks depending on the type of recovery – with up to a greater than 90 percent success rate in data recovery. Activated at time of purchase, the rescue plan provides three years of data recovery at the fraction of what it would cost to recover data lost due to anything from computer viruses to natural disasters and more. “Over 50 percent of users who had an accident with their drive have experienced data loss,” said Balaji Thangaraj, Vice President for Research at Boston Analytics, “The Seagate Surveillance HDD with Seagate Rescue services provides consumers and system integrators alike with the critical reliability they expect in an easy, affordable solution, enabling them to gain peace of mind that their content is protected.” “Seagate’s expansion not only into a new capacity but into a new business with their Rescue services is an exciting endeavor for both Seagate and Dahua,” said Lu Yacong, CTO of Sales Center, Dahua Technology, “Systems reliability has always been a primary focus for us both, but Rescue services goes a step beyond allowing our customers the unique opportunity to protect their data from the unpredictable.” A seventh-generation optimized Surveillance HDD, the drive now expands to capacities of up to 6TB and can store up to 600 hours of high-definition (HD) content making it the industry’s highest-capacity drive designed specifically for surveillance applications. Designed to scale video storage, the drive also incorporates options for rotational vibration (RV) sensors enabling it to reliably perform in systems with up to 16 drives, making it ideal for small-to-medium businesses, who typically do not have IT support, but where bulk storage for HD video and back up are highly valued. Designed to support surveillance recordings from a number of cameras no matter their resolution requirements, Surveillance HDD supports up to 32 channels and easily handles November 2014

the higher write workloads required by surveillance systems. The drive supports large streaming workloads for longer periods of time meeting industry archive and resolution demands. These features, coupled with the optional R/V sensors and Seagate’s Rescue service, improve drive performance in multidrive and RAID systems and increase the value of surveillance data by delivering the highest data integrity possible. Boasting industry-leading reliability, the Surveillance HDD has a 1 million hour MTBF, (mean time between failure) allowing the product to be kept in the field longer while reducing the cost of field deployment and maintaining customer retention. The drive is also engineered for low power consumption and heat emissions allowing solution providers greater design flexibility. Seagate Surveillance HDD is available now in 1-4TB capacities. Surveillance HDD in 5-6TB configurations will be available in by the end of 2014.

Strategic Partner Program Announced at ASIS

Partners capitalize on respective core competencies to deliver comprehensive outdoor security solutions

S

ightLogix announced the launch of their new Strategic Partner Program at ASIS 2014. The premise of the partnership program is to leverage the superior intrusion detection of SightLogix SightSensor thermal cameras with established manufacturers and suppliers of video surveillance hardware and software. Axis Communications, the recognized global leader in network video, is the first to join this collaborative effort. “The beauty of our Strategic Partner Program for Axis Communications is in its simplicity,” said Frank De Fina, Executive Vice President of Sales and Marketing, SightLogix, “They take advantage of our best-in-industry smart thermal

104

www.indiasafe.com

CMYK


CMYK

detection capabilities, and we help them build a new revenue stream where none previously existed. It’s a win-win for both companies.” “Axis network video solutions are globally proven to deliver the performance and reliability required for both mainstream and innovative professional security applications,” said Fredrik Nilsson, General Manager, Axis Communications, Inc., “Partnering with SightLogix is a natural fit as it brings together the performance and capabilities of superior IP video and thermal intrusion detection, providing a comprehensive solution to best meet the needs of customers.” The SightLogix Strategic Partner Program enables their partners to offer a total perimeter solution without the need for costly internal development, allowing partners to focus on solutions that are more strategically aligned with their core expertise. Conversely, SightLogix will provide its partners with new business opportunities that often originate with SightLogix perimeter detection projects. “SightSensor smart thermal cameras meet a very specific need for outdoor perimeter detection that stops crime, vandalism and other threats in real time. We are looking for partners like Axis Communications with established product lines to provide customers with best-in-breed solutions based on our respective core competencies,” said De Fina, “The vast majority of installations where SightLogix products are deployed include conventional surveillance solutions such as IP cameras, PTZs, VMS and Access Control. By teaming up with established providers of these complementary systems, we can offer a comprehensive solution to our joint customers that benefits all involved.”

