SecurityLink India May 2017

Page 1





CMYK

2

5

SecurityLink India â– 1 April 2017

2 5

CCMMYYKK


CMYK

6

SecurityLink India â– 1 April 2017

6

CMYK


CMYK

SOLAR CAMERA 4G/ LTE/ Wi-Fi/ Hotspot Ready

For remote locations and temporary installations, where it is too complex or expensive to install a dedicated network infrastructure for a traditional surveillance installation. That’s when sparsh deployable solutions make a big difference. They are quick and easy to install, yet offer leading-edge surveillance.

FEATURES Totally self-contained wireless digital IP camera Use cellular network to send video stream to remote location 4G/3G/2G/Wi-Fi/Hotspot ready 2 way communication (optional) High-resolution up to 2MP Battery backup up to 48 hours Integral SD card storage SD Card support up to 128GB

HIGHWAY

For More Information Call:

+91 9555997755

RALLIES

DISASTER MANAGEMENT

BTS TOWER

CONSTRUCTION SITES

sales@sparshsecuritech.com

www.sparshsecuritech.com

SecurityLink India ■ 1 April 2017| Kochi | Bangalore | Chandigarh | Rourkela7| Patna Noida | Delhi | Mumbai | Kolkata | Coimbatore | Lucknow | Kanpur | Nagpur | Raipur

7

CMYK


IW2017_SecurityLink_210x270mm_v1FA.ai

1

21/4/17

4:11 pm

CMYK

C

M

Y

CM

MY

CY

CMY

K

8

SecurityLink India â– 1 April 2017

8

CMYK


CMYK

1 9

SecurityLink India â– 1 April 2017

19

CMYK


CMYK

10

SecurityLink India â– 1 April 2017

10

CMYK


CMYK

11

SecurityLink India â– 1 April 2017

11

CMYK


CMYK

From the Editorial Desk

(102 pages including 6 for cover) Volume I • Issue 10 • 1 May 2017 Editor-in-Chief Santosh Pathak Editor-at-Large Praveer Bagchi

Dear Readers, Greetings from SecurityLink India! This issue leads us to the second year of publishing SecurityLink India. We commenced on May 2016, and when I look back at the year long journey, I realize utmost professional satisfaction. I take the opportunity to express my heartfelt gratitude to the industry for their warm embrace and fullfledged support; and to all our readers and well-wishers for their acceptance, cooperation and good wishes. Since the inception, we have been at the receiving end of overly heartening and encouraging notes from all around, that have helped us evolve and keep firm on the journey. Today I am overjoyed to affirm the brand established. This year envisages big evolutions, and at the advent we present our new ‘logo.’ The ‘logo’ is designed as the Mark of Respect to our Soldiers, and all forms of Security Personnel who endlessly endeavor to secure and safeguard our land selflessly. We, as the citizen of the country, owe to them what can never be paid off.

Design S S Rawat Portal Design & Maintenance Chaudhary Sushil Nayan Bhai

Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana).

Till next month, keep safe and happy reading! With warm regards,

Santosh Pathak Mob: +91 9968172237

SecurityLink India ■ 1 April 2017

12

Circulation Pulak Halder

The editor’s name is Santosh Pathak.

Trust this association will add tremendous value to the scope, excellence and expanse of SecurityLink India.

12

E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com

Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014.

This month our editorial team expands and we, at SecurityLink India, are delighted to welcome Praveer Bagchi on board as the Editor-at-Large. Mr. Baghci is Ex-chairman, the Prime Minister’s Follow-up Action Programme; Ex-advisor to IBM; and present Advisor to Central Association of Private Security Industry (CAPSI).

12

SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080

All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)

CMYK


CMYK

13

SecurityLink India â– 1 April 2017

13

CMYK


CMYK

may 2017

CONTENTS report

White paper

32

68 Computer Vision based Fire Detection System

India Risk Review 2017

Feature articles

Dahua Contributes to Safeguarding Ports with Intelligent Solution

54

Five Reasons to Move Your IIoT Platform to the Cloud Making the Cloud Work for You

82 83

National Roundup 18 DBSS Brings LVA™ from Israel to India 19 AIL Appointed as NSDC’s Official Training Partner • CP PLUS Secures Punjab Prisons 20 • IESA Vision Summit 2017 21 Futurex Opens Office in India 22 WD Enhances Surveillance-Class Hard Drives to 10TB 23 Tenon Group Revamps Brand Logo 24 VI Group to Aid Smart Cities, Digital India Initiative 25 Successful Debut for INOS+H Expo in New Delhi 14

26 Telit Opens Major R&D Center in Bengaluru 27 Matrix QR Code Based Access Control 28 ‘Hi-Five’ for Hikvision at Secutech India 2017 29 WDC at Secutech India 2017 30 COM-SUR Awarded at Secutech India 2017 31

• Securens Awarded the ‘Control Room of the Year’ at Secutech India • Matrix Platform Helps Leading Bank

SecurityLink SecurityLink India India ■■ 11April May 2017

14

CMYK


CMYK

Emergency EmergencyLighting LightingSystem System

SimpleInstallation Installation  LowVoltage Voltage   Simple  Low Intelligent LowMaintenance Maintenance    Low  Intelligent LED   LED

For Formore moreinformation informationvisit visit SecurityLink India ■ www.hochikieurope.com/firescape 1www.hochikieurope.com/firescape April 2017 15 World World Class Class Leaders Leaders inin Fire Fire Detection Detection Since Since 1918 1918 15

CMYK


CMYK

may 2017

CONTENTS Product showcase 36 Milestone’s XProtect Using NVIDIA GPUs 37 Axis Explosion-Protected Cameras 38 Hikvision Turbo HD 4.0 Solution 39

• HID New Indoor Positioning Services • Axxon Drivers Pack 3.45

40

• Limelight New Cloud Security Services • Artesyn ControlSafe™ SIL4 COTS

41 Kentima Ethiris VMS v8.2

45 Quantum New StorNext 6 46

• Raytec Expands Range of Network Illuminators • March New 9000 Series Video Recorders

47 Honeywell AlarmNet 360 Insights 48 New OnSSI Ocularis VMS Enhancements 49 Pelco Advanced VMS & Imaging Solutions 50 Flir’s New Wave of Offerings

42 Motorola Public Safety Mobile Applications

51

• LonTrend LTEX17 Explosion Proof Housing • Uniview 12MP PTZ Dome

43 Quantum Secure SAFE PIAM Platform

44 Pivot3 Enhances Surveillance Solutions

52 Wavestore Launches VMS v6.6

application/ Case Studies

International Security Conference & Expo 2017

16

71-81

58-67

International updates

85-95

SecurityLink SecurityLink India India ■■ 11April May 2017

16

CMYK


CMYK

THANK YOU FOR VISITING INFINOVA Infinova, a pioneer in the security industry and a leading provider of world-class unified IP security solutions, demonstrated the latest surveillance technologies and solutions in Secutech India 2017 held on April 6-8. Please visit www.infinova.com for further information about our innovations in the surveillance solution.

C

M

Y

CM

MY

CY

CMY

K

World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States, Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova Middle East (Kuwait): Office # 13, 5th Floor, KFH Bldg # 240, Mirqab, Kuwait Landline and Fax: +965-2247-5678, Email: Sales-ME@infinova.com

Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com

17

SecurityLink India ■ 1 April 2017

17

CMYK


CMYK

National Roundup

DBSS, India Brings Layered Voice Analysis (LVA™) from Nemesysco, Israel in India D

B Secure Solution Private Limited (DBSS) India has recently entered into a distribution partnership with Nemesysco, Israel for the distribution and promotion of Layered Voice Analysis (LVA™) in Indian civilian and corporate markets. Nemesysco, Israel is one the leading companies in voice analysis technologies worldwide. It is a privately held company founded in 2000 and is headquartered in Israel, with service centers and network of partners around the globe. Nemesysco’s solution which is powered by Amir Liberman’s ‘Layered Voice Analysis’ (LVA™) patented technology addresses different needs of the security, corporate and financial markets, enabling organizations to enhance crime detection and prevention; expedite investigations; identify and fight fraud more effectively; improve veracity assessment during recruitment processes and provide better services to the public in need. Amir Liberman, CEO and Founder of Nemesysco mentioned that his team is highly dedicated towards the development of advanced and non-invasive investigation and security tools, fraud prevention solutions, CRM applications, consumer products and psychological diagnostic tools – all based on Layered Voice Analysis (LVA), their proprietary and patent protected voice analysis technology. He felt happy and expressed strong confidence in DBSS and their team, and their ability and reach into the Indian sub-continent special market needs. Anil Dhawan, Managing Director, 18

DBSS was equally happy and excited about their teaming up with Nemesysco. He expressed satisfaction and high

prietary set of vocal parameters found through research to correlate with key human emotions, and in various combi-

(From L-R) Amir Liberman, Anil Dhawan & Yossi Aviram, Advisor

confidence in the product suitability especially in view of the recent complex threats frequently observed these days. He said, “Nemesysco’s Layered Voice Analysis is a completely new and proprietary technology and has no relation to any old voice analysis technologies, nor does it uses any previously known method for detecting voice stress. LVA does not perform micro-tremors (8-14 Hz) analysis in the voice, and can be used over telephone lines and with standard commercially available microphones.” Amir also explained the product and said, “Nemesysco’s technology was originally invented in 1997 by me, and is being developed ever since in consultation with experts from different relevant fields such as psychology, criminology, phonetics, psychiatry, mathematics and others.” The technology is based on a proSecurityLink India ■ 1 May 2017

CMYK

nations to be able to identify deceptive intentions in real life scenarios. These vocal parameters were identified from a bank of audio files taken in different languages and a numerous settings including police interrogations, call centers and controlled experiments. Many of the parameters Nemesysco’s technology uses are new to the world of phonetics, and focus on the uncontrolled and yet phonetically unexplained properties of the human voice. Layered Voice Analysis (LVA™) is adapted to meet the needs of various professional users, ranging from formal police investigations to security clearances, from vetting and recruitment needs to personality tests, and from call center’s quality monitoring to intelligence gathering and lawful interception multi-channel analysis.


CMYK

National Roundup

In its security uses, LVA technology enables better understanding of the subject’s mental state and emotional reaction at a given moment by detecting the hidden emotional cues in his or her speech. The technology identifies various types of stress levels, cognitive processes, and emotional reactions that are reflected in different subtle properties of the voice. This information provides insights into the way your subject thinks, what troubles him, what excites him, what portions of his speech he is uncertain about, what questions require more of his attention, and what areas appear to be sensitive issues for the speaker.

LVA uses a unique mathematical process to detect different types of patterns and anomalies in the speech flow and classify them in terms of stress, excitement, confusion and other relevant emotional states, found through our 19 years of research to be highly correlated with these emotions.” On comparison with Lie Detector he said, “Professionals in the field of lie detection know that there is no such thing as a real lie detector; since lying is not a unified reaction that is consistent at all times. Even the polygraph, the most known Lie detector, can only function properly in its predefined settings and in the relevant context. Simply connecting a polygraph

to a person watching a video or performing any physical activity will render of course meaningless results. Lying is a result of a deep logical process that is executed with a particular and significant intention. One might lie to protect himself from harm, while another might lie to gain profit, or even just to make a joke. Due to this variety in motivations and intentions, there is no fixed set of characteristics (physiological or psychological) that differentiate ‘lies’ from ‘truth.’ However, LVA can detect and sharp change in the associated emotional reactions (a jump out of homeostasis) and assist you, the professional user, to expose the risk and uncover the truth.”

AIL Appointed as the Official Training Partner of NSDC A

ditya Infotech Limited (AIL) has recently been appointed as the official training partner for National Skill Development Corporation (NSDC). In its first, AIL conducted an RPL certification test to certify CCTV technicians and supervisors. “This is our first engagement with NSDC on an educational level, and the

RPL certification test was our first rollout. This test was designed to evaluate technicians and supervisors on their knowledge of CCTV systems, and has been taken by industry aspirants. This certification shall save security industry employers multiple levels of scanning to find the right candidate,” commented Yogesh B. Dutta, COO, CP PLUS.

“The test, which was the first of its kind, was conducted on 30th March, 2017 at the Aditya Headquarters at A-5, Sector 12, Noida. The test involved a nominal registration amount of INR 1,500 and was open to all industry aspirants, including technicians and supervisors. Backed by NSDC, the purpose of the certification is to test a technician’s knowledge on CCTV systems, and render them sound for executing CCTV projects, including government and corporate projects.” – Yogesh B. Dutta COO, CP PLUS SecurityLink India ■ 1 May 2017

CMYK

Despite being a new introduction, the test saw an impressive number of takers, making the effort a success. AIL and NSDC plan to conduct more such tests in the near future. 19


CMYK

National Roundup

CP PLUS Secures Punjab Prisons

T

he state of Punjab possesses about 40 jails that include a high security prison, 9 central jails and 25 district jails. Being a highly sensitive state owing to its shared border with Pakistan, Punjab prisons retain some notorious fugitives, and are always needed to be on high alert. Following the much hyped jail break in the Nabha Modern Jail, the Punjab Prison officials reviewed the situation and found that their existing analog sur-

veillance systems with wire-intensive infrastructure and low resolution cameras were functional but largely inadequate, and they decided to upgrade, and equip the jails with an industrial grade surveillance system with tamper-proof, high quality imagery features.

Solution

I

P solutions make the ideal choice when locations are spread out and tampering is the concern, and so it is for Punjab

prisons. IP cameras offer superior image clarity and since they work through the Internet, cabling requirement is largely reduced, eventually making them much less vulnerable to tampering. Installation and maintenance are also not as difficult as in the case of analog. With days of careful screening, key locations were identified where cameras would be installed for maximum coverage and clear visibility. Care was taken to ensure the cabling was designed to avoid tampering. A combination of CPPLUS 2MP cameras with vari-focal lenses, WDR, alarms, and raid-enabled 32 CH NVRs were deployed across the prisons, and the prison officials are found quite impressed and satisfied with the installation.

Makeathon at IESA Vision Summit 2017 Sparks Unique Digital Creation

Focus on innovation in Internet of Things, Augmented Reality/ Virtual Reality and Industrial IoT

I

ESA Vision Summit 2017 Makeathon (contest) celebrated ideas that are transforming manufacturing, mobility and technology. Twenty two teams participated in the 36 hours Makeathon, at the 12 th edition of Vision Summit. IESA encour20

aged technologists, students and start-ups to come and create cutting edge technology around the theme of Driving Innovation in Augmented Reality/ Virtual Reality (AR/VR) and Industrial IoT (IIoT). The Makeathon winning team, SecurityLink India â– 1 May 2017

CMYK

was awarded a cheque of `1,00,000 by Priyank Kharge, Minister of State IT & BT and Tourism, Govt. of Karnataka and Ujjwal Munjal, Founder of Hero Electronix at the concluding ceremony of the two day Summit.


CMYK

National Roundup

Winner The Machinists: Prototyped a Smart Industrial-Failure-Detection System, combining technologies like Internet of Things (IoT), Artificial Intelligence and Augmented Reality.

1st Runner up VR Roover: Created an immersive experience of the VR Rescue bot, used for inaccessible places during disaster recovery.

2nd Runner up Dev Inc.: Created an Intelligent Helmet for bikers using AR & IoT, for run time navigation.

Special mention Virtualists: Solved tourism issues of travelling safely and efficiently around India and improving tourists experience and increasing revenues. The winning team are students from

SRM University, Bangalore who created a system that collects vital machine sensor data like temperature, humidity, moisture and sends all this data to the cloud, allowing easy access from anywhere. Artificial intelligence algorithms are used to analyse this data to estimate and predict multiple kinds of failure in the machine. A message is sent to the supervisor in case any incoming failure is predicted. The team also created an augmented reality mobile phone app that augments the data and overlays it when pointed at the machine to provide an immersive experience and allows for quick detection and repair. Congratulating the winners, K Krishna Moorthy, Chairman, IESA commented, “Fostering the spirit of edupreneurship among the youth we wanted to create a platform where solutions can be developed to positively impact our lives. We have seen a tremendous participation at this year’s Makeathon, with

showcase of some ingenious creations. IESA values new talent and we hope through such initiatives we can help in inspiring and providing more opportunities for the next gen of leaders.” Elated with the win, Swaroop Belur, The Machinists commented, “We are delighted to have won a Makeathon of this scale. Our goal was to create a prototype of a system that can detect faults in a machine and notify the system administrator for troubleshooting. We have used advanced technologies such as Artificial Intelligence, Internet of Things (IoT) and Augmented Reality to create this prototype. We hope to deploy this system once it is industry ready as it can be very useful in the ESDM sector for failure detection. We would also like to thank IESA for providing us with a platform such as Vision Summit to set our plans into motion. This was one of the best organised hackathons and we are happy to have been a part of it.”.