CEM emerald™ from Tyco Security Products Awarded 2014 Security’s Best Award at ASIS Accolades

HID Mobile Access Solution wins 2014 ASIS Accolades Security’s Best Award

T

he new HID Mobile Access® solution has been selected by the ASIS International organization as a winner of the 2014 ASIS Accolades Security’s Best competition, which recognizes the industry’s most innovative new technologies, products, solutions and services. The company’s mobile access solution, which makes it possible to use smartphones and other November 2014

mobile devices for opening doors, was selected by judges representing a cross-sector of end-users and technology. “We are honored to have HID Mobile Access with our patented ‘Twist and Go’ gesture technology recognized as one of the most innovative solutions for 2014,” said Selva Selvaratnam, Senior Vice President and Chief Technology officer with HID Global, “HID Mobile Access is powered by our awardwinning Seos® technology that turns any smart device into a trusted credential for opening doors, and the 2014 ASIS Accolade marks HID Global’s fourteenth award for a Seos-based solution. This acknowledgement continually validates the market need for standards-based products, solutions and services that deliver convenience and advanced security.” Supporting Bluetooth Smart and NFC, HID Mobile Access is used with the company’s mobile-enabled iCLASS SE® and/ or multiCLASS SE® readers, and includes Mobile IDs, HID Mobile Access Apps and access to the HID Secure Identity Services™ portal for managing users and issuing or revoking Mobile IDs. The solution makes it possible to use the broadest range of iOS®- and Android™-based smartphones and other smart devices to access buildings, and open doors and gates from a distance via Bluetooth Smart and HID Global’s ‘Twist and Go’ technology. The company’s mobile-enabled readers are interoperable with 125 kHz HID Prox and high-frequency technologies, which optimizes flexibility for seamlessly using both cards and mobile devices in a single access control system. HID Mobile Access solutions are now available through Platinum and Gold HID Advantage Partners in the U.S., Canada, Europe, the Middle East and Africa.

Innovation of the industry’s most multi functional touch screen access terminal recognized

C

EM Systems, part of the Security Products business unit of Tyco (NYSE: TYC), has been awarded 2014 Security's Best Award in the ASIS Accolades Awards for the industry renowned emerald multifunctional touch screen terminal. ASIS

105

www.indiasafe.com

CMYK


CMYK

Accolades is an awards competition that recognizes the security industry’s most innovative new products, services, and/ or solutions. emerald is an intelligent multifunctional IP access terminal that provides more at the door. emerald is a touch screen reader, door controller, VoIP intercom and system terminal all in a single box. The innovative touch screen LCD is the first of its kind to ‘greet’ cardholders by illuminating as they approach, providing a user friendly security experience. For the first time, security professionals can use remote apps at the device to update personnel records, book meeting rooms, and even send important messages to cardholders such as Wrong Door, Lost/ Stolen Card, Expiring Card and Access Granted. emerald also acts as an information point by displaying general company information, advertisements and audible prompts to enhance user experience. “We are proud to receive this ASIS Accolade and of the recognition it gives to the access control technology leadership and innovation of the emerald terminal,” said Conleth Donaghy, Senior Product Manager, CEM Systems, “emerald is revolutionizing the security industry, providing new levels of access control and user experience at the door. As an intelligent device, emerald goes beyond securing premises; it empowers users, addresses the needs of modern businesses and increases operational efficiency.”

Avigilon Delivers Turnkey Surveillance with the Launch of HD Video Appliance Series High-performance, all-in-one solution enables simplified and cost-effective installations

A

vigilon Corporation (Avigilon) (TSX:AVO), announces the addition of the HD Video Appliance series to its expanding product portfolio. The HD Video Appliance series delivers the performance of the award-winning Avigilon Control November 2014

Center (ACC) video management software, dramatically simplifies system design, and increases ease of installation. A turnkey product, the HD Video Appliance series enables end-users to reduce both installation time and cost. It does so by combining a Power-over-Ethernet (PoE) network switch along with full video management server and client software capabilities, including full viewing and system administration, into a single compact form factor. The HD Video Appliance is powered by Avigilon’s market-leading ACC software which comes pre-installed and configured, enabling end-users to experience the benefits of ACC immediately, such as intelligent bandwidth, storage management, and faster search times. “Ease of installation is at the core of every Avigilon product. By combining multiple components essential to a surveillance system in a single integrated appliance, our partners can deploy a high-performance end-to-end solution more quickly and easily than ever before,” said Dr. Mahesh Saptharishi, Chief Technology Officer at Avigilon, “The HD Video Appliance series is an all-in-one platform that enables organizations of all sizes in a wide range of markets to ensure the safety and security of people and facilities more easily than ever before.” The HD Video Appliance series provides a scalable solution to meet the needs of organizations of all sizes from small to medium businesses to enterprises. Designed for small video surveillance and budget constrained deployments, the 8-port model is compact yet powerful; while the HD Video Appliance Pro, available in 16 and 24 port models, offers a comprehensive platform for mid to large-sized applications. The HD Video Appliance series provides maximum flexibility and scalability, enabling end-users to add to their system as necessary. The appliance, which offers up to 12 TB of available RAID 5 storage, supports a wide range of camera resolutions, including Avigilon’s HD Pro camera series, in 8 MP, 12 MP, 16 MP and 29 MP resolutions. The HD Video Appliance is compatible with Avigilon’s current product portfolio, third party IP cameras and backwards compatible with analogue cameras, further facilitating the transition from analog to an IP-based surveillance system. The flexibility of the new HD Video Appliance series also enables users to deploy the unit as a standalone installation or as part of a multi-site configuration, leveraging the enterprise-level features of ACC’s open platform to securely connect and manage a number of distributed locations.

106

www.indiasafe.com

CMYK


CMYK

Quantum Secure Introduces SAFE for Finance Application Module

IPSecurityCenter™ Demonstrates PSIM Solution at ASIS 2014

F

rom single office locations, to the complete integration of worldwide campuses, the IPSecurityCenter PSIM centralized model of security management supports organizations to reduce costs, increase control, ensure compliance and homogenize security protection levels. IPSecurityCenter’s management reporting data aids business intelligence gathering: enabling the mapping of incident trends and ensuring the highlighting of weaknesses to inform future security investment. In addition, IPSecurityCenter PSIM allows for more effective use of infrastructure and manpower, better allocation of resources, real-time incident response and faster resolution – all resulting in improved operational efficiency with less risk to people, processes, property, brand & reputation. “We see that security management professionals have an increasing knowledge of the benefits of PSIM technology. More and more projects are specifying the higher levels of integration, process guidance and scalability only offered by a PSIM solution such as IPSecurityCenter,” says Warren van der Merwe, VP Business Development at CNL Software, “We are finding that large corporations for example, are now requesting ‘federated’ solutions. These allow standalone PSIM deployments at individual facilities to work collaboratively with each other and hand over control to a dedicated emergency response center in the event of largescale, emergency situations.” For the past six decades, ASIS has been at the forefront of the security industry’s advancement by supplying the ultimate showcase for technology, ideas and solutions. Its flagship event, the ASIS International 60th Annual Seminar and Exhibits, enriches professionals practicing across the operational and logical spectrums. ASIS 2014 provides valuable resources for security-focused professional development, including education, certifications, thought leadership, cutting-edge solutions, networking, insider tours and career pavilion services.