Futurex Opens Office in India F

uturex has announced the opening of its newest international office in Mumbai, India, in support of the region’s rapidly expanding needs for enterprise cryptographic hardware and cloud-based services. Under the leadership of industry expert Ganesh Karri, Chief Solutions Architect and Regional Business Manager for South Asia, the office will support and expand Futurex and VirtuCrypt’s presence in the region by working directly with customers as well as sup-

porting a growing network of channel partners. With experience spanning over 35 years, Futurex provides hardened, enterprise-class data security solutions for industries including financial services, retail, IoT device manufacturing, government, general corporate, and more. Using FIPS 140-2 Level 3 and PCI HSM validated secure cryptographic devices, Futurex and VirtuCrypt offer the industry’s only Hardened Enterprise Security Platform that spans both on-premSecurityLink India ■ 1 May 2017

CMYK

ises hardware and cloud-based services. Over 15,000 customers worldwide have trusted Futurex technology to protect their most sensitive data. India has one of the world’s fastest growing economies and 2nd largest population, and is home to a myriad of organizations in need of hardened data security solutions tailored to fit their unique needs. “Futurex offers cutting-edge technology to protect enterprises from security breaches, and our ability to provide 21


CMYK

National Roundup

regional representation to our customers and partners is significant” said Mr. Karri, “The opening of this office marks an important step in the growth of our presence in India and South Asia.” The inauguration of this office marks the second international location

Futurex has recently opened, with Futurex’s Mexico City office having opened in July of 2016. For over 35 years, Futurex has been a globally recognized provider of hardened, enterprise-class data security solutions. Over 15,000 customers worldwide

have trusted Futurex’s innovative Hardened Enterprise Security Platform and the VirtuCrypt Hardened Enterprise Security Cloud to provide market-leading solutions for the secure encryption, storage, transmission, and certification of sensitive data.

Western Digital Increases Capacity of Surveillance-Class Hard Drives to 10Tb 25 percent capacity boost, support for up to 64 HD cameras equips systems for always on, 4K ready surveillance

W

estern Digital Corporation has announced the availability of the WD Purple™ 10TB HDD, the newest member of its high-capacity hard drive line for surveillance applications. According the IHS Markit, anticipated growth of 4K-compliant and high-res-

22

olution network cameras over the next few years is driving higher demand for surveillance-class storage to support systems featuring these technologies. With increased capacity and proven leading-edge technology, the WD Purple 10TB HDD is optimized for 24x7 video surveillance systems and up to 64 high-definition (HD) cameras in home and small business security environments. “Advanced imaging technology advancements are expanding the value that video surveillance provides for applications ranging from retail and public safety monitoring to smart-city infrastructure, all of which are driving new storage needs,” said Khalid Wani, Managing Director for India Sales, Western Digital Corporation, “Our new 10TB drive inherits the high performance, reliability and endurance qualities of our WD Purple family, SecurityLink India ■ 1 May 2017

CMYK

with maximum capacity to offer VARs, integrators and consumers a 4K-ready solution for current and next-generation surveillance systems.” “All of us at 45 Drives are excited about the new WD Purple 10TB hard drive,” said Doug Milburn, Vice President and Cofounder of 45 Drives/ Protocase, Inc., “With so many of our customers in the surveillance industry, it’s important for us as a company to have the right products for their needs. WD Purple hard drives provide the two critical elements to our customers – density and enhanced reliability – all at a reasonable price point.” Optimized to withstand the demands of always-on DVR and NVR recording environments, 10TB WD Purple hard drives offer low power consumption, exclusive WD® technologies and many advanced performance features including: ● AllFrame 4K™ Technology: Estimated at two percent of the camera network security camera market in


CMYK

National Roundup

2017, 4K video surveillance cameras are expected to reach 29 percent by 2020. AllFrame 4K technology enhances ATA streaming support to help reduce video frame loss with proprietary cache policy management technology to improve overall data flow and playback. WD Purple 10TB HDDs include exclusive firmware enhancements that help protect against video pixilation and interruptions within a surveillance system. ● HelioSeal™ Technology: Enabling higher storage capacity and lower power consumption, the WD Purple 10TB HDD uses the third generation of HelioSeal technology, which has

been shipping for over three years and on over 12 million drives as of December 2016. ● Scalable Surveillance Systems: Designed for 24x7 operations with support for multi-bay systems with an annualized workload rating of 180 TB/ year and tarnish-resistant components, WD Purple 10TB drives are ready for use in demanding highperformance, high-definition smallor large-scale surveillance systems

Engineered for compatibility

B

uilt for easy integration into new or existing video surveillance sys-

tems, WD Purple hard drives are designed and tested to surveillance-class standards and are compatible with industry-leading chassis and chip-sets. Without a current industry standard, WD worked closely with surveillance partners to develop a proprietary benchmark to define and demonstrate performance in surveillance systems. The new WD Purple 10TB drive complements Western Digital’s broader family of advanced storage solutions for the surveillance market, offering a core-to-edge portfolio that supports customers from cloud storage and server systems out to the surveillance cameras.

Tenon Group Revamps Brand Logo on Completing 22 Years Creating synergy across verticals

T

he leading Integrated Security & Facility Management Corporation – The Tenon Group has undertaken a massive brand identity overhaul and revamped the logo. It is the biggest repositioning since its inception about 22 years ago. The new identity reflects both the evolution of the company as well as its vision for the future. Over the last two years Tenon has significantly expanded their global footprint and are present in a leadership position in India, UK and Singapore. The re-branding coincides with the Group’s global vision and strategy to align and synergies the various business verticals present across the geog-

raphies. It is also about repositioning Tenon in the context of the competitive environment they operate in, and reflects a desire to focus on quality that differentiates them from their competitors. The contemporized logo with its modern look, colour and lines captures the new positioning. Over the years, colours have been used to represent the branding of various Tenon Group companies. Each have been distinctly individual from the other. In the re-brand scenario, a colour palette of a single colour – Purple, has been adopted to create a synergy across verticals. The use of purple further demSecurityLink India ■ 1 May 2017

CMYK

onstrates boldness and makes a strong representation of their unique vision for the company. An uncluttered colour palette also ensures harmony and creates a faster recall. The new look is stylized and with fresh typography that is streamlined with the colour palette that binds together the three main companies emanating from the Group. The company now plans to streamline their various Business Units and strengthen it under 3 key verticals: ● Tenon FM: Will globally provide Facilities Management services. ● Peregrine: Will deliver comprehensive security solutions. ● Soteria: For remote services. 23


CMYK

National Roundup

Commenting on same, Manjit Rajain, Group Chairman, Tenon Group said, “Tenon over the last two decades has experienced exponential growth and we feel it is the right time to invest and align our marketing strategy with our business opportunities. Our refreshed brand goes much deeper than just a new logo and colour. It reflects

our commitment to creating ‘clients as partners for life,’ as has been the case for the past 22 years. While the brand colour and typography have changed to better represent what the company is today, Tenon’s value proposition remains the same – our combination of excellence in service, exceptional client engagement and deeper industry exper-

tise remains unique, and enables us to develop long-lasting and rewarding client relationships.” Since 1995, Tenon has been a pioneer in providing integrated security and facilities management services. With a turnover of over `1,500 crores globally, the company targets to grow 22-25% in next 5 years.

Vital Intelligence Group to Aid Smart Cities, Digital India Initiative S

trengthening its commitment for a secured India in the cyber space, Vital Intelligence Group, a world leader in cyber Intelligence will demonstrate its industry leading cyber intelligence platforms in India, which incorporate a host of predictive open source intelligence solutions (OSINT), empowering organizations with a predicative and proactive investigative approach in tackling crime, terror and cyber fraud in almost real time. The virtual intelligence collection system ‘VICAS’ solution by the company accumulates evaluative information from sources such as social media platforms, websites (including the deep dark web) as well as analyses internal databases to detect potential threats. This vital cyber intelligence platform also offers comprehensive tools for proactive analysis, enhancing any safe and smart city initiative with the tools required to close the serious gaps facing cyber security. 24

With India witnessing a rapid digitization in all sectors, owing to government initiatives and efforts, coupled with a flood of budgetary smart devices, the country has marked its presence in the list of 'hot targets' for global cyber intruders. Furthermore with the country gearing up for initiatives like Smart Cities and Digital India Programme where IoT and automation will play a key role, the risk of targeted cyber-attacks has soared many folds as their devastation in such a scenario is beyond comprehension. Detailing more about the company's commitment for a safer, secured India, Marc Kahlberg, CEO and MD, Vital Intelligence Group said, “With India emerging as a significant economy in the globe, the country is at an increased risk of targeted cyber-attacks aimed at its principal verticals including finance, defence, government etc. The presence of hostile neighbors further bolsters the importance for the country to adopt proSecurityLink India ■ 1 May 2017

CMYK

active defensive measures in the cyber security space.” The Vital Intelligence group is also excited about an increased collaboration between India and Israel in the technological and defence segment to help both the countries in preparing for the stealth cyberwar that is happening already. “Future wars will not just be confined to battlefields, but will be strategically decisive in the cyber space. The world is already involved in an advancing and ongoing cyberwar which will only get more intense as the globe gets connected and digitized.” The Vital Intelligence Platform incorporates a host of different cyber Intelligent solutions including a world first FUSION-KEY software that collects, fuses, manages and supports intelligence mission-enabling command, control, communications, surveillance, intelligence collection and location capabilities via advanced engineering and processes of the highest levels.


CMYK

National Roundup

Successful Debut for INOS+H Expo in New Delhi Both trade visitors and exhibitors voiced satisfaction with the outcome of the trade fair Valuable synergies due to concurrent International Vision Zero Conference

O

n 17 March 2017 the first edition of the Indian Occupational Safety + Health Exhibition – an event by Messe Düsseldorf and Messe Düsseldorf India – closed with positive results in New Delhi. The trade fair took place in parallel with the INTERNATIONAL VISION ZERO Conference organised by the Indian Directorate General, Factory Advice Service & Labour Institutes (DGFASLI) and the German Social Accident Insurance (Deutsche Gesetzliche Unfallversicherung (DGUV). The Conference was supported by the International Social Security Association with the Sections for Prevention in the Construction Industry, Mining and Electricity. For three days to the tune of 50 exhibitors from Austria, China, Germany, Great Britain, India, Sweden as well as Taiwan presented their product innovations from the areas of safety at work, personal protective equipment, health promotion and security at work. The trade fair and Conference attracted 1,400 trade visitors from all over India. Summing up, Joachim Schäfer, Managing Director at Messe Düsseldorf said, “We are very pleased that we can establish the success formula of A+A in Düsseldorf as the world’s leading trade fair with congress for safety and health at the workplace on the Indian market. Thanks to the valuable support by DGFASLI as well as by ISSA, the International Association for Social Security,

and the concurrent staging with the first INOS+H EXPO aroused trade visitors’ interest from the outset. All first-time exhibitors, including many industry leaders, have already announced their participation at the next INOS+H EXPO 2019.” “The first Vision Zero Conference was organized by DG FASLI & DGUV in cooperation with ISSA in response to the increasing importance of safe workplaces in India. The INOS+H trade fair held in parallel perfectly complemented the Conference and presented the relevant products on a high quality level. We definitely want to continue and expand this cooperation,” stresses Professor Karl-Heinz Noetel, Vice-President of ISSA’s Construction Industry Section and Head of the PPE division. Trade visitors and exhibitors benefited from numerous opportunities for concluding business deals, expert exchange and praised the professionalism of the event. Commenting on this Klaus Bornack, CEO of Bornack GmbH & Co. KG said, “Thank you very much to Messe Düsseldorf India and the team of A+A. This was our first show in India. The venue and organisation were very professional. Due to the high-level conference, we met competent decision makers from all over India and from different industries like mining, construction and energy.” Ainge Wu, Sales Manager at WenSecurityLink India ■ 1 May 2017

CMYK

zhou Donghi Optical Co. Ltd. from China, also voiced his satisfaction with the new trade fair, “The company has just planned to enter the Indian market when we received the launch information of INOS+H, a member show of A+A, so we decided to participate in the show very quickly. We received a lot of enquiries about our products and met with a couple of high-quality buyers during the show. Thanks to Messe Düsseldorf launching INOS+H at the right time. For sure we will participate in the next show.” At the debut event the organiser welcomed such high-calibre exhibitors as Bornack GmbH & Co. KG, Globus Group, Loxy Sweden AB, Paulson International Ltd., 3M India Ltd., Accent Industries Ltd., Lakeland Gloves and Safety Apparels Private Limited and New Pig India Pvt. Ltd. Minister of Labour Bandaru Dattatreya and Secretary of State M. Sathiyavathy emphasised the increasing importance of safety and health at the workplace in India’s current economic environment. “With above-average economic growth and a rising income of US$ 5,410 GNP per capita there is increasing focus on the aspects of safe and healthy workplaces among relevant stakeholders. With its growth potential India is an interesting market for international suppliers of protective equipment. At the 25


CMYK

National Roundup

same time, many international companies run production sites in India and expect the customary safety standards and regulations for technical safety at work to be expanded further. This dynamic environment is the point of departure for the Occupational Safety + Health Exhibition INOS+H Expo which offers

a unique industry platform for experts. INOS+H Expo especially addresses safety engineers, safety experts and officers as well as plant managers and entrepreneurs. It also targets works doctors, industrial physicians but also supervisory bodies, government and mutual indemnity organisations.

In sync with the International Vision Zero Conference on OSH, which disseminates expert knowledge in the sections construction, mining and electricity by way of lectures and seminars, the next INOS+H EXPO will be held in spring 2019 at the Vigyan Bhavan exhibition centre in New Delhi.

Telit Boosts Presence in India with Major R&D Center in Bengaluru T

elit, a global enabler of the Internet of Things (IoT), is expanding its presence in India with a substantial R&D center in Bengaluru. With the recent acquisition of Silicon Valley-based GainSpan Corporation, a wireless connectivity solution provider specializing in design and development of ultra-low power Wi-Fi technology, Telit gained about 60 software development, application and support engineers in one of India’s top high-tech regions. The new Telit R&D center will continue working on Wi-Fi technologies for battery-powered devices along with related intellectual property (IP) in embedded software, including network stacks and application reference designs. Efforts from the Bangalore team have resulted in state-of-the-art developments in Wi-Fi and advanced security protocols, reflected in key patents that have influenced Wi-Fi industry standards. Wi-Fi is a desirable technology for IoT applications and the arrival of ultra-lowpower options opens the door to a vast 26

market of battery-powered application areas that have been protracted to date. ABI Research forecasts the global wireless connectivity market, excluding cellular, to reach more than 10 billion annual integrated circuit shipments by 2021, with 47% of devices enabled by Wi-Fi. Wi-Fi will see its most significant growth in IoT verticals, such as wearables, automotive, the smart home, and other nascent IoT verticals that demand low power. With the new Bengaluru R&D center, Telit bolsters its foothold in India and augments talent and capabilities critical to maintaining its innovation leadership edge. The strategic move will enable Telit customers to benefit from an extensive end-to-end IoT solutions portfolio, now addressing the growing market of battery-powered devices that rely on WiFi and other low-power technologies. “With the new Bengaluru R&D center, we look forward to working closely with our solution partners to help our customers leverage the power of an IoT solutions portfolio that now addressSecurityLink India ■ 1 May 2017

CMYK

es the full gamut of technologies for the growing market of battery-powered devices, including Wi-Fi, BLE and other low-power technologies,” said Ashish Gulati, Country Head, Telit India. “Access to the existing GainSpan talent at the Bengaluru facility brings Telit into a leadership position in technology development capabilities. The resulting combined R&D strength helps us to deliver even more comprehensive solutions to our target segments and customers.” The recent acquisition of GainSpan strengthens the company's ‘sensor-tocloud’ solution proposition and positions Telit to better exploit new short range opportunities leveraging existing products including cellular, BT/ BLE, GNSS modules; IoT connectivity and platform services. The integration of the unique variety of low-power Wi-Fi technology from GainSpan, with low standby current and fast wake-up time into the Telit portfolio enables customers to extend the battery life of their devices for years. Additionally, customer


CMYK

National Roundup

devices can be designed with a simple and inexpensive MCU or without one at all, enabling increased sales to existing customers and the capture of customers in new segments. Telit is a global leader in Internet of Things (IoT) enablement. The company

offers the industry’s broadest portfolio of integrated products and services for end-to-end IoT deployments – including cellular communication modules in all technologies, GNSS, Wi-Fi, short-tolong range wireless modules, IoT connectivity plans and IoT platform servic-

es. Through the IoT Portal, Telit makes IoT onboarding easy, reduces risk, time to market, complexity and costs for asset tracking, remote monitoring and control, telematics, industrial automation and others, across many industries and vertical markets worldwide.