November 2014

Software offers extended benefits beyond conventional PIAM Control

Q

uantum Secure continues to expand its offering of specialized application modules for the company’s industry leading SAFE physical identity and access management (PIAM) software solution with the introduction of SAFE for Finance at ASIS 2014. The sophisticated software centralizes all company and identity information across systems and departments into one policy and privilege based view. The automated features in SAFE for Finance result in minimized risk, superior compliance and reporting and reduced operating costs. “Physical identity and access management are a cornerstone of any financial institution’s security plan,” said Ajay Jain, President and CEO, Quantum Secure, “SAFE for Finance addresses the highly stringent compliance and security needs of the financial market while allowing integration of disparate systems for end-to-end management, advanced visitor management functionality, and executive level reporting and analytics.” SAFE for Finance is a policy-based enterprise solution that effectively manages the entire lifecycle of physical identities and related processes such as on/ off boarding, physical access management, and access reviews while providing a completely audit-ready environment for compliance and standards requirements. For instance, its built-in reporting wizards allow the use of pre-configured and ad hoc reports to help reduce audit failures and maintain compliance with SOX, BASEL II and GLBA to name a few. Other SAFE for Finance features include: the ability to establish and implement role-based physical access assignments across single or multiple systems; support regulatory governance and compliance such as BASEL II and GLBA; and allow area owners to electronically manage all processes. SAFE for Finance securely integrates with human resources, contractor management, and training and physical access control systems. In addition, by analyzing alarms, badge usage data and other identity-related data sources, SAFE for Finance provides information related to facility utilization, usage/ non-usage of access and any anomalous and/ or suspicious behavior.

107

www.indiasafe.com

CMYK


CMYK

108

CMYK


CMYK

109

CMYK


CMYK

COP Security Announces Two New Additions to the Nexus IP Camera Range

Professional trade only CCTV security products distributor COP Security, has announced the release of two new IP cameras omplimenting their recently launched range of NexusIP NVRs and accessories, the two new Nexus IP cameras feature H.264/ MJPEG dual streaming, digital wide dynamic range (WDR) and power over ethernet (PoE). Sharing an enviable specification, the IP-390DMI-3.0 megapixel vandal dome and IP-390MI-3.0 megapixel bullet camera feature day/ night imaging with IR cut filter and onboard IR LEDs for nighttime surveillance up to a range of 20/ 30m respectively.

C

Allowing the installer/ end-user to adjust the cameras’ zoom and focus directly from a Nexus NVR, both cameras also feature a 3-9mm motorised zoom lens. This feature allows easy field of view scene configuration at any time should the need arise. The installer can literally fit the camera in the general direction it needs to face, connect an RJ45 and PoE, and the cameras’ Plug & Play feature will do the rest ~ providing simple set-up and connectivity, saving installation time and cost.

IDIS announces DirectIP™ and Lenel OnGuard Integration

Rich functionality through OnGuard provides customers with a powerful and flexible security platform utilising high-performance DirectIP surveillance DIS announces successful Lenel factory testing of its DirectIP network video recorders (NVRs) with Lenel’s OnGuard® access control, making the dedicated surveillance powerhouse a member of the Lenel OpenAccess Alliance Program (OAAP). The integration provides Lenel customers with seamless DirectIP integration and rich functionality through its OnGuard integrated platform in order to deliver end-users the full benefits of full-HD and high performance DirectIP surveillance. The integration allows comprehensive DirectIP functionality including live video, record, play-back, pan-tiltand-zoom (PTZ) control and allows operators to efficiently manage users from

I

Extended functionality and surveillance performance is catered for via the cameras’ 1/3” progressive scan CMOS image sensor, Micro SD card support, ONVIF compliance, and mix of I/Os including; 1x Alarm In 1x Alarm Out, 1x Audio In 1x Audio Out and 1x Analogue Terminal Output.

November 2014

110

the unified OnGuard platform to deliver powerful event and alarm correlation with full-HD video verification.

Packaged as an end-to-end solution, comprising a range of cameras, monitors, network video recorders (NVR) and comprehensive video management software, DirectIP delivers unrivalled plug-and-play simplicity, combined with highest-quality performance and industry-leading pricing levels.