QR Code Based Access Control E

verything we do today is done through a single ‘tap’ on our mobile devices. With a single ‘tap’ we can share things on social media, check our health status, communicate with others, so on and so forth. A similar trend can be seen with access control, which first started with the RFID cards. Then it was biometrics and now we see the dawn of mobile credentials for access control. Matrix’s ‘Your Mobile is Your Identity’ technology offers QR code based Identification for opening doors by simply scanning the QR code from an authorized mobile phone through COSEC APTA App. It is a simple process of authentication that offers convenience to users while increasing the overall security of an organization at the same time.

Benefits

● Access in less than one second. ● Easy to use in challenging installations. ● Mobile works as a credential. ● Secured communication between server and mobile. ● Reduce hardware cost and maintenance.

Solutions Create and paste QR code for entry and exit

T

o eliminate costs involved in expensive devices, wiring, installation and AMC, Matrix ‘Your Mobile is Your Identity’ technology offers QR code based identification for users. Using multiple QR codes speeds up entry/ exit, avoiding congestion and queues. It works where biometric or card readers are not easy to deploy e.g., glass doors.

Scan QR code and get access

M

atrix offers QR code based identification, which ensures quick

SecurityLink India ■ 1 May 2017

CMYK

identification. It marks users’ attendance and opens doors when a user scans the QR code by the mobile phone camera in the COSEC mobile application.

Reliable and secured communication

M

atrix provides organizations with the flexibility of creating their own QR codes by embedding two-byte key. Centralized server creates a QR code and distributes to the respective users through encrypted communication. Mobile users do not have any access or control over the QR code that is generated. This provides encrypted and secured communication between the device and server. 27


CMYK

National Roundup

‘Hi-Five’ for Hikvision at

Secutech India 2017 H

ikvision received five prestigious awards at the ‘Shield Awards 2017.’ At a glittering awards function organized by SECONA, an independent Security Consultants Association at Secutech India 2017 on the evening of April 7, 2017, Hikvision swept the awardees list by lifting coveted trophies in five different categories in recognition of its excellence in the security and safety industry. They are for Hikvision’s security products, solutions and Hikvision’s nominated contestant such as ‘Innovative Product of the Year,’ ‘Safe Religious

Place,’ ‘and Security Project of the Year,’ ‘Control Room of the Year’ and ‘The Best CSO of The Year.’ The awards were adjudged by a distinguished panel of experts. Hikvision emerged winner amid tough competition.

1. Innovative Product of the Year (Video Access Control Terminal)

H

ikvision’s video access control is an all-in-one-device which can be used as a time & attendance terminal, IP camera (online monitoring & video will be stored in NVR), video door phone (video & audio calling to indoor display unit) and door bell integration systems. Nilmani Kumar, Product Head – Access Control Systems, Prama Hikvision (India) Pvt. Ltd., Mumbai was mainly instrumental in the successful completion of the project.

“We are happy to have won these prestigious awards. They only show our dedication and the wholehearted commitment toward building a more safe and secure India. They will stand testimony to our quality and effective security products and solutions. We are inspired and encouraged by our success which will help us come out with more innovative and industry unique products in the coming years.” – Ashish P Dhakan Managing Director & CEO, Prama Hikvision (India) Pvt. Ltd. 28

SecurityLink India ■ 1 May 2017

CMYK

● Wins five prestigious Shield Awards for security. ● Reiterates commitment to a safer world. ● Security stalwarts & industry hail achievements.

2. Safe religious place (ISKCON Temple – Juhu, Mumbai)

T

his award was given for providing a comprehensive and effective security cover to the famous ISKCON temple in Juhu, Mumbai. Kirti Solanki, Head – Technical Software from Prama Hikvision (India) Pvt. Ltd., Mumbai successfully executed the entire project.

3. Security Project of the Year (CCTV System For Warehouses – Delhivery Pvt. Ltd.)

T

he award was presented for CCTV & system control for Delhivery Warehouse, Fulfillment Centre & Logistics Network spread across 175 cities in India. Hikvision designed best solutions that led to optimization of cost, right type of cameras, analytics, DVR and NVR along with central monitoring service provision. The project was efficiently managed by K K Dakhara, Vertical Head – Retail, Prama Hikvision (India) Pvt. Ltd., Mumbai.

4. Control Room of the Year (Secures Systems Pvt. Ltd.,


CMYK

National Roundup

Mahape, Navi Mumbai)

T

he Central Alarm Monitoring Station or the Control Room at Securens is built on a state-of-the-art infrastructure and certified by The Monitoring Association (TMA). It is equipped with workstations with high resolution displays and has a 100 seat capacity. Sonali Kadam, Head – Key Accounts, Prama Hikvision (India) Pvt. Ltd., Mumbai deftly managed the project.

5. Best CSO of the Year (Bank of India)

R

akesh Patney, Bank of India’s Chief Security Officer was chosen as the ‘Best CSO of the Year’ for his consci-

entious and dedicated service. He was prudently nominated by Gagan Lamba, Vertical Head – BFSI, Prama Hikvision (India) Pvt. Ltd., Mumbai. Hikvision is the world’s largest supplier of video surveillance products and solutions. The company specializes in video surveillance technology, as well as designing and manufacturing a full-

line of innovative CCTV cameras and video surveillance products. The product line ranges from cameras and DVRs to video management software. With the largest R&D team in the industry and state-of-the-art manufacturing facilities, Hikvision offers customers the benefit of world-class products that are designed with cutting-edge technology.

WD Corporation at Secutech India 2017 W

estern Digital Corporation participated Secutech India 2017 as a Gold partner to witness 690+ brands and more than 28,000 visitors which included attendees from different sectors and across the globe. This year the focus of the event was on areas such as Integrated Building Management Systems (IBMS), Smart Cities, Smart Homes, Internet of things, Secutech India Connect & safety pavilions. Western Digital Corporation has seen growth in the security sector in India and that has been one of the key reasons behind the organization’s decision to consider India as a standalone core region. The implementation of the Smart Cities project by the Government of India, the demand for better quality video surveillance systems and the need to

adapt with the emerging technologies acted as one of the main triggers for WDC to participate in this event this year. Western Digital is an industry-leading developer and manufacturer of storage solutions that enable people to create, manage, experience and preserve digital content. It is a longtime innovator in the storage industry. The marketing network of the company is spread throughout India and several overseas countries with its headquarters in USA. At the Western Digital booth durSecurityLink India ■ 1 May 2017

CMYK

ing the three day event the visitors had an opportunity to explore and experience various WDC products, includ29


CMYK

National Roundup

ing the recently launched WD Purple 10TB HDD which is the latest addition of the brand in their hard drive line of products for surveillance applications. During this exhibition Western Digital Corporation also shared the ‘Role

of Surveillance in Securing Cities’ report which was worked in collaboration with the Smart Cities Council of India. This report is a detailed analysis of the role of surveillance in securing cities, the need for Smart City projects

to be implemented, opportunities that organizations, individuals and authorities would gain through these projects and challenges the Smart Cities project would have to go through in order to be implemented successfully.

COM-SUR Adjudged as Innovative Product of the Year in Security (Software) C

OM-SUR was honored with the ‘Innovative Product of the Year in Security (Software)’ Award at the prestigious Secona Shield Awards 2017, powered by Secutech India. Gautam Goradia, CEO & MD said, “We are extremely glad that COM-SUR is getting the recognition it deserves. COM-SUR can change video surveillance across the globe. It will be a proud

30

moment for us if we can succeed in doing this. From helping the Home/ Defence Ministry to the Finance Ministry/ the Election Commission (and all other Ministries). COM-SUR has a role to play in every area, which is covered by CCTV/ video surveillance. “This one tool can ensure that the millions of ‘eyes’ across the globe that are currently in ‘sleep mode,’ will ‘wake

SecurityLink India ■ 1 May 2017

CMYK

up’ and deliver rich visual information (which is being wasted right now, since nobody ‘sees’ what the cameras ‘saw’) that can be used by Governments to gain actionable intelligence. And it’s not just about crime. This same tool can be used in monitoring the Ganga cleaning project to agriculture, to climate control and so on. With drones and UAVs proliferating, all we are doing is gathering more information; but are we gaining full benefits?” “We would like to thank all our supporters for believing in the power of Auditing, Smart Backup and Standardised Reporting. The SECONA Shield Awards is one of the most celebrated awards in the security industry. Winning this is an honour. However, this is only the beginning. We will continue to work harder in order to help make not just our country, but also the world, a safer place,” says Rohini Goradia, VP – Marketing & Sales.


CMYK

National Roundup

Securens wins ‘Control Room of the Year’ at Shield Awards T

he country’s leading e-surveillance company, Securens Systems was adjudged the ‘Control Room of the Year’ for its state-of-the-art Central Alarm Monitoring Station that monitors leading banks, top retail stores, popular QSRs, and logistic firms across India. Pitted against some of the country’s biggest names such as Axis Bank, ICICI Bank and L&T, Securens emerged as a winner. Shield Awards was organized on the sidelines of Secutech India 2017. Securens has the largest network of surveillance systems spread across the country. Popularly known as the Central Alarm Monitoring Station (CMS), the technologically advanced control room is built on highly redundant and fail-safe architecture known for preventing crime before it happens. The CMS monitors more than 21,000 sites 24/7 across India and houses over 100 monitoring personnel. Securens uses 5th generation technology that not only detects burglary as it is happening but will also attempt to deter it immediately using the powerful video verification and 2-way communication. Sunil Udupa, Chairman and Managing Director of Securens Systems said, “E-Surveillance plays a significant role in incident prevention and detection. Many enterprises are adopting video surveillance not only to deter crime but also to improve business operations. Our CMS consists of Hi-Technology combined with refined process for detection and deterrence based on our considerable experience. The award is a matter of pride as our CMS has no parallel in the country.” Secutech India is one of the country’s professionally organized global se-

curity shows catering to leading security and safety companies around the world. Securens Systems Pvt. Ltd. is a new age Internet of Things (IoT) company with a vision of being the largest provider of Electronic Surveillance (E-Surveillance) services in India. Securens offers Distinctive Monitored Intrusion Alarm solutions to meet the need of high value asset protection of its clients. Securens solutions are focused on proactive ways of preventing a crime. ‘Active Deterrence’ is the motto of Securens. Securens Unique Active Monitoring Services reduce crime and property damage by integrating the latest

alarm technology with on-site Surveillance systems, thus enabling the use of powerful Video Verification and 2-Way Voice to Actively Deter a crime incident. Securens provides E-Surveillance solutions to leading Indian PSU banks, private and multinational banks, ATMs, cash vans, retail outlets, warehouses, school premises & buses, commissaries, co-operative societies, logistic vans, currency chest, quick service restaurant, factories, gems & jewellery and health & beauty businesses. With a state-ofthe-art central monitoring centre at Navi Mumbai, Securens maintains vigilance of 21,000+ sites in India.

Matrix Communication Platform helps Leading Bank In increasing cash flow, enhancing payment collection and customer satisfaction

M

atrix Comsec is the worldwide leader of Telecom and Security solutions, delivering cutting-edge, industry specific solutions. Matrix recently provided a communication solution to one of the reputed banks of KSA seeking a communication system that can help them in extending their reach to the end customer. Reaching end customers for promotional activities and debt collection with an unrecognizable caller number and reduced

SecurityLink India ■ 1 May 2017

CMYK

communication cost was the foremost requirement of the customer. The case details are as follows: “Matrix Banking solution helped many banking giants in connecting multiple locations and reducing communication cost across the globe. Matrix, with its State-of-the-art solutions, has caught attention of many people worldwide and is continually growing day by day,” added Sagar Gosalia, Sr. VP, Sales & Marketing.

31


CMYK

report

India Risk Review 2017 Overall Business Climate in India in 2017

“The past year has been significant from the geo-strategic as well as business perspective. The unraveling of the SAARC due to Pakistan’s continued dalliance with terrorism and the downtrend in Sino-Indian relations due to China’s stance on the NSG has changed the power dynamics of South Asia. This trend is likely to continue in 2017; with India taking firmer steps in its look East policy and closer integration with ASEAN and Pacific Rim countries. GST bill and ‘Make in India’ policies will give an impetus to the economy. With the government keen to make a success of the demonetization experiment, it will make efforts to stimulate growth and further improve the ‘ease of doing business’ strategy. Many resurgent states will go all out to woo FDI and enable business partnerships, by streamlining and improving policy guidelines. With elections in many states, it will be a defining year of steady growth but a slightly fragile security landscape.” – Lt Gen Sudhir Sharma PVSM, AVSM, YSM, VSM (Retd.), Chairman, MitKat Advisory Services

I

ndia has emerged as one of the fastest growing major economies in the world. The country has stepped up its efforts to improve the overall business climate and has kicked off macro reforms in monetary policies and its regulatory structure. The government has also taken steps to improve the ease of doing business. According to the World Bank’s annual ease of doing business report published in 2016, India has implemented a set of reforms leading to considerable improvement in the business environment. Looking at key macro indicators of – getting electricity, paying taxes, trading across borders and enforcing contracts – the country 32

has made tangible reforms. India is placed in the top 50 global economies on three of the ten pointers – getting credit, protecting minority investors and getting electricity. However, due to overlap of jurisdictions, excessive regulations and bureaucratic impediments, India will continue to be a comparatively difficult country for rapid business growth in the foreseeable future. On the plus side, Indian states are on a reform and fast growth trajectory, creating favourable conditions for investments and a benign supportive regulatory framework. In fact some states will show consistent double digit growth, giving an overall impetus to the Indian SecurityLink India ■ 1 May 2017

CMYK

economy besides creating a healthy and competitive investment climate. The rise of states as catalyst for growth would be the highlight of the economic landscape of 2017. With a desire to make the recent re-monetization experiment a success, the government can be expected to take a series of bold steps to stimulate growth and consumer confidence. This could translate into a softer tax regime, besides easier access to capital and hitherto closed markets. The effect of de-globalization, the slowdown in world trade and creeping protectionism, coupled with ultra-nationalism, could affect the outsourcing and IT


CMYK

report

sector in the medium term. However since exports are not the key driver of the Indian economy, the effects would be limited in scope.

Top 5 risks for businesses in 2017 Public protests/ social unrest

D

ue to the diverse demographic landscape, dissent focused around caste and religion and multiple socio-economic differentiator is deeply embedded in Indian society. The Jat agitation in several parts of Haryana in February 2016 resulted in an estimated loss of around `20,000-30,000 crore to the state coffers. Several parts of Karnataka including the state capital Bengaluru witnessed disruptive demonstrations in August-September 2016 due to release of water from the Cauvery River to neighbouring Tamil Nadu state. The unrest entailed blockades of key highways and roads, suspension of state railway and Bengaluru metro services and widespread vandalism. Hard line regional groups could potentially trigger unrest, since the resolution to some of these disputes remains largely unresolved. Furthermore the political landscape has become polarized and more strident in the past year. The coming state elections and the opposition of many parties to re-monetization is likely to exacerbate matters, and create fissures in the social polity of the nation, affecting business growth. Economic growth unless linked to job growth is not going to appease the restless youth of the country. Finding productive employment for the millions of young people entering the job market will be one of the greatest challenges of 2017 and beyond.

Cyber security

W

ith the emphasis on digital India, e-commerce and mobile payments, especially after demonetization, cyber security has gained further importance. With business operations becoming inter-linked through increasing digitization, challenges emanating from cyber security are bound to manifest in the coming years. Cyber security affects all organizations, ranging from start-ups to multinationals. Previously developed nations were the prime targets of cyberattacks. However, the trend has changed, and firms based in India have also been increasingly targeted and are at par with global companies in terms of being impacted by cyber-attacks. In one of the significant attacks in 2016, around 320 thousand debit cards of various Indian banks were compromised. In light of the recent cyber attacks, the government is in the process of setting up a national cyber security structure which will designate agencies to monitor the threats and strengthen India’s cyber ecosystem. However, going forward in 2017, India requires reformed cyber security laws that would make it easy to protect critical infrastructure, and empower agencies to manage incidents effectively. Thus cyber security would need far greater emphasis in 2017 and unless addressed would constitute a business risk.

Bribery and corruption

D

espite the central government efforts to bring transparency and limit government interference, bribery and corruption continue to pose a serious risk to the business climate. Corruption in India has raised transaction costs, as well as the cost of operations for businesses, mainly in the real estate, defence and infrastructure enterprises. ComSecurityLink India ■ 1 May 2017

CMYK

panies are likely to face red-tape, petty corruption and bribery when dealing with public services. Some of the other sectors, which will remain impacted by corruption, include metal and mining, power and utilities sector. Overall due to expected regulations on reduced usage of cash, there would be a marginal improvement in the overall corruption index.

Natural disasters

M

ajor metropolitan cities continue to remain under-prepared to handle severe flooding resulting from the annual monsoons, which usually run from June-September. Last year, many parts of Mumbai, Delhi and Gurgaon, Hyderabad, and Kolkata were submerged due to waterlogging, resulting in severe disruption to businesses. The city administrations need to reform and modernize their approach towards urban governance. The usual aspects of water administration, drainage and sewage systems, and public transport facilities need serious revamp, especially to qualify for the ‘Smart Cities’ tag. It is therefore imperative for the firms to strengthen their existing business continuity plans to overcome the challenges likely to present themselves during the monsoon season in 2017. Furthermore there would be a need to further strengthen processes related to fire and natural disasters.

Maoist/ naxal insurgency

A

lthough several successful security operations in 2016 have put the Maoist insurgents in a defensive mode, the naxals have conducted some counter-offensive attacks targeting security forces as well as civilians. There have been reports of growing Maoist presence in the southern states of Kerala, 33


CMYK

report

Karnataka and Tamil Nadu. In a major Maoist-led strike, the insurgents in December torched around 70 heavy vehicles including three construction-related equipment at an iron mine in Surjagad, in Maharashtra’s Gadchiroli district. The incident is considered to be one of the significant attacks against a business enterprise in Maoist affected areas. 2016 witnessed a decline in Maoistrelated violence as compared to the previous year, due to better deployment of security personnel in the affected regions, loss of cadres and leaders; combined with protracted development measures, and empowering of local communities to mitigate the threat of naxal violence. Nonetheless, it is likely that the Maoist threat will remain as one of the biggest security threat to businesses operating in the affected regions in 2017.

the fiscal deficit.

Top 5 enablers for businesses in 2017

Easier availability of capital

Demonetization

T

he demonetization of high-value Indian currency notes in November 2016 was planned as big ticket reform. The move has brought into the banking system a lot of undisclosed cash. The move has facilitated the increased usage of digital payments and is hoped to reduce the reliance on cash transactions. India plans to use the unique identification system as the backbone of cashless transaction in the future. The move though path-breaking, is controversial, having caused a serious dent to the low income rural and agricultural economy. The jury is still out on its overall impact but appears to have had a positive impact. Apart from giving a boost to digitization, the move has the potential for greater financial transparency, higher tax collections and consequent lowering of 34

Goods and Services Tax

G

oods and Services Tax (GST) is a planned system of indirect taxation aimed at making India one unified common market. Once rolled out, the industry and business in the country will benefit immensely from the progressive taxation regime. The principal benefit to the businesses across the sectors will be uniformity of tax rates and structures across the country, thus increasing and easing the ease of doing business. The industry in the country is ready to accept the new tax regime, as it will terminate some archaic tax laws; and is considered to be one of the game changers for the Indian economy. GST roll out in 2017 is expected to give up to 1 to 2% increase in GDP in a few years.

W

ith NPAs of banks being brought under some control, capital availability is likely to be a big catalyst for growth in 2017. Lending to the medium and small scale sector is poised for a huge growth at affordable terms. Easier housing loans would also give a boost to the infrastructure sector. Re-monetization would also make additional capital available for the agricultural and rural sector. With states rolling out the red carpet for investors, capital would be more readily available in 2017, but would be spread out across the industry and not be restricted to few favoured corporate entities as hitherto.

More benign compliance and tax regime

G

iven the current governments desire to generate a level playing field and give impetus to ‘Make in India,’ a more business friendly compliSecurityLink India ■ 1 May 2017

CMYK

ance and moderate tax regime can be forecast for 2017. India has just signed an avoidance of double taxation protocol with Singapore on similar lines that it had signed with Mauritius. This is a significant step and would pave the way for a just tax regime, triggering genuine investment and tie ups. A simpler and lower corporate tax and capital gains rules would be a big business enabler for 2017.

Mobile and Internet penetration

2

016 witnessed a proliferation of the usage of 4G smart phones in India. With tariff rates plummeting steeply, the usage of smartphone with versatile apps will grow exponentially. The enhanced smartphone based connectivity, and data reach will provide for huge opportunity for data stacks to be optimized and connect seamlessly with consumers. Internet penetration and multiple payment gateways would greatly help business to grow and attract consumers.

Growing middle class

H

uge growth in the middle class numbers would stimulate demand and consumer spending. With rise in incomes consequent to the 7th Pay Commission, coupled with government spending on infrastructure and Smart Cities; there would be multiple growth opportunities in the retail and manufacturing sectors. Renewable energy, agriculture, rural growth would also create and be a catalyst for demand and business confidence. With numerous airports and additional roads planned for tier two cities, railways and freight corridors coming up, cost-efficient movement of goods would push growth of capital goods besides having a trickle down effect of infrastructure spend.


CMYK

report

Sectors with potential for growth Infrastructure

T

he Indian government has announced a massive $376.53 billion investment in infrastructure over a period of three years, which entails $120.49 billion for developing 27 industrial clusters and an additional $75.30 billion for road, railway and port connectivity ventures. In 2016, India climbed 19 places in World Bank’s Logistics Performance Index (LPI), to an impressive 35th position amongst 160 countries. The government is further planning to enhance regional connectivity by setting up 50 new airports in the next three years; at least 10 would be operational in 2017. There remains a huge gap between potential and current demand in this sector, and the prospects and possibilities of growth of infrastructure market are huge.

Power sector

Defense sector

onsistent and abundant power is one of the most critical components for decisive economic growth. India’s power sector is believed to be one of the most diversified ones – sources vary from coal, natural gas, oil, nuclear power to non-conventional sources such as wind, solar, agricultural and domestic waste. The sector is witnessing a transformation and has redefined the industry outlook. From the investment scenario, the industry has attracted $10.48 billion in Foreign Direct Investment (FDI) from 20002016. Furthermore, the government has identified power sector as a medium to promote sustained industrial growth. This sector is poised for further growth in 2017, as it carries the potential to attract over $220 billion in next 4-5 years.

he Indian defence sector is likely to carry forward the growth momentum in 2017, that it witnessed in the previous years. India in 2016 became the fourth largest spender in defence. The government’s special drive to defence manufacturing, in sync with the ‘Make in India’ campaign, has attracted the attention of major global defence firms. The government has liberalized the sector by increasing the FDI cap in defence to 49%. The defence market is estimated to become $620 billion by 2022. Furthermore, around $130 billion worth of contracts are projected to be awarded locally. Major industrial organizations such as the Tatas, the Mahindras, the Hero group, Anil Ambani’s ADAG, Mukesh Ambani’s Reliance Industries, Bharat Forge and the Hinduja group have already invested capital in this sector.

C

T

S

ecurity needs collaboration at individual, organizational, industrial, national and global levels. Networking and knowledge sharing are the key drivers for mitigating challenges in today’s complex security environment. ASIS International works on bringing together security professionals to facilitate exchange of ideas and knowledge sharing so that individuals and organizations can manage risks better. Each of our 38,000 worldwide members is responsible for protecting vital assets – people, property, and/ or information – in various industries, both public and private. 2016 will go down in the history as the year of un-predictability; be it the Brexit in United Kingdom or change at the helm in the US government or closer to home, the demonetization move. The year also witnessed innovative terrorist attacks in non-traditional geographical areas. 2017 brings with it more uncertainties, with more radical political personalities taking up prominent positions in mainstream politics, the issue of migration dominating politics in Europe and America, and posing a dilemma not just for countries but companies too. Security, in general, and the issue of terrorism will continue to dominate headlines. More than the issue of foreign fighters, the world will battle the issue of homegrown radicalization. Even as the physical threat to organizations remains high, dangers in the cyber realm will add an additional dimension to security concerns in 2017. ASIS-Mumbai Chapter has come together in a unique collaboration with MitKat Advisory Services to provide a comprehensive round up of the various risks that businesses in India face today; in the form of the India Risk Review 2017. We hope that security professionals and organizations benefit from it. SecurityLink India ■ 1 May 2017

CMYK

35


CMYK

product showcase

The Need for Speed

The Highest Performance XProtect Using NVIDIA GPUs Milestone Systems and NVIDIA collaborate for hardware acceleration of XProtect software to boost performance and lower cost

M

cessing unit (GPU) together with a computer’s central processing unit (CPU) to accelerate deep learning, analytics, and engineering applications. The use of hardware acceleration decoding and video motion detection can drastically reduce the number of recording servers needed in large installations, lowering the total cost of ownership (TCO) of an XProtect solution. By eliminating traditional CPU bottlenecks, limitation and upgrades, Milestone can scale servers by adding more NVIDIA GPUs. This extends the life and performance of video surveillance recording management. Milestone XProtect ers, which lowers customer costs. The benefits of this technology are will leverage NVIDIA GPUs and the CUDA parallel computing platform and also relevant for smaller installations, as programming model to provide paral- smaller scale servers can be used to save lel processing capabilities of recording space, energy and cost. Hardware acservers, mobile servers and other video celeration also paves the way for widespread use of 4K cameras and processprocessing services. CUDA enables dramatic increases in ing-intensive video compressions like computing performance by harnessing H.265. This provides better situational the power of the GPU. GPU-accelerated awareness and saves disk space for incomputing is the use of a graphics pro- stallations of all sizes. “As a leading AI computing company and technology leader in advanced visualization, NVIDIA was a clear choice to take See the Milestone Performance Demo with NVIDIA GPUs ilestone Systems is collaborating with NVIDIA to provide the next level of hardware acceleration and video processing services in monitor-

36

SecurityLink India ■ 1 May 2017

CMYK

our use of hardware acceleration to the next level,” says Bjørn Skou Eilertsen, CTO at Milestone Systems, “The benefits for the Milestone community are numerous. Lower total cost of ownership, drastically reduced need for server hardware, and simpler infrastructure for video surveillance systems are just some of them. We look forward to working with NVIDIA to bring this revolutionary technology to our customers.” “NVIDIA GPUs are quickly becoming the foundation of intelligent machines, including video surveillance,” said Deepu Talla, Vice President and General Manager of the Tegra business at NVIDIA, “Milestone’s work to integrate NVIDIA GPUs and AI capabilities into its next-generation platform will make it easy for its developer ecosystem and customers to take advantage of these revolutionary capabilities.”

BcdVideo BCD215 Series Server

D

uring ISC West in Las Vegas April 4-7, Milestone XProtect VMS was running on NVIDIA GPUs within a BCDVideo server to demonstrate how the security industry will be galvanized as part of the NVIDIA intelligent revolution. Milestone showcased show the industry’s first load balancing of multiGPUs, hardware-accelerated decoding and video motion detection, motion metadata generation and recording of


CMYK

product showcase

1,000 Full HD 1080p H.264/5 cameras on a single BCDVideo BCD215 Series server - purpose-built for this project with multiple NVIDIA GPUs.

“This combination of Milestone’s highly scalable VMS platform and NVIDIA’s powerful GPU processing platform is a must-see,” says Keven Ma-

rier, Director – Technology Business Development, Milestone Systems. *According to IHS Research market reports over the latest 10-year period.

Explosion-Protected Cameras

For Agile Incident Management and Business Efficiency

T

hree new explosionprotected temperature alarm and thermal network cameras allow plant operators to monitor remote, inaccessible, and sensitive areas, allowing for rapid incident response and protection of employees, machinery and critical industrial infrastructure. Based on industry standards and open protocols, and protected in heavy-duty enclosure, the new cameras seamlessly integrate with existing supervisory control and data acquisition (SCADA) architectures, complementing with thermal technology. The new explosion-protected temperature alarm and thermal cameras from Axis Communications, allow for rapid incident response and protection of employees, machinery and critical industrial infrastructure. The three new explosion-protected cameras for use in sensitive industrial areas are XF40-Q2901 and XF60-Q2901 explosion-protected temperature alarm cameras, and XP40-Q1942 explosionprotected PT thermal network camera. “Industrial plant operators have a tremendously difficult task,” explains Mar-

tina Lundh, Global Product Manager for thermal and explosion-protected cameras at Axis Communications, “They need to ensure efficiency and continuity in large-scale, critical industrial processes, while meeting all health, safety and environmental regulations, across multiple locations and, often, across huge areas. Our new cameras deliver critical realtime information, allowing for immediate incident response which can prove to be a life-saving benefit.” Typical industrial applications for the fixed XF40-Q2901/ XF60-Q2901 explosion-protected temperature alarm cameras include control and detection of temperatures of equipment and leaks in pipes, fire detection, and monitoring of equipment and perimeter protecSecurityLink India ■ 1 May 2017

CMYK

tion. Moreover, they help visually inspecting and verifying functions and processes are running correctly, and even providing remote assistance with planned maintenance. Typical applications for the pan/ tilt XP40Q1942 explosion-protected PT thermal network camera include detection of people in restricted areas and safety of personnel in hazardous areas. In addition, XP40-Q1942 supports electronic image stabilization and Zipstream technologies by Axis. The first greatly improves video quality in situations where a camera is subject to vibrations, providing smooth and comfortable live viewing. The second lowers the bandwidth and storage requirements and yet maintains an outstanding thermal imaging. Axis explosion-protected thermal cameras and temperature alarm cameras offer worldwide certifications, meaning that the cameras are compliant with specific country regulations across the globe. The new explosion-protected cameras will be available through Axis’ distribution channels in May 2017. 37


CMYK

product showcase

Turbo HD 4.0 Solution H

ikvision launches its new Turbo HD 4.0 range which has essential features and functionalities like ultralow light performance and the ability to send power as well as 8MP video images over the conventional coaxial cable. The latest-generation Turbo HD 4.0 products also take advantage of Hikvision’s revolutionary new H.265+ video compression technology, which provides significant savings on both bandwidth usage and storage requirements.

Hikvision introduced its first Turbo HD Solution back in 2014 which revolutionized analog security. After years of fine-tuning and perfecting this powerful solution, Hikvision has now launched Turbo HD 4.0, a brand new revolution in high-definition and highperformance surveillance video.

8MP performance, Power-over-Coax convenience

T 38

he first Turbo HD 4.0 products to hit the market include 8 meg-

● Powered by Hikvision’s H.265+ video compression technology. ● Delivers ultra-high definition 8MP video over coaxial cable. ● Supports IP, Analog, Turbo HD and 3rd party AHD cameras. ● Provides significant storage cost savings for users. apixel box and varifocal bullet cameras, and DVRs with 4K UHD HDMI outputs. The 8MP cameras offer the highest resolution ever available in an analog surveillance system. Mod-

els equipped with Hikvision-patented Power over Coax 2.0 (PoC) capabilities also allow users to transmit both UHD video and power over the same coaxial cable, for faster, simpler and less expensive installations using the existing infrastructure. As with previous Hikvision Turbo ranges, Turbo HD 4.0 products support IP, analog, Turbo HD, and third-party AHD cameras, providing a highly flexible upgrade path. The result is unrivalled performance for the end-user that comes with cost-effective installation. SecurityLink India ■ 1 May 2017

CMYK

H.265+ saves bandwidth and storage space

T

he Turbo HD 4.0 range not only supports the latest generation H.265 video compression standard, but also offers Hikvision’s revolutionary H.265+ video technology. H265+ dramatically improves encoding efficiency: reducing bandwidth requirements by up to 75% compared to H.264, and taking up half as much storage space for the same amount of video footage. Bitrates are reduced but transmission quality remains high. H.265+ is a major step forward in video compression, and means significant storage cost savings for users.

Ultra-low light capabilities

T

he new Turbo HD 4.0 range brings Hikvision’s renowned ultra-low light recording capabilities to cameras using coaxial cable for the first time. With Hikvision’s unique low-light technology, these cameras provide sharp, seamless, clear and full-color video images with as little light as 0.003lux.