DVS Ltd Place High at Fastest Growing Company Award

The security products importer and distributor, DVS Ltd. have placed 24th at the 2014 Western Mail, Welsh Fast Growth 50 awards his year’s awards were based on company growth achieved through 2011-2013. During this short period DVS managed a whopping 146.5% increase.

T

Scott Thomas (left) and Shaun Bowie (right) founders of DVS, the CCTV products and services specialists

www.indiasafe.com

CMYK


CMYK

Launched in 1999, the accolade acknowledges the fastest growing Welsh companies every year and is widely regarded as the one that entrepreneurial Welsh businesses strive to achieve. A full list of this year’s entrants can be found on the Fast Growth 50 website. DVS has seen vast organic growth since its start in 2003 and with a projected turnover exceeding £10million for the current financial year, they are sure to improve their position on next year’s list. The Cardiff based company have experienced huge growth by focussing on innovative and emerging technologies since their inception in 2003. In recent years they have secured the distribution rights for forward thinking security based companies Hikvision and Prism Skylabs.

Learn CCTV ~ More than a Training Organisation

Learn CCTV announces training courses for the security and CCTV industry earn CCTV says that it understands the importance for installers providing technical service management to end users, and based upon this has introduced a number of initiatives to assist smaller manufacturers and installers in all aspects of new business. Services include assistance in demonstrating and launching new products and technologies, assisting the clients in

L

understanding the latest technologies and protocols, carrying out full product demonstrations to ensure all features of the products are communicated to the client or end user in a clear and practical manner; and on site technical visits for real scenarios, true to life technical support and problem solving along with visiting clients and end-users to discuss and demonstrate new technologies at their premises.

Learn CCTV Managing Director Umar Haq says: “Here at Learn CCTV we are more than a training organisation, we are a full service organisation here to bridge the resource gap of both installers and end-users. With our highly skilled and experienced team Learn CCTV offers invaluable assistance to current, new and future CCTV customers and users. We feel that these services are not offered any where else in the CCTV industry and will become an asset to both installers and end-users when adopting new technologies and products.”

Luminite PIR Detectors Provide Cost Effective Security Solution

Luminite PIR detectors were recently used to secure a large clothing warehouse facility in Bedford that had November 2014

111

been prone to regular break-ins he insurers required an early warning system to be put in place that specifically detected potential break-ins through side walls. The client looked at using vibration sensors but these would have to be placed every few metres horizontally and vertically meaning that several hundred would be needed. The client simply did not have the budget for this so Tensor designed a system based on Panasonic and X-vision cameras, EyeLynx’s SharpView system and Luminite’s Genesis PIR detectors. Instead of hundreds of vibration detectors just half a dozen Genesis PIR detectors were used to secure the warehouse. The detectors alert the SharpView NVR which sends the Panasonic cameras to the preset covering the area of intrusion.

T

Graham Creek, Managing Director of Luminite commented, “In this current financial climate, not all businesses have a large security budget. We are delighted that Genesis PIR detectors satisfied the strict specifications from the Insurers at a fraction of the price of several hundred vibration detectors. Our continued collaboration with EyeLynx’s SharpView security software is proving seamless and cost effective for the end users.” Luminite offers a full security detection package encompassing PIR detectors (both hard wired and wireless), active infrared beams and security cameras.

www.indiasafe.com

CMYK


CMYK

Mayflex Appointed Distributor for Digital Barriers Video Analytics

Mayflex, the cabling infrastructure, networking and electronic security solutions distributor, has signed an agreement to distribute Digital Barriers’ intelligent video analytics application for reliable zone-based intrusion detection ~ SafeZone-edge afeZone-edge is the first edge-based product to combine the performance of server-based intelligent video analysis (IVA) with the simplicity of video motion detection (VMD). With UK Government certification (i-LIDS® scheme), SafeZone-edge is designed to protect secure facilities and reliably monitor remote sites, with exceptional detection accuracy and minimal false alarms. It is available now on a wide range of compatible Axis cameras and encoders. In addition to performance, SafeZone-edge was designed with a relentless focus on ease of installation, affordability and scalability. An innovative autocalibration feature dispenses with complex scene calibration tasks, allowing multiple cameras to be installed quickly and without fuss. Intelligent processing ensures reliable operation, adapting automatically