CMYK

product showcase

New Indoor Positioning Services For Workforce Optimization

New HID location services enable better building management and increase operational efficiency

H

ID Global’s new location services provide organizations with visibility into the location of their workforce in a facility, making it possible to analyze room usage for better building management and increased operational efficiency. The offering is tailor-made for enterprises, universities, manufacturing facilities or any organization seeking to optimize their workforce and streamline facility management using proximity and real-time location services. “HID Location Services extends HID’s leadership in physical access control with a cutting-edge Internet of Things offering for workforce optimization solutions that can be easily integrated into existing systems,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control Solutions with HID Global, “These new capabilities leverage the power of trusted identities to provide a new level of visibility for customers to better understand how buildings are used, help quickly find people in emergency situations, and deliver an extraordinary user experience.” HID Location Services is enabled by Bluvision, a company recently acquired by HID, and provides numerous capabilities based on an organization’s needs. Its real-time location services are ideal for monitoring and providing deeper analytics around the movement of personnel in a building for better insight to optimize usage of facilities, common areas and individual rooms. The proxim-

ity-based services verify when personnel are nearby a given area for use cases such as monitoring employee check in and check out; it also helps organizations meet health and safety regulations by monitoring room occupancy. The solution leverages Bluetooth Low Energy (BLE) and delivers unprecedented accuracy, even in large, open spaces and areas in which it has historically been challenging to implement RFID technologies. HID Location Services includes a cloud service, portals and Bluetooth beacons in the form of HID smart cards, providing a one-card solution for both indoor positioning services

and physical access control. Its cloudbased model and minimal hardware requirements also eliminate the expensive infrastructure setup of antennas, servers and wired infrastructure to further reduce total cost of ownership. The installation simply entails plugging in AC-powered BLE/ WiFi gateways and providing personnel with the smart card beacon. Future use cases of HID Location Services can extend beyond workforce and building optimization to include building automation capabilities, rich security features, and capabilities that facilitate life safety management and compliance.

Drivers Pack 3.45 Released

A

xxonSoft released a new version of standard software package for integration of IP devices into the Axxon Intellect Enterprise PSIM and the Axxon Next VMS. Support for 95 IP devices has been added in version 3.45: Axxon, AxyCam, Beward, Bosch, Dahua, Dynacolor, Etrovision, Hanwa Techwin, Hikvision, LTV, Patronus Laboratories, RVi, ST, STORM, Sunell and Tiandy. Advanced features of 94 devices are supported: Axis, Beward, Bosch, eVidence, Hanwha Techwin, Hikvision, IDIS, Mobotix, RVi, Sony, ST, Sunell and VIVOTEK. The following drivers have been improved: Onvif and Onvif 2.x. Intellect can now handle multicast streams from devices connected via ONVIF. FFmpegDecoder has been updated, Dahua embedded detection tools are better supported. Drivers Pack 3.45 is best used with the version 4.10.2 of Intellect PSIM and the Axxon Next VMS version 4.0.1.

SecurityLink India ■ 1 May 2017

CMYK

39


CMYK

product showcase

New Limelight Cloud Security Services Offer Scalable Protection from Online Attacks New capabilities help customers reduce the risk of downtime and data theft

L

imelight Networks, Inc. has introduced Security Alert and WAF Express, two new additions to its Cloud Security Services that enhance protection against attacks on websites and unauthorized access or theft of content. Limelight Security Alert provides incremental and scalable protection for websites and web applications. Active DDoS attack detection and alerting make sure customers are aware of malicious activity against their websites and application domains. Customers’ content delivery services are configured to minimize the surface of attack exposed to the Internet and to ensure the defensive protection of Limelight’s network is deployed effectively. Limelight WAF Express includes

the Security Alert capabilities as well as simple-to-implement, efficient, effective, and affordable web application security for organizations that may not have implemented security measures due to cost. It offers protection from web application attacks using OWASP 10 Rules, rate limiting, and access control. “Protecting websites and applications from online attacks and cyber threats are two of the most pressing security challenges today, yet many companies don’t have security protection in place,” said Steve Miller-Jones, Senior Director of Product Management at Limelight Networks, “Security Alert and WAF Express extend our Cloud Security Services portfolio and provide affordable, incremental and scalable protection

measures for customers.” To experience the benefits of the new alert and detection features, Limelight is offering Security Alert free to customers for the life of their contracts. Limelight Networks, a global leader in digital content delivery, empowers customers to better engage online audiences by enabling them to securely manage and globally deliver digital content, on any device. The company’s award winning Limelight Orchestrate™ platform includes an integrated suite of content delivery technology and services that helps organizations secure digital content, deliver exceptional multi-screen experiences, improve brand awareness, drive revenue, and enhance customer relationships – all while reducing costs.

ControlSafe™ SIL4 COTS

Rail Computing Platform for Onboard Applications Fanless Carborne platform shares safety architecture and hardware-based voting mechanism

A

t the recent SafeRail Congress Artesyn Embedded Technologies unveiled the latest in its portfolio of SIL4 COTS computing systems for rail safety applications, the ControlSafe™ Carborne Platform. Designed for onboard applications such as automatic train protection (ATP), automatic train operation (ATO), and positive train control (PTC), the new 40

platform can also be used in wayside train control and rail signaling implementations. The ControlSafe™ Carborne Platform leverages the same safety architecture and technologies as Artesyn’s ControlSafe Platform and ControlSafe Expansion Box Platform, to provide a highly integrated and cost-effective solution for rail system integrators and rail SecurityLink India ■ 1 May 2017

CMYK

application providers. The first two platforms in the portfolio have been both certified to SIL4, while SIL4 certification of the ControlSafe Carborne Platform is anticipated to be complete in Q3 2017. Housed in a compact 4U chassis with front access I/O and a DC power supply, the ControlSafe™ Carborne Platform can accommodate up to 12 I/O modules


CMYK

product showcase

and a variety of I/O types. An innovative data lock step architecture, used in all Artesyn ControlSafe Platforms, allows customers to make seamless technology upgrades while a hardware-based voting mechanism allows for application software transparency. Designed to meet rail functional safety, reliability and availability requirements, the ControlSafe™ Carborne Platform is ideal for deployment in safety application environments and can save customers a significant amount of time, cost and risk associated with the system development and certifi-

cation process by using a COTS product. “We have a customer who has adopted the ControlSafe Platform and estimates that they have saved millions of dollars and many years of development time,” said Qianqian Shao, Marketing Manager for Artesyn Embedded Technologies, “A shared safety architecture makes it easy to transfer applications between systems and deploy as a common platform. This innovative data lock-step architecture and hardware-based voting mechanism supports high performance modern processors, and is modular, scalable and designed

to seamlessly accommodate additional I/O interfaces as well as new processor architectures that will be required throughout the product life cycle.” The ControlSafe Carborne Platform is designed as a common base platform to enable a variety of applications through the integration of Artesyn IOU modules. In addition, Artesyn offers customers the flexibility to develop IOU modules and specify I/O backplane connectivity to meet their specific needs by providing all necessary technical specifications, product support and service.

Ethiris Video Management Software, Version 8.2 Increasing numbers discover the advantages of using reliable and flexible software for video surveillance, developed by Kentima in Sweden

Support for H.265

W

ith our new support for H.265 we are among the first VMS on the market to be able to use this new video compression technique.

New optimizations

W

e have continued our mission to simplifying the work of the system integrators by new optimizations in the software. One of them is that several types of updates of the server configuration can be performed without affecting live viewing and recording of video.

Major updates of Ethiris viewer

O

ur end-customers will be thrilled since our new Ethiris Viewer doesn’t require an installation and furthermore,

can playback up to 9 exported video files synchronized and simultaneously.

New possibilities in Ethiris mobile

T

o maximize the flexibility for those who want to use Ethiris Mobile for connecting to their Ethiris systems, we now introduce the possibility to creating client configurations for Ethiris Mobile in advance, using Ethiris Admin. The user now has full control of how the cameras will be presented in the mobile. We also introduce support for so called I/O buttons in Ethiris Mobile, which means that it’s easy to activate various functions in the facility, such as opening a gate, direct a PTZ camera to a preset position or activate a SecurityLink India ■ 1 May 2017

CMYK

live view in an alarm central directly from your mobile phone.

Simplified external connection

F

rom version 8.2 of Ethiris VMS you can use the same client configuration both locally and externally. This is possible by entering both a local and an external IP address for a client that will connect to an Ethiris Server. 41


CMYK

product showcase

Motorola Solutions to Launch Suite of Public Safety Mobile Applications Company expands software that provides real-time intelligence to public safety users

M

otorola Solutions plans to introduce a suite of public safety mobile applications for communication and collaboration. The public safety mobile apps suite adds to the company’s growing portfolio of integrated software solutions. With the expansion of public safety broadband, interoperable mobile applications are a highly effective way to provide critical intelligence to officers in the field and personnel at the command center. Leveraging years of in-depth customer research, Motorola Solutions has developed a suite of public safety mobile applications that work across different networks and devices, enabling realtime communication and collaboration that can accelerate time to resolution. “The need for real-time intelligence has never been more important to public safety users,” said Bruce Brda, Executive Vice President, Products & Services, Motorola Solutions, “Apps for messaging, mapping and other tasks are part of daily life for citizens, but these capabilities have not yet been developed and deployed for public safety users. Motorola Solutions’ suite of public safety mobile apps is purpose-built for the needs of our customers and provides an integrated, interoperable solution for sharing critical information and intelligence.” The suite includes a core set of apps for public safety communication and collaboration, to which advanced 42

capabilities such as apps for live videostreaming, electronic citations, database search and collaborative ‘whiteboarding’ will be added. The communication and collaboration suite is an integrated set of mobile apps including: ● Messaging, which lets first responders securely share text messages and photos with individuals or talk groups across smartphones and twoway radios, enabling faster communication and collaboration. For example, Messaging enables a user to send a photo to a voice talk group. ● Mapping, which enables locationbased collaboration by showing nearby officers and quickly creating ‘geo-fenced’ voice- or text-based communication groups with officers in the vicinity. It allows an officer to talk to another officer one block away – even if he doesn’t know the officer’s name. ● WAVE, the company’s push-to-talk (PTT) solution that lets smartphone users securely communicate with a simple press of a button. In addition to enabling groups of smartphone users to easily communicate with one another, WAVE also provides a secure PTT bridge with the land mobile radios police use today, enabling teams to communicate using pushto-talk across networks and devices ● Telephony, which enables users to make secure, encrypted phone calls. The public safety mobile apps core SecurityLink India ■ 1 May 2017

CMYK

suite works across networks and devices, giving users access to real-time information whether they’re using a radio on a land mobile radio network or a smartphone on a broadband network. The apps themselves are also designed to work ‘better together’ and are connected by a capability that enables interactions between apps without requiring the user to return to the app launcher. Users can seamlessly move from app to app – for example, an officer can use Mapping to create a talk group of nearby officers, then quickly pivot to a voice conversation using WAVE. As with Motorola Solutions’ other broadband solutions, the public safety mobile apps suite is highly secure. It requires the authentication of users, devices and infrastructure, and all media is encrypted. The suite also features convenient single sign-on – requiring users to log in only once to access all applications – and a common address book that carries consistent groups and contact lists across apps. Motorola Solutions’ suite of public safety mobile applications, which will be available this year, will be deployed using a flexible, cost-efficient ‘softwareas-a-service’ model. The suite is the latest offering in the company’s growing portfolio of integrated software solutions, which are part of Motorola Solutions’ new software enterprise led by Andrew Sinclair. Sinclair joined the company in March from the Skype division of Microsoft.


CMYK

product showcase

SAFE PIAM Platform Continues Growth Q

uantum Secure, part of HID Global, continues to grow its roster of end users for its SAFE platform. 2016 growth was seen in the application of all SAFE core technologies and was additionally fueled by further expansion of the SAFE offerings including SAFE Tenant Manager, SAFE Sports and Events and SAFE Predictive Risk Analytics Updates. By industry, exceptional growth was seen in government, aviation, finance, utilities and high-tech markets. The company’s platform now manages 7.5 million identities worldwide, maintaining Quantum Secure’s position as the world’s largest Physical Identity and Access Management (PIAM) software vendor. “The ongoing strong results we see reflect our commitment to continued improvements and enhancements to the SAFE software suite and keep us in the forefront of managed physical security solutions,” said Ajay Jain, President and CEO, Quantum Secure, “More than ever, across a wide range of vertical market applications, SAFE is the solution of choice to automate processes that offer real-time insight for identifying potential risks and create a safer and more secure environment.” Key enhancements to SAFE that have helped maintain growth momentum include:

SAFE Tenant Manager

S

AFE Tenant Manager provides a self-service interface for organizations that have multiple third-party vendors, contractors or tenants sharing a facility or multiple buildings. This allows

administrators to submit new company and contractor information for more independent management of facility and access related requests. Tenants can request physical access and new badges, invite visitors as well as book freight elevators in a faster, more efficient way using the advanced user experience delivered by SAFE. This decentralization allows for smoother tenant management operations and allows the parent organization to maintain control centrally with the appropriate visibility and approvals in place.

SAFE Sports and Events

Q

uantum Secure’s SAFE Sports and Events Access Manager enables secure and rapid entry to stadiums or other venues providing a high-quality, highsecurity customer experience for temporary or limited-engagement events. This mobile-app solution removes the need to rely on clipboards and lists to manage contractors, vendors, volunteers and thousands of other non-ticket holders who need temporary access to venues. The solution also integrates with IT systems and multiple handheld devices for swift, accurate real-time validation and immediate on-boarding and provisioning for a variety of identity types based on each identity’s appropriate access permissions. Additionally, the solution records identity access logs to track key operational and security metrics and streamline compliance processes.

● SAFE Risk Analytics aggregates SecurityLink India ■ 1 May 2017

CMYK

and correlates data from multiple external systems to generate cross application reports and provides interactive, point-and-click views of key physical security and other integrated security risks. Additional 2016 Quantum Secure SAFE highlights include the following: ● Certified for use by Lenel for OnGuard and with AMAG Technology’s Symmetry. ● New customers in a number of industries such as airports, high-tech, finance, automotive, sports and events, as well as government, and oil and gas customers. Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software. Featuring an intuitive interface and advanced reporting capabilities, SAFE 5.0 delivers critical information in a single view, providing organizations with actionable intelligence to make better decisions regarding security and operations. SAFE 5.0’s powerful dashboards can be viewed from virtually any device, streamlining and simplifying initiation and auditing of access-related requests. 43


CMYK

product showcase

Pivot3 Continues Tradition of Innovation in Video Surveillance Applies IT concepts to enhance security solutions

P

ivot3 recently announced enhancements to its surveillance series that provide customers with additional flexibility in how to apply hyper-converged infrastructure (HCI) in security and video surveillance applications. The investments in the company’s core technology platforms allow customers to take HCI beyond traditional use cases, such as video storage, and expand capabilities through the layering of other security, IT and business systems. The demand for video surveillance is increasing as risks evolve and organizations elevate the value of video data, leveraging it for uses beyond traditional security and safety applications. As a leader in video surveillance storage solutions, Pivot3 continues to apply the latest innovations in IT and data center technology specifically for video surveillance applications, allowing users to better capture, store and protect data. Investment in significant upgrades to the Pivot3 hyper-converged platform ensures enhanced performance, scale and resiliency amid a growing demand for flexibility to combine mixed workloads onto a single platform. “Pivot3 HCI solutions are a core component of our video surveillance strategy because they protect our video investment, ensure system uptime, and reduce risk by eliminating system downtime and data loss,” said Philip Lisk, Chief Information Officer, Bergen County Sheriff’s Office, “Pivot3 has ex44

ceeded our expectations with its innovation and support, along with its unique architecture that has simplified management and scalability.” Over the past year, significant enhancements have added to the Pivot3 surveillance series including: ● Multi-application capability that consolidates video recorders and other application workloads such as access control, visitor management and video analytics on the Pivot3 platform. The ability to run multiple workloads on the same hyperconverged system allows for reduced complexity, increased flexibility and simplified management. ● The addition of Broadwell CPU platforms to support increasingly performance-intensive applications, as well as multi-petabyte storage solutions. ● Performance is the single most important aspect of delivering highquality video. The newest version of Pivot3 software is optimized to improve performance and ingest rate by as much as 50 percent. ● The Pivot3 Virtual Security Server, a unique solution for mobilizing fully functional client workstations in a secure, bandwidth-efficient manner, now incorporates NVIDIA M60 and M10 GPUs for stronger video decode performance and higher camera density. The platform has been further enhanced with the addition of VMWare Horizon View 7, which provides users secure access to virSecurityLink India ■ 1 May 2017

CMYK

tual desktops and applications in a single digital workspace. ● Broader platform offerings with the qualification of the Lenovo System x3650 2U rack server. ● Edge Office, a HCI solution optimized for small-to-medium sized businesses (SMB) and remote and branch offices (ROBO), helps companies consolidate security along with other applications by delivering compute, storage and networking into a simple and affordable HCI solution. “We have been a leader in the surveillance market for nearly a decade and we continue to invest in innovative technology and focus on our commitment to solve our customers’ most complex business problems,” said Brandon Reich, General Manager, Surveillance, Pivot3, “The expertise and recognition we have built in IT helps us deliver hyper-converged platforms that bring a wide range of benefits to surveillance workloads. Customers are beginning to experience the simplicity and cost efficiency of this approach, and we are well positioned to help them further evolve their security infrastructures.” Pivot3’s investments in its surveillance solutions follows a strong year in which the company experienced an 84-percent increase in total revenue over 2015 – including a more than 200-percent increase in Q4 2016 from Q4 2015 – and significant deals secured across federal, healthcare and education customers.


CMYK

product showcase

New StorNext 6

Delivers Unparalleled Combination of High Performance and Advanced Data Management Extends expertise in large data-intensive workloads to broader range of enterprises, building on integrated, scale-out tiered storage foundation

Q

uantum Corp. has recently announced StorNext 6, a major new release of its award-winning StorNext® file system. StorNext 6 adds new advanced data management features to the industry-leading streaming performance of the company’s scale-out tiered storage solutions portfolio, which includes flash, disk, tape and public and private cloud storage offerings. With this unique combination of performance and management, Quantum continues to extend the power of StorNext in not only media and entertainment but also other highly data-intensive environments such as genomics, academic research, video surveillance, oil and gas, and government security. StorNext 6 addresses the needs of enterprises grappling with using their existing NAS solutions to store large, rapidly growing data sets and drive business value from that data. These enterprises are quickly realizing that traditional NAS is too difficult to upgrade, cannot deliver sufficient performance and is unable to handle parallel workloads. StorNext 6 not only overcomes these limitations but also provides more efficient and cost-effective ways to share and access files across geographically distributed teams, to manage and protect archived data, and to audit changes to data throughout its lifecycle. Quantum delivers all these benefits in an integrated, multi-tier storage solution that maintains optimized performance levels, visibility and access at every tier.

Multi-Site file replication and sharing for easier collaboration

File copy expiration for increased ROI and file auditing for deeper insights

n today’s world, the ability of geographically dispersed teams to work together using a common data set for creative, analytical or other purposes can be a key competitive differentiator. StorNext 6 facilitates greater collaboration with the introduction of FlexSync™ and FlexSpace™:

s the foundation for a single, integrated solution that can span a single name space across flash, spinning disk, object storage, tape and the cloud, StorNext has long reduced overall storage costs through tiering. StorNext 6 adds a new copy expiration feature, enabling automated removal of file copies from more expensive storage tiers, thereby freeing up space and increasing the overall return on investment. In addition, when one of several copies of a file is removed from storage, a complementary selectable retrieve function in StorNext 6 allows users to dictate the order of retrieval of the remaining copies. This functionality ensures that the file is retrieved from the most appropriate storage tier based on business or organisational needs. StorNext 6 also can now efficiently track changes in files across the data life cycle and provide reports on who changed a file, when the changes were made, what was changed and whether and to where a file was moved. In addition to providing administrators with greater file management granularity and insight into usage patterns, this new auditing feature helps support compliance requirements. StorNext6 will begin shipping with all newly purchased Xcellis™ and StorNext M-Series offerings, as well as Artico™ archive appliances, in early summer. It will be available at no additional cost for StorNext 5 users under current support contracts.

I

Enhanced StorNext-Client functionality for greater agility

W

ith StorNext 6, Quantum delivers a new quality of service (QoS) feature that empowers users to further tune and optimize performance across all client workstations, and on a machine-by-machine basis. Using QoS to specify the appropriate bandwidth allocation to individual workstations, an administrator can ensure that storage resources are optimized based on business priorities – e.g., providing more bandwidth to demanding applications on urgent projects – and adjust quickly as priorities change. StorNext 6 also enables client platforms to browse archive directories that contain offline files ­– which can number in the hundreds of thousands, or even millions – without having to retrieve the entire directory. As a result, this feature significantly streamlines the archive retrieval process, enabling users to get the files they need more quickly.

SecurityLink India ■ 1 May 2017

CMYK

A

45


CMYK

product showcase

Raytec Expands Range of Network Illuminators R

aytec have launched two new product lines as they continue to invest in network lighting. VARIO 2 IP and VARIO 2 PoE will provide purpose built lighting solutions for network applications and sit alongside the existing range of VARIO 2 illuminators. Both new product lines feature the latest Platinum Elite LED technology from Ray-

tec, delivering up to 200% more power, distances up to 500m from a single LED panel and more light output for your money. VARIO 2 IP is a range of fully IP addressable network illuminators that delivers the highest levels of performance and integration into any surveillance system. It can be operated remotely via a user friendly GUI or be fully integrated with 3rd party platforms or network devices to deliver an automatic lighting response to different events or alarms. VARIO 2 IP is an evolution of the award winning VARIO IP range and now offers improved

distances, additional security and more options for integrating with other network devices. VARIO2 PoE is a new range of illuminators designed to offer a simple and low cost lighting solution. The PoE illuminators can be easily powered from an existing network infrastructure, without the need for an additional PSU, minimising the cost and time of installation. VARIO 2 PoE offers all the performance advantages of other products in the VARIO 2 family. “We are proud to offer the most comprehensive range of network lighting solutions in the market,” comments David Lambert, Raytec’s Managing Director (joint), “Lighting is only going to become more intelligent and further integrated into security systems over time and we are excited to be at the forefront in network illumination.”

New 9000 Series Video Recorders Meet demand for high-performance, cost-effective all-IP video solution

M

arch Networks® introduces its new 9000 Series IP recorders. Designed to deliver the same unparalleled reliability, manageability and serviceability organizations have come to expect from March Networks, these high-performance recorders are ideal for mid-sized commercial organizations with all-IP video environments, as well 46

as banks, retailers and other multi-site enterprises transitioning from analog or hybrid video networking. Available in 32, 48 and 64-channel models, the 9000 Series recorders support high-megapixel, high-throughput video capture. In addition, all channel licenses are included, so customers benefit from a fully-featured recording SecurityLink India ■ 1 May 2017

CMYK

system right out of the box with a lower overall cost of ownership. To ensure the highest reliability, the 9000 Series IP recorders incorporate a customized embedded Linux OS, which eliminates unnecessary background services and frequent system updates. Other reliability features include diagnostic LEDs for each hard-drive, internal battery


CMYK

product showcase

backup, and real-time system health monitoring via March Networks Command™ video management software. The recorders are also simple to maintain, thanks to front-access hard drives and unique QR codes that work with March Networks’ free GURU Smartphone App to enable instant configuration audits, troubleshooting, warranty checks and other capabilities using a smartphone or tablet. The 9000 Series recorders integrate seamlessly with March Networks 8000 Series Hybrid NVRs, and the company’s Command Recording Server solution – all of which can be managed together as a single solution using powerful March

Networks Command Enterprise. This gives customers unlimited flexibility to deploy the right video solution for each site while benefitting from enterprise-class centralized video management. “This new family of 9000 Series recorders offers organizations a highperformance video appliance that’s IT-friendly, very easy to manage and cost-competitive,” said Dan Cremins, Global Product Management Leader,

March Networks, “It gives our customers additional choice when deploying an end-to-end video solution, and continues our commitment to delivering the most reliable and serviceable recording systems in the industry.”

Software Solutions with New Dashboard for AlarmNet 360

AlarmNet 360™ Insights business management platform is an interactive dashboard that helps security dealers and central stations better understand, protect and grow their business

H

oneywell recently released AlarmNet 360 Insights, an interactive analytics dashboard in the AlarmNet 360™ cloud-based business management platform that makes it easier for security dealers and central stations to explore customer data, uncover opportunities and expose problem areas. “For more than 30 years, AlarmNet has provided monitored security to approximately 1.8 million protected premises, processing more than 7 million signals per day,” said Alice DeBiasio, Vice President and General Manager, Fire and Security Software, Honeywell Home and Building Technologies, “The AlarmNet 360 Insights dashboard de-

livers enhanced business analytics, and is fully interactive to help central station executives and security dealer executives, sales managers and operations teams make smart business decisions.” The data within AlarmNet 360 Insights is updated on a daily basis to ensure that the data is current, giving dealers more opportunities to be proactive with their accounts. A wide range of filters is available for dealers and central stations to view their account base by communication types, communicator models, AlarmNet services, and Honeywell Total Connect™ Remote Services. ● Better understand current cusSecurityLink India ■ 1 May 2017

CMYK

tomer base: The Map view shows current account locations, streamlining how users analyze and measure the current state of their business by geographic areas. Users can select a product or service, use the Map to review their total service area and zoom into specific areas as needed. Users can quickly and easily compare sales performance or analyze customer and technical support by region or service area, to help uncover business trends and upsell opportunities. ● Protect current customer base: The dashboard is designed to help operations teams retain their cur47


CMYK

product showcase

rent customer base. For example, a technical or customer support representative can view how many accounts are offline and use the Map feature to visually evaluate whether the problem is an isolated or widespread incident. ● Identify areas for growth: The

dashboard empowers customers to explore their account base in new ways, helping them create upgrade programs with greater chances for success. For example, dealers and central stations can get a list of their end users who have Honeywell Total Connect Remote Services but have

not yet subscribed to the service. This allows them an opportunity to create targeted campaigns to protect accounts and maximize growth opportunities. AlarmNet 360 Insights is free to use and is now available for all AlarmNet dealers and central stations.

New OnSSI Ocularis VMS Enhancements Provide Greater Mobility, Better Bandwidth Utilization and More Versatility

O

nSSI has announced the latest enhancements to its industry leading Ocularis Video Management System (VMS) that further improve overall security with new features and enhancements. Ocularis version 5.3 adds new scalable Web and Mobile apps, as well as Ocularis Client bandwidth optimization, wide angle image dewarping, additional Smart Camera Drivers, and Windows Server 2016 support all while keeping its responsive and intuitive user interface. “Ocularis continues to push the envelope for VMS functionality and performance,” said Ken LaMarca, VP of

48

Sales & Marketing, OnSSI, “This latest release of Ocularis addresses the industry’s continuously growing demand for more versatility and functionality to implement more sophisticated security solutions.”

Enhancements to Ocularis

T

o help keep users informed at all times, the new Ocularis 5 Web allows simultaneous viewing of multiple live and recorded camera streams on an improved and intuitive user interface. Automatic bandwidth optimization allows system administrators to control the streams from remote locations to ensure there is sufficient bandwidth available even if pulling video from a remote location over broadband. All Ocularis alerts and events stream to the Ocularis 5 Web interface where they can be viewed and sorted by priority with enhanced control of PTZ cameras. The new Ocularis 5 Mobile provides comprehensive event and alert processing right from the mobile app SecurityLink India ■ 1 May 2017

CMYK

along with the ability to stream live video from an Android smartphone to Ocularis. Also available on the Android platform is the ability to pinpoint locations on an online map on Ocularis 5 Mobile. This allows users to see mobile operator locations in maps on Ocularis Client and view their streaming cameras. This provides security personnel in the field with the ability to upload live video directly from their smartphone as events are unfolding. Uploaded video can then be recorded and redistributed to authorities. Camera selection is also more intuitive, and views can be seen in various formats with regular and alert recordings identified by color. GPS location features for mapping and notification sounds are also included. Ocularis 5 Mobile is available for free on the Google Play and Apple App stores, and is optimized for 3G and 4G networks. Additional Ocularis enhancements include expanded dewarping support for wide angle images, new Smart Camera Drivers for Bosch and FLIR P and FT


CMYK

product showcase

series cameras, and an updated Smart Camera Driver for Axis and Hikvision to easily add new cameras and support for Windows Server 2016. Ocularis 5.3 also includes 64-bit versions of every Ocularis system component: Client, Adminis-

trator, Event Proxy, Base, Recorder and Media Server. Ocularis 5.3 is offered in three models: Professional, designed for organizations operating multiple locations with small to mid-sized camera

counts; Enterprise, built for a wide range of mid to large IT-centric organizations; and Ultimate, created for large organizations with demanding command and control needs and recording server failover.

Pelco Latest Technology Innovations and Strategic Application Solutions Advanced VMS and imaging solutions for large public venues and other strategic locations

P

elco by Schneider Electric featured several of the company’s advanced security solutions at Securika/ MIPS 2017 in Moscow. Highlighted innovations on display include the powerful open platform VideoXpert™ Video Management Software (VMS) designed to control with confidence, a sneak peek of ExSite™ Enhanced Explosion Proof IP Cameras engineered to survive in the most challenging environments, and Sarix™ Enhanced IP Cameras that deliver the highest levels of low light performance when nothing but the best will do. “Security operations and procedures have become a core priority for businesses and organizations across every vertical market around the world as security professionals seek the most efficient and effective means to protect people, property and assets. This is especially pertinent for high-traffic public venues such as casinos and arenas,” said Diane Feliciano, VP, Global Marketing, Pelco by Schneider Electric, “At MIPS, attendees will witness firsthand how Pelco video surveillance and security solu-

tions deliver higher levels of situational awareness, protection and even prevention when and where customers need it most.” In addition to highlighting system solutions with specific benefits for the casino and stadium markets, Pelco’s Securika/ MIPS 2017 display features strategic solutions for the oil and gas, city surveillance and hospitality vertical markets, and includes the following highlighted products: VideoXpert Video Management Software (VMS) dramatically improves the control of integrated surveillance and security solutions on a single platform, providing users with greater situational awareness so they can make more timely decisions and execute decisive action. VideoXpert’s open architecture enables third-party applications to be cost-effectively integrated for highly specialized applications in the hospitality, gaming and municipal surveillance markets. Recent enhancements to VideoXpert include: an enhanced user interface for improved centralized system management; incident management to easily SecurityLink India ■ 1 May 2017

CMYK

ExSite™ Enhanced

and quickly correlate related video files; improved event management to customize event alerts with real-time visual notification; immersive viewing of 180°, 270° and 360° panoramic images from PelcoOptera Multi-Sensor Panoramic Cameras; and much more. Sarix Enhanced IP Cameras utilize Pelco’s exclusive SureVision 3.0 lowlight technology making Sarix imaging solutions ideal for hospitality and city surveillance, delivering quality images in as little as 0.05 lux with an incredible Wide Dynamic Range (WDR) of 130dB. Sarix Enhanced cameras are ONVIF Q compliant and are available in a wide selection of form factors for ease of 49


CMYK

product showcase

integration into the hospitality and municipal surveillance markets, as well as many other mainstream applications. ExSite Enhanced HD Cameras are explosion proof and virtually indestructible with performance features that include: a robotically welded housing for

use in extreme conditions; a unique patent-pending pan-tilt drive system devoid of belts, gears or pulleys; operation in extreme temperatures; 30x optical zoom with image stabilization; IR illumination; 130dB WDR; 0.03 lux ultra-low light performance; integrated Ethernet,

fiber, Ethernet over Coax (EoC) and Unshielded Twisted Pair (UTP) transmission, and more. ExSite is an exceptional imaging solution for oil and gas facilities, chemical plants, manufacturing and marine facilities, and for numerous other demanding environments.

Multiple New Thermal and Visible Security Cameras & Major Update to United VMS New wave of offerings underscores increased breadth of FLIR’s security solutions

F

LIR’s United VMS 8.0, the latest version of the company’s flagship video management solution (VMS), and three high-performance security cameras, including the FLIR PT-Series HD (High-Definition) thermal and visible camera system, the FLIR Quasar 4K fixed box camera, and the FLIR Ariel 3MP (3-megapixel) corner camera were announced recently. All three cameras integrate with FLIR United VMS 8.0 and expand the company's end-to-end line of security solutions. FLIR United VMS 8.0 is a comprehensive, enterprise-level video management solution for managing video security operations. FLIR United VMS 8.0 manages large and multi-location video operations, and includes FLIR Latitude software, as well as FLIR Horizon and FLIR Meridian network video recorders. FLIR United VMS 8.0 delivers a more secure system through stronger online security credential requirements. A simplified system installation process and streamlined camera discovery make integration with FLIR products easy. Also, FLIR United VMS 8.0’s open platform design allows for integration with third party technologies and is customizable and scalable for any 50

size deployment, from small retailers to large enterprises to critical infrastructure. The FLIR PT-Series HD is a dual-sensor camera system that provides superior, long-range perimeter intrusion detection regardless of lighting and environmental conditions. The high-speed, pan-tilt camera provides quick and accurate threat verification. The FLIR PT-Series HD offers either a cooled or uncooled 640x480 resolution thermal camera with a 1080p HD visible camera. Multiple high-performance thermal lenses are available, including optical zoom lenses up to 14x. The HD visible camera also features a 30x optical zoom lens with autofocus and low light capabilities. The FLIR PT-Series HD integrates with FLIR United VMS 8.0 and other major VMS software providers. The FLIR Quasar 4K fixed box multiple-resolution camera can be programmed to switch from 4K daytime mode to 1080p lowlight-nighttime mode to provide optimum, continuous performance. Its compact design allows for the use of specialized camera housings, ranging from explosion to extreme weatherproof, and can accommodate a range of lenses from super-wide to telephoto. The Quasar 4K fixed box is SecurityLink India ■ 1 May 2017

CMYK

ideal for high-traffic areas, such as large venues and transportation hubs. The FLIR Ariel 3MP corner camera features a 3-megapixel visible camera that provides ceiling-to-floor and wall-to-wall viewing. The corner camera also includes a built-in microphone for audio monitoring and discrete night vision illumination for monitoring low light to totally dark locations. FLIR Ariel 3MP also features an impact-resistant, vandal-proof, flush-mount housing, making it ideal for locations such as medical facilities and prisons where the safety of at-risk occupants is essential. “The latest FLIR United VMS offering provides a flexible, end-to-end security management solution that allows customers to easily scale to their security needs,” said FLIR President and CEO, Andy Teich, “With the addition of several new highperformance security cameras, including the FLIR PT-Series HD system ideal for perimeter security, FLIR expands its broad security product offerings and further advances our presence in enterprise security.” All new FLIR security products will be available globally in Q2 2017 through established FLIR security dealers and integrators.