S

to seasonal and environmental conditions (variable illumination, shadows, weather) that can otherwise cause nuisance alarms. In a real-life operational test conducted over a week, replacement of a VMD solution with SafeZone-edge resulted in a nuisance alarm reduction of 10,000+ to just 1.

Norbain’s New Product Catalogue Offers Bright Ideas In Security

Norbain is pleased to announce that its new product catalogue is available now he new product catalogue showcases the huge number of suppliers and solutions Norbain can offer customers from an extensive range of IP and Analogue CCTV, Access Control and Intruder products. Responding to feedback, the catalogue has been completely redesigned, allowing information to be found more easily than ever before. New style product comparison tables allow customers to quickly compare products with a minimum of effort, allowing for informed decisions to be made. As always, Norbain strives to ensure customers have the widest choice from the world of electronic security. New suppliers to this edition of the catalogue include brands such as Flir, Cathexis, Wavestore, VOLO, Hoyles, Remsdaq, CQR, Aten, Exacq, IQinVision, NUUO and ZyXEL. As comprehensive as the catalogue is, it’s not exhaustive in terms of the com-

T

November 2014

112

plete range of products Norbain can offer. In addition to the catalogue, Norbain has one of the most experienced and knowledgeable sales teams in the industry who are ready to advise and support on customers’ requirements. Norbain also offers CPD accredited training courses, free technical support, a time-saving pre-configuration service and an extremely efficient repair service. Please speak with your Norbain Account Manager to request your copy of the catalogue, or fill in our online form to book a visit from your local field sales representative who will personally hand deliver it to you.

Redvision’s X-SERIES™ Rugged Dome Demos Help Clinch New Business for Installers

Redvision has committed to supporting installers with evening demonstrations of its X-SERIES™ rugged PTZ and dome camera range aul Hucker, Managing Director of UK-based CCTV manufacturer, Redvision, stated, “Once installers and end-users see the quality of the images the X-SERIES™ cameras produce at night, with colour images and full facial recognition at up to 40m, they need no further convincing to buy our cameras.” The demonstrations are organised through the Redvision sales team: Glenn Waterfall covers the south and Andy Al-

P

www.indiasafe.com

CMYK


CMYK

exander covers the north. Paul Hucker continues, “As winter approaches and the evenings draw in, a live demonstration of our X-SERIES™ cameras is by far the best way to see their full capability. We demonstrate the 100m illumination range of our superefficient IR and white light LEDs, and how the dual light model will toggle automatically, or manually, between IR

and white light modes. The IR lighting is covert and unobtrusive, but still produces high-quality images, whilst the white light mode is overt and can be used to spotlight an intruder as a deterrent or warning. Our ‘dark-zone’ feature, where the white light is suppressed in pre-defined zones to prevent nuisance or hazardous operation such as dazzling drivers, can also be easily displayed. We compare the reach of 18, 28 and 40x zoom options and reveal how predefined lighting profiles can be assigned to preset positions with adjustments for night-time, day-time or weekends. And if it rains, we can show the wiper in action.”