CMYK

product showcase

LTEX17 Explosion Proof Housing with 100m IR Illumination

L

onTrend Corporation is a manufacturer of camera housings and pan tilt units located in Taiwan, with brand name of TSict (branding) and LonTrend (ODM/ OEM), specialized in providing integrated, compatible and user-friendly equipment to support critical applications such as industrial chemical factories, offshore oil platforms, and petrol chemical plants for years. Constructed in SS304 (SS316L upgradable), LTEX17 is an IP68 and Ex dII CT6 Gb rated explosion proof camera housing with IR distance up to 100 meters (30m and 60m optional). The unique features including wiper,

sunshield, and temperature control system with flexibility of customization service are especially reserved for projects markets. LTEX17 comes with a wide range of mounting accessories such as brackets, pan tilt units or control boxes. Specialized in industrial precision, Lontrend Corporation succeeds its culture and mission – anticipating and exceeding customers’ expectations, and is leading the way in die-cast security devices with cutting edge innovations, superior

performance and the broadest selection. Business started over 30 years, LonTrend is a Taiwan-based precision and manufacturing company.

Uniview 12MP PTZ Dome See More with Less

U

niview 12MP PTZ dome – IPC6258SR-X22P features ultra high resolution 12MP (4000x3000) and 22x optical zoom for long distance surveillance. IPC6258SR-X22P applies Hi-

silicon H.265 video compression chipset with 50% bitrate reduction compared with H.264. Furthermore, it supports Uniview’s U-Code smart compression technology for extra 50% bitrate reduc-

4K series: IPC568E-G

IPC6858SR-X22

IPC268ER9-DZ

IPC3238ER3-DVZ

IPC6258SR-X22P

Optical defog

24 V AC/24 V DC

120dB WDR

120dB WDR

PoE

SD/SDHC card slot

Up to 250m IR

Up to 100m IR

Up to 30m IR

22X optical zoom

Fiber interface

22X optical zoom

IP67

IP66

200m IR

SD/SDHC card slot

SD/SDHC card slot

2.8-12mm AF motorized

2.8m-12mm AF motorized

SecurityLink India ■ 1 May 2017

CMYK

tion but still with good image quality.

See more with less: H.265 & U-Code to reduce bitrate, bandwidth and storage

A

s we all know, high resolution is one of significant development trends in the video surveillance industry. Customers need higher resolution like 4K for wider range monitoring, but this will cost more bandwidth and storage. So the problem is how to balance the high resolution and the system cost. To solve this problem, Uniview releases 12MP PTZ dome IPC6258SR51


CMYK

product showcase

X22P with H.265 & U-Code smart compression technology. It can reduce bitrate to 2Mbps which means 75% reduction. Meanwhile, there is no compromise on image quality. Accordingly, bandwidth and storage are reduced 75%. IPC6258SR-X22P has abundant

features including PoE for power supply, car grade LEDs for 200 meters IR, IR anti-reflection window to increase IR transmittance for better night vision etc. For long distance surveillance, IPC6258SR-X22P also supports EIS for image stabilization.

Wavestore Launches VMS v6.6 W

avestore has launched v6.6 of its VMS to deliver enhanced functionality to systems integrators and end-users alike. This new version is available as an upgrade for existing users and will be shipped as standard with all new orders. The latest version introduces Wavestore’s Smart Search feature, compatible with ONVIF Profile S cameras, where operators can highlight a specific region within a scene, set the sensitivity level and instantaneously retrieve video relating to any movement in that area. This allows large amounts of recorded footage to be searched quickly and efficiently, presenting only the required video to users. For added convenience, the relevant search results are highlighted as a differ-

52

ent colour on the playback time line bar and can simply be clicked to display the relevant video footage.

Situational awareness

I

n addition, v6.6. delivers enhanced event management to improve an operator’s situational awareness of important events as they occur. Alerts from any integrated third-party equipment, as well as the VMS itself, are instantly available in an easy to read and intuitive form to the operator. This can include events from any mix of devices and sub-systems including access control, intruder detection, BMS, and analytics technology. These are presented in the live event stream window of Wavestore’s WaveView client, demonstrating the unique ‘One Screen, Total Control’ capability of Wavestore’s VMS, and can also be used to trigger responses both on the Wavestore server itself or on external systems via the powerful event rules engine. Julian Inman, Head of Product Management comments, “Wavestore has always had lightning-fast search and playback capability with its play bar feature but with the introduction of Smart Search we add even more power to forensic search. SecurityLink India ■ 1 May 2017

CMYK

What’s more, with Wavestore’s ‘one screen, total control’ philosophy, operators can simply control and manage their entire best-in-breed security solution from just a single screen, getting exactly what they want for their specific requirements.”

Latest integrations

W

avestore’s Open Platform Technology Partner Programme continues to expand with v6.6 integrating seamlessly as standard with the latest camera models from leading vendors such as 360 Vision, Axis, Dahua, Hanwha Techwin, Hikvision, Mobotix, Sony, Uniview and Vivotek. Alongside this, several new and enhanced optional Integration Modules are now available, including Raytec LED lighting and Datapath video walls.

How to get the latest version

W

avestore v6.6 is now shipping with all new orders and is available as an update for existing users who have active upgrade bundles. Integration modules are available to bolt onto existing solutions or can be ordered at time of purchase with new solutions.


CMYK

53

SecurityLink India â– 1 April 2017

53

CMYK


CMYK

feature

Dahua Contributes to Safeguarding Ports with Intelligent Solution M

an has always been dependent on the ocean. As we began to trade with foreign lands, the importance of ports around the world grew and today they play a critical role as a fundamental part of the world’s transport infrastructure. They provide gateways to the outside world and have enabled nations to transform into export-oriented economies and benefit from foreign trade. With enhanced globalization, the role of ports has changed but coupled with the benefits of trade are the challenges and pressures of security management. Dahua Technology, as an end-to-end intelligent security solutions provider, is devoted to making the world safer, especially ports.

Port security is under threat

T

he industry is fraught with contradictions. Whilst ports are rapidly expanding, there is no doubt that they need security management, but at the same time there is an urgent need for safe, highly-efficient and manageable services. There is also pressure on operators to ensure proper systems are in place. However, with large port supervision areas and sometimes complex situations, managing this civil defence can be difficult. Usually a port area covers several square kilometers, but some port zones can reach tens of square kilometers. So covering a large jurisdiction combined 54

with complex transportation, then add a large number of entrances, perimeter fences, long channels, large scale storage yards, and the numbers of berths it is not surprising that security needs have led to a dramatic increase in the number of workstations across a port. If only dependent on civil defence, how can maritime security keep checking of regular operations? Now with the development of technology, illegal immigrants and organized crime have also affected safety management. But putting the human resources in place to effectively combat this issue would be very wasteful and in most cases the role would be pretty monotonous. Therefore it makes sense to combine the protection approaches with intelligent defence.

Multiple management & resource sharing between different departments

E

xchange and data-sharing is a part of informationization. Ports view each workstation as a unit in terms of achieving video monitoring data. In most cases, the utilization and management of video and business data are comparatively independent at each station. So there is a lack of an integrated, systematic and multi-level security network system. On top of this, ports have to balance demand for the correct allocation and access control from monitoring centers to sub-centers; sub-centers SecurityLink India â– 1 May 2017

CMYK

to monitoring points in customs; port bureaus of public security; maritime bureaus and border defence etc.

Intellectual reformation of ports

W

ith the emergence of smart ports, the need for intellectualized safety management has become very apparent, particularly for the automated identification of containers, staff and drivers who frequently entry and exit the harbor. A multimedia integrated management system is required to support the IMS notification at each critical step of flow, and could be used in conjunction with a sign-in system and security system. Integrators can obtain basic data via electronic tags and cameras, to realize a whole-process and omnidirectional management control system for incoming and outgoing cargo. At the same time, the port safety can be guaranteed through facial recognition technology; tracking analysis; and video motion tools in cooperation with broadcast and sound-warning devices.

Practical monitoring

W

ith the continual evolution of video surveillance products and technology monitoring requirements, their application in port zones needs to keep up with the times. Firstly high definition imaging – since ports gather large crowds of people, vehicles and boats across their extensive grounds, if


CMYK

feature

you want to differentiate the details, you need to use a high resolution camera in order to support the application. In addition, poor light and remote monitoring at night are considerations. In a harbor, the majority of attacks happen on a dark night or during heavy fog, so it is important how to ensure port safety in this kind of situation. Current high demands for use in ports include remote surveillance, panoramic monitoring and products which must be explosion-proof and anti-corrosive. So global ports are finding themselves in challenging situations. It is critical to find a way to turn this situation around.

Dahua Technology providing state-of-theart video intelligent surveillance solutions for ports

D

ahua technology is dedicated to make the world a safer place. Based on decades of accumulated experience and technical expertise, it is advocating a perfect end-to-end intelligent video surveillance solution against potential danger.

Centralized administration and distributed second-tier monitoring

R

egarding system architecture, Dahua Technology has adopted a centralized management model for video surveillance systems which considers the port’s inner operational management mechanism. The centralized management model belongs to a second-tier monitoring, which means a monitoring center is established in the port to realize centralized management for all system resources. Command centers and sub-

The Overall System Framework

control centers meet the requirements of command dispatch and monitoring management from top level customs and police stations to subordinate customs, maritime affairs and frontier inspection departments. Overall, the chief control center is responsible for all access and management of system resources. This includes the monitoring management platform, device access, intellectual analysis system, video storage system and video surveillance system. The control center monitors the general running of port operations, and coordinates safety commands at each unit of the port. In this centralized management model, the control center plays a role obtaining, displaying and controlling the key video resources, while the sub-control centers mainly provide real-time video surveillance and safety guard management for business departments, such

as customs, frontier inspections, and quarantine and inspection departments and so on. It is not difficult to realize that this infrastructure efficiently solves the challenge of sharing and multi-level administration between departments. It also provides highly-efficient and easyto-operate services for ports.   Although Dahua Technology has an excellent system architecture, in order to further satisfy users it is continuing to research on the particular needs of ports.

Entrance

T

he entrances to ports have undergone technological transformations in recent years. Dahua Technology has developed an ID system at the entrance control which can identify the license plate. It is a multimedia management system which is combined with a variety of advanced technologies including im-

Container Numbers in Vertical and Horizontal

SecurityLink India ■ 1 May 2017

CMYK

55


CMYK

feature

age contrast, character superimposing, voice function, query service etc. Users can check the vehicle access and statistics reports from any terminal. Meanwhile, a ‘Blacklist’ database is stored in the platform software, so any blacklisted vehicle will be recognized and prohibited from passing, otherwise, it can pass freely.

research into the technology of neutral networks, mass data storage, and data computing technology. The monitor would transmit the images and videos in forms of video stream or image stream. It does not only show people’s faces in any given situation, but can also store all still images. The real-time videos and images of vehicles and containers will be trans-

For entrance zones, Dahua Technology has started an automatic container equipment identification system, which automatically recognizes the container number. It has a well-run development kit and software interfaces which make it easy for integration with other systems. The system operating process includes interface for immediate alarm triggers, photo shots, number recognition, data storage and data transmission. After receiving the results from the recognition system, clients can undertake relevant operating procedures or back-end processing, such as comparison, analysis or release. The warning function module of image identification is used in container terminals. This can function as an earlywarning system and protect cargo from being stolen. An Intrusion Prevention System can also be added to enhance security and confidentiality. The facial recognition system from Dahua Technology is installed in different places, but has a unified management system. Real-time video surveillance was developed following in-depth

ferred to digital information storage. By using the ISO number, container number or facial recognition information and integrating it with the logistics, quay, yard or customs system, users can find the global location information of containers. This means that the daily management procedures are more automated and efficient including the gateway and cargo management, container inventory management, site planning, management charges and other related logistics management. It saves time in checking the containers, and minimizes rates of manual error, then strengthen safety of quay entrance.

56

Berth monitoring

shake function. Dahua PTZ is equipped with quick and smooth control, high quality image and anti-corrosion protection, so it is a well-designed for berth monitoring. This camera is suited to even the harshest of anti-corrosion conditions. Its 6KV lightning rating provides protection against the camera and its structure from the effects of lightning. With a temperature range of -40°C to +70°C (-40°F to +158°F), the camera is designed for extreme temperature environments. The camera conforms to an IK10 impact rating making it capable of withstanding the equivalent of 55 kg (120 lbs) of force. Subjected and certified to rigorous dust and water immersion tests, the IP68 rating makes it suitable for demanding outdoor applications.

Yard monitoring

T

he container yard, is a crucial stage of the cargo distribution process. It is a wide open space but can present complex issues because it can easily become crowded with vehicles and people making it hard to identify personnel. So the key facilities should be monitored

Multi-line Numbers

B

erth monitoring is the most important step in the process of port protection. For the loading and unloading of cargo in large container terminals, there is high demand for high-definition video surveillance to record all information. For the coastal location, there is a need for cameras with a wide dynamic range, backlight compensation, and an antiSecurityLink India ■ 1 May 2017

CMYK

Country Code and Container Code “KR 4532”


CMYK

feature

lighting technology, Dahua Technology uses thermal imaging technology, which is far more effective than other methods. Specifically designed, this dome camera has a separable lens and wiper function, which means it can adapt to extreme weather conditions and can be installed in an open yard.

Port perimeters through using 24-hour uninterrupted monitoring. Then for critical places, comprehensive surveillance should be added for the loading and stacking points of valuable cargo. The system needs to be reliable, stable and able to respond quickly. Any abnormalities can be immediately detected and are linked to all departments so that timely action can be taken. Specifically for this issue, Dahua Technology has introduced a TPC series of thermal-imaging cameras, which include thermal imaging technology using small and medium sized gunshaped cameras for night protection. Unlike other companies using laser infrared

S

ince ports usually cover customs and excise, only authorized personnel are permitted. For perimeter areas, first of all, we have to consider factors such as long distances, the effects of night images and intelligent alarm systems. Dahua’s thermal-imaging dome camera’s monitoring range can cover hundreds of meters and even a couple of miles. The thermal imaging system can set up an intelligent intrusion analysis and alarms, coordinating to discover and detect illegal personnel and foreign object. Once it sends an alarm signal to a control center, it will issue visual images to staff on duty for confirmation and identification. It can also recognize the intruder and track the location using video image. It

Thermal Camera

has excellent performance for fire detection, overstepping and zone intrusion.

Channel monitoring

C

hannel monitoring faces problems, such as a short monitoring range, low resolution and poor night vision. The Dahua panoramic camera has a wide-angle view, and efficiently improves the capability of emergency commands. This product has a 180 degree tiled display and aims to help supervisors directly visualize the whole channel and its surrounding environment. At the same time, it can use thermal-imaging cameras for long distance detection at night in order to quickly find the target.

Summary

I

n the future, ports will become more intelligent reforming traditional management approaches. Using highdefinition, intelligent and internet video technology, and combined with effective products and systems, Dahua Technology provides global port units with safe, efficient, and easily-operated intelligent solutions for port video surveillance and the safeguarding of ports.