RISCO Group Releases VUpoint live Video Verification Solution

verification solution that seamlessly integrates with RISCO security systems to provide a combined intruder detection and video verification solution tilising RISCO IP cameras and cloud connectivity, the highly costeffective VUpoint solution is designed for use within RISCO’s Agility 3 and LightSYS 2 intrusion systems. The addition of VUpoint ‘video-ondemand’ capability enables users to view their homes or businesses, providing an unprecedented level of security and peace of mind. In addition to providing unlimited real-time ‘live’ video surveillance on demand, VUpoint video enabled intrusion systems also provide video clips of up to 30 seconds in length and/ or snapshots in response to an alarm trigger (from an intrusion or safety alert). VUpoint video clips and snapshots can be viewed via RISCO’s latest iRISCO smartphone app, enabling users to visually verify if an activation poses a real threat, or is simply a false alarm. The app can also be configured to call a local police station or a security service provider should the footage reveal an intrusion, offering users and alarm receiving centres an extremely high level of integrated security and functionality. A key advantage of VUpoint lies in its simplicity. RISCO IP cameras are easy and quick to install, requiring no specialised training. Enabling maximum surveil-

U

Global integrated security solutions provider RISCO Group, has released VUpoint, a revolutionary new video November 2014

113

lance coverage, the IP cameras are available in both indoor and outdoor versions. In addition, they do not utilise any alarm zones and can be added in unlimited quantity, ensuring comprehensive security and safety across any selected areas of a secured property.

Meyertech and SilverNet Agree Technology Partnership Designers of remote monitoring video surveillance systems will be encouraged to take advantage of the benefits of wireless networking by news that SilverNet’s Point to Point, Point to Multipoint and Backhaul systems have been integrated with Meyertech’s video management software (VMS) eyertech is one of just a few companies globally who can provide 'mixed technology' hybrid solutions that incorporate both analogue and digital IP cameras. The integration between the two British manufacturer’s respective offerings further enhances Meyertech’s ability to be at the heart of an integrated end-to-end video surveillance solution. Following the completion of the integration process, Meyertech and SilverNet have forged a technology partnership which will see the two companies working alongside each other at seminars and road shows, as well as carrying out other marketing activities in order to promote the benefits of IP based integrated video surveillance solutions.

M

www.indiasafe.com

CMYK


CMYK

Annual Subscription: 1000/- for 12 Issues

* Please subscribe through admin@indiasafe.com

WE ARE UPDATING OUR DATABASE For free listing in IndiaSAFE Directory

EXPAND Your BUSINESS

For details contact: spathak@indiasafe.com

* Send your detail to admin@indiasafe.com

India Magazines, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh , New Delhi-110 014, INDIA Tel: +91 11 32471910 • Telefax: +91 11 42828080 • Website: www.indiasafe.com 114 114

CMYK


CMYK

LIST OF ADVERTISERS – NOVEMBER 2014 Page #

S. No.

1.

35-36 (Card)

13.

32, 33-34 (Card)

2.

Gate Fold

14.

91-92 (Card)

3.

116

15.

68

16.

10

17.

11

18.

108-109

19.

15

20.

07

21.

93

22.

37

23.

89-90 (Card)

S. No.

Company

4.

Company

Page #

35-36 (Card)

5.

23

6.

13

7.

27

8.

Gate Fold

9.

08, 09

10.

05 GSA Exhibitions Pte Ltd

11.

Inner Back Cover

24.

18

12.

6, 17, Back Cover

25.

21

115 115

CMYK


CMYK

Professional knowledge to lead the entire security industry

ASIS 8th Asia-Pacific Security Forum & Exhibition 7-9 December 2014 I Marina Bay Sands, Singapore

Does your organization’s strategic plan call for growth in Asia-Pacific? Is your mission to secure the business, to protect the assets or the personnel of your company?

ASIS 8th Asia-Pacific Security Forum & Exhibition is the opportunity you are looking for. Gain access to best practices, innovative ideas and solutions presented by your peers from Asia-Pacific and from other regions in the world, and learn about the latest technologies from the leading companies in the industry. l Opportunity to share knowledge across borders with over 300Â of your peers l Connect with decision-makers and end-users of the industry l Learn from educational presentations and technology

demonstrations

For registration, sponsorship and exhibition opportunities visit

asisonline.org/singapore or send us an email to asiapacific@asisonline.org

116

CMYK




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.