Thermal Effects

SecurityLink India â– 1 May 2017

CMYK

57


CMYK

application/ case study

HID Secures Major U.S. University HID Seos Smart Cards and HID Mobile Access Bring Convenience, Security and the Mobile ID ‘Cool’ Factor

H

ID Global® has announced that a major U.S. university selected its ® Seos smart cards and HID Mobile Access® solution to streamline card office operations, simplify the management and use of trusted IDs, and offer the ‘cool’ factor to students using phones for accessing buildings, services and resources. The phased deployment of thousands of readers over the last few years enabled these benefits, while preserving investments in previously installed HID Global readers. “We applaud this visionary university as one of the most sweeping examples of how to transform the campus experience using trusted identities on cards and mobile phones,” said Brett St. Pierre, Director of Education Solutions with HID Global, “As they move toward full deployment, they will be creating a new kind of One Card office that secures the campus while delivering new and in-

novative services.” The university will support HID Mobile Access in all common campus areas by the summer of 2017 and plans to use the solution’s Mobile IDs as its primary form of campus identification in the years to come. HID Mobile Access enables users to request and receive new Mobile IDs over the air to their phones, improving convenience while significantly reducing card office support requirements. Likewise, administrators can revoke identities and modify permissions with the same over-the-air speed and simplicity, streamlining the work of managing identities across the university’s large campus population. After a successful technology pilot, the university began upgrading many of its existing HID readers to support the Bluetooth capabilities required for Mobile IDs. It is also installing more than

400 additional mobile-enabled readers during 2017, with all readers supporting both earlier card technologies and Mobile IDs to ensure a smooth transition. The university plans to ultimately use Mobile IDs as its primary form of identification in the future. Accordingly, the university issued 300 to 400 Mobile IDs in the first deployment phase of HID Mobile Access and will issue another 500 during 2017. Next year, the university intends to issue ID cards while simultaneously provisioning Mobile IDs to all students and staff. The university will explore new ways to benefit from HID Mobile Access after the deployment is complete. Mobile IDs can be used alongside ID cards for applications ranging from entering parking lots, buildings and residence halls to making meal plan purchases, and accessing library and media center resources.

Uni-ID and Safran to Make Mobile Authentication in China

S

More Secure and Convenient with Biometrics

afran Identity & Security announced that Uni-ID Technology, a wholly owned subsidiary of Lenovo and leading Chinese provider of innovative authentication technology, has successfully integrated Safran’s biometric facial recognition solution in its FIDO compliant authentication application for con58

sumer devices. China is the world’s largest mobile payment market (Source: BI Intelligence), and online service providers are looking for new ways to make customer authentication in mobile transactions more secure and convenient. To enable banking institutions, payment compaSecurityLink India ■ 1 May 2017

CMYK

nies and mobile network operators to offer a safe and easy authentication method, Uni-ID has chosen Safran Identity & Security’s Software Development Kit (SDK) for biometric facial recognition to be implemented in its authentication application. The SDK can be integrated in all existing Android and iOS devices.


CMYK

application/ case study

“With our face recognition solution, authentication is done by a selfie-check – a friendly user experience! Enhanced liveness detection adds extra security,” said Yves Portalier, Vice President & General Manager of the Telecom Business Unit, Safran Identity & Security, “As a world leader in biometrics, we are perfectly positioned to provide Uni-ID’s customers with best-in-class technology to boost the secure and convenient use of mobile transactions in China.” “The partnership with Safran Identity & Security on FIDO*-compliant Face

recognition has greatly enriched our approach to biometric authentication solutions. It is also beneficial for FIDO to be implemented on more devices in the Chinese market,” said Henry Chai, General Manager of UniID Technology (Beijing) Co., Ltd. and Chair of the FIDO China working group (FCWG). * FIDO is the world’s largest ecosystem for standardsbased, interoperable authentication

JFK Terminal 1 Improves Security with Milestone Video

IP platform provides significant upgrade with increased usability, efficient storage and enhanced system integration with Agent Vi analytics

M

ilestone Systems open platform IP video management software (VMS) has been installed at JFK International Airport’s Terminal 1 to help manage the safety of more than 27 million passengers a year. Previously, T1 at JFK relied on a limited analog surveillance system and an older IP system that were independent of each other. Both were inadequate and lacked some necessary functionality. Operators could only view video from specific workstations, it was difficult to replace or add cameras, and the system did not integrate easily with other systems. Migrating the terminal’s old analog system to an advanced IP video management software platform was no small

feat. Due to the airport’s high-security environment, the system and all of its cameras had to remain operational around the clock throughout the migration. To design and implement the new solution, the airport worked with security integrator Media Wire, LLC, who designed and implemented a Milestone XProtect Corporate VMS solution to SecurityLink India ■ 1 May 2017

CMYK

manage its 500 to 600 cameras, including the installation of 160 new network cameras from Axis Communications. Providing greater access to video, the Milestone Mobile client is used by air terminal managers to view video on their smartphones. “We installed an extensive 10 gig fiber network to support the bandwidth needed for current and future cameras. 59


CMYK

application/ case study

All cameras provide video at the maximum resolutions and frame rates, no corners are cut,” said Laszlo Tordai, Owner, Engineer and Technician at Media Wire, “It is simply unacceptable to minimize the system’s capabilities and performance because a component is not up to par with the rest of the system. We are keeping this a top-notch installation.” Migrating Terminal 1’s system

required upgrades to ensure a solid solution from the ground up. New high-speed fiber optics, switches, PoE injectors, software, workstations and operating systems were installed. Tordai estimates the terminal has close to one Petabyte of storage due to both security requirements, and powerful analytics from Agent Vi that are used on recorded video and to search across camera views. The new system is easily scalable

and can accommodate additional cameras at any time. Terminal 1’s new Axis cameras easily integrated with the Milestone system and require less bandwidth that better allow the security team to meet the airport’s lengthy storage requirements. “When you look at a whole system and deploy the right parts, you actually save the customer a lot of money,” Tordai said. “It’s a win-win across the board.”

Victoria Police Go Mobile

To boost workforce safety, efficiency and collaboration

M

otorola Solutions will provide a new mobility managed service to Victoria Police to help increase situational awareness, safety and productivity for frontline officers. The service will place real-time information at the fingertips of at least 10,000 police officers equipped with iPads and iPhones, helping them manage their daily work more safely, efficiently and productively. The solution will also help reduce the duplication of data entry by officers while increasing workforce collaboration by sharing vital information between frontline personnel and their colleagues working in control rooms.

● New managed service mobility solution for at least 10,000 police officers in Victoria, Australia. ● Solution saves time on frontline reporting and leads to more visible and effective policing. ● AUD50 million contract to run for a minimum of five years. 60

The technology will also help Victoria Police to preserve its mission-critical radio communications for essential emergency communications by removing lower priority traffic from the radio network. This investment represents a major goal within Victoria Police’s Capability Plan 2016-2025, which highlights the way the force will transform its service delivery to be more ‘agile, responsive, people-focussed and connected’ as well as the organisation’s Blue Paper, ‘A Vision for Victoria Police in 2025,’ which outlines how the force is improving capability through workforce reform and technology. The holistic managed service contract is valued at more than AUD50 million and will run for a minimum of five years with the potential to extend to 11 years. The solution includes, mPol, a mobile application developed by Gridstone, the Collingwood-based mobile application developer that Motorola Solutions acquired in November, 2016. SecurityLink India ■ 1 May 2017

CMYK

This application platform has been successfully implemented by Queensland Police and will be tailored to meet the specific needs of Victoria Police. Motorola Solutions will lead a consortium of service providers to deliver the contract including: ● Optus: who will provide the carrier network solution to enable police officers to stay connected to critical information while on the move ● CompNow: who will supply the Apple mobile devices, logistics and device repair services Motorola Solutions Vice President and Managing Director Steve Crutchfield explained the technology solution “Would provide Victoria Police with a reliable mobility solution and services to enable frontline officers to access core operational applications from mobile devices.” “Many public safety and enterprise businesses today are looking to improve the way they manage their daily workflows through the use of mobile applica-


CMYK

application/ case study

tions that can simplify their most complex work challenges,” Mr. Crutchfield said. “We will provide Victoria Police with a mobility managed service that is highly secure, reliable and helps to free up more time for frontline police to

work in their communities where they are needed most,” he said. John Paitaridis, Managing Director, Optus Business said, “Providing reliable and efficient mobile connectivity opens up a gateway of new capabilities for pub-

lic safety agencies. “Optus is pleased to collaborate with Victoria Police and Motorola Solutions to support digital connectivity and improved productivity of Victorian police while on-the-go.”

ENGIE Ineo, Milestone and Axis Secure the Council of Europe Buildings

The Council of Europe has upgraded its video safety solutions at the Strasbourg campus thanks to dedicated efforts by Milestone community partners

M

ilestone Systems has collaborated with partners ENGIE Ineo and Axis to upgrade the Council of Europe’s (headquartered in Strasbourg, France) video surveillance systems. The security project was managed by Milestone community partners Securitas and ENGIE Ineo. The security solution, which has been live since January 2017, has secured the Council’s vast campus including the Human Rights Building, European Directorate for the Quality of Medicines & Healthcare, the European Center for Youth and the Agora building. A security surveillance and monitoring solution was installed in all access areas including the entire external perimeter. The contract also includes a five-year maintenance agreement. ENGIE Ineo partnered with Milestone and Axis for their video expertise (video management software and network cameras respectively). The legacy analog surveillance system has been replaced with a full network video surveillance solution that delivers bet-

ter performance including ease of access and retrieval of video assets, as well as a flexible solution that allows the Council to tailor how locations are secured. With Milestone’s XProtect solution, the organization is now able to handle all its video safety operations through a single management interface as well as manage other security devices such as gate control systems and thermal cameras. The project was designed to keep disruption to a minimum, taking into account the busy schedule of the Council of Europe, particularly during parliamentary sessions. Amine Sadi, Country Manager France, Milestone Systems said, “This SecurityLink India ■ 1 May 2017

CMYK

project has once again demonstrated how effective our partnerships are. The way that we work and collaborate with the teams at ENGIE Ineo and Axis has contributed significantly to the success of this impressive installation. With Milestone’s solution, the Council of Europe now has the right surveillance management technology in place. It is perfectly tailored to their needs in terms of accessibility, scalability, cost, ease of use and performance.” 61


CMYK

application/ case study

Swansea University Selects SafeZone™ to Boost Security

Students to benefit from enhanced personal protection, both on and off campus

C

riticalArc has recently announced that its pioneering SafeZone™ personal protection and campus security system has been selected by Swansea University to boost 24/7 safety for its students and staff both on and off campus. Swansea University is the latest in a fast-growing list of UK higher education establishments to choose SafeZone, following its European launch in 2014. The University has more than 19,000 students, including many international students, studying on a range of courses from Engineering, Law and Criminology, Arts and Humanities, Science, Medical, Human and Health Science and Business Management supported by just over 3,000 staff (includes academics). SafeZone will be deployed at the two principal campuses i.e., the Singleton Park and the Bay Campuses as well as

7 other sites frequented by students and staff in the Swansea Bay region, where it will offer enhanced protection for any staff and student when they are at risk or need urgent help. It will meet the need of the campus security teams to support an increasingly round-the-clock learning culture that offers safe 24/7 access to libraries, study hubs and other facilities. A major benefit will be the creation of safe ‘corridors’ between each campus, its halls of residence and popular destinations such as the train and bus stations. Additional monitoring and response cover along these thoroughfares will offer extra protection for people walking alone late at night. SafeZone protection will also extend to designated areas off campus, for example, for individuals on field trips, research projects or international placements, anywhere in the world.

Fulton House Singleton Campus

62

SecurityLink India ■ 1 May 2017

CMYK

SafeZone will equip the University with a cost-effective, people-centred safety solution plus an effective distributed command and control platform for managing response and mass communication during small or large-scale emergencies. All staff and students will be able to download the free smartphone app that makes it easy for them to raise a location-based alert at the touch of a button, so eliminating potential language or communication barriers. Ideally suited to dispersed estates, SafeZone is fast and easy to implement, alleviating the need to invest in additional physical security measures such as help points. It will give Swansea University access to zero-cost, targeted mass notifications, privacy-compliant group management functionality and a host of features like lone worker check-in. These force-multiplier capabilities will significantly improve its ability to enable collaboration between security first responder and volunteers such as building wardens during critical incidents as well as improving the efficiency of everyday team operations. Darren Chalmers-Stevens, from CriticalArc said: “it is great to be working with Swansea University as our first Welsh University. The team at Swansea University share a similar vision for real time situational awareness to us and have a great vision for the solution to include collaborating with local authorities and private organisations alike for a smart city which is envisaged will lead to fur-


CMYK

application/ case study

ther safety and security initiatives that will benefit staff and students alike. We very much look forward to a close working relationship with Swansea University as an industry leader in this space.” Russ Huxtable, Head of Resilience & Business Continuity at Swansea University said: “We have implemented an integrated security strategy for our University in order to provide, as far as practicable, a secure and safe environment for those who use, study or work at the University. We are always looking at innovative ways to further mitigate risk, enable rapid response readiness and fulfil our duty of care. By complementing our existing health and safety measures, SafeZone will enhance our ability to respond appropriately to any event, whether it’s a call for first aid, fire alarm or a major incident. Using SafeZone to

Aerial Bay Campus - Feb 2016

ensure a consistent security approach across our campus locations and beyond will provide an extra level of protection to give all students and staff added peace of mind.” SafeZone went live at Swansea Uni-

versity in September 2016; initial reaction to the service is extremely positive matched by a strong continuous uptake for the scheme which is only expected to increase further when the new University term begins in September 2017.

Milestone Secures Iceland’s New High Security Prison Integrated with CIAS fence and microwave detection systems, Milestone XProtect Expert 2016 enables Holmsheidi Prison to proactively respond to incidents

M

ilestone Systems has joined forces with Security Center (Öryggismiðstöðin) and Verkís to provide an advanced security solution for Holmsheidi Prison in Reykjavik, Iceland. The solution combines Milestone XProtect Expert 2016 with CIAS fence and microwave detection systems. Completed in 2015, Holmsheidi Prison is Iceland’s new high security women’s prison. Located in the outskirts of the capital Reykjavik, the premises SecurityLink India ■ 1 May 2017

CMYK

63


CMYK

application/ case study

cover roughly 9 acres, while the building with its 56 cells covers 3,700 m2. To cater to the advanced security needs of the facility, Milestone XProtect Expert 2016 enables the prison staff to proactively respond to potential incidents. The needs for high availability are ensured by the failover technology and uninterrupted video recording capabilities in the Milestone VMS. XProtect 2016 boasts several features designed to reduce the overall cost of ownership and offers unlimited expandability thanks to the use of open platform tech-

nology. This enables Holmsheidi Prison to be in greater control of their surveillance investment now and in the future. Icelandic project management and engineering firm Verkís is responsible for the project’s Building Management System and has designed the electrical, lighting and security systems. Security Center, an Icelandic security services company, provides the alarm and fence systems for the project, hereunder the integrated CIAS fence and microwave detection systems. This integration is made possible

through CIAS’ IB-System IP technology, a data collection system that works as an integration server and can manage up to 1280 different sensors. “Thanks to Milestone’s open platform technology, we have collaborated with multiple contractors and partners on this project,” says Lars Wilson, Regional Sales Manager Nordics at Milestone Systems, “By gathering future proof solutions from different vendors, we are able to provide the state-of-theart security and alarm systems necessary for managing a high security prison.”

A Facial Recognition System for National Police of the Netherlands S

afran Identity and Security has supplied a facial recognition solution to the National Police of the Netherlands. The nationwide system, which includes workstations for facial search, comparison and analysis was recently launched at the National Forensic Service Centre. Dutch police officers can now submit a facial image for search against their databases and save precious time. “Safran Identity and Security is honoured to further extend the long term, trusted partnership with the National Police of the Netherlands in delivering advanced biometric tools to maximize its investigation capabilities.” – Anne Bouverot Chair and CEO of Safran Identity and Security 64

This facial recognition system is an extension of the biometric services that have been successfully delivered over many years by Safran Identity & Security in the Netherlands. The original system provides search, analysis and matching services for fingerprints and palm prints. The new facial recognition system delivers two key capabilities: ● MorphoBIS Face Expert offers advanced investigation functions with SecurityLink India ■ 1 May 2017

CMYK


CMYK

application/ case study

“It’s important for the public to understand that the automated search provided by the system is only the first step in finding a match for a face in a database. Possible matches are reviewed by two trained human experts, working independently. Simply stated, our system assesses and evaluates the similarity between the probe and candidate images. Only trained human examiners can provide an expert conclusion.” – John Riemen Manager, Netherlands National Criminal Automated Biometric Identification System (ABIS)

forensic image analysis and comparison tools. ● MorphoBIS Face Detective allows investigators to rapidly search for criminal portrait images and assemble photo line-ups for fast analysis. Both programs accept multiple image file formats for maximum leveraging of available images in searches.

Elbit Awarded A Contract to Provide ISTAR Solution An Approximately $82 Million Contract to Provide an Asia-Pacific Country with the Condor 2Strategic ISTAR Solution

E

lbit Systems Ltd. has recently been awarded an approximately $82 million contract to provide an Asia-Pacific country with a comprehensive electrooptic airborne solution, Condor 2, for use in intelligence, surveillance, target acquisition and reconnaissance (ISTAR) missions. The contract, which is a follow-on order from the same customer, will be performed over a four-years period by Elbit Systems’ ISTAR Division. This program is being performed in cooperation with ELTA Systems Ltd., who is supplying additional content to the same customer. “We are proud of this follow-on contract award, attesting to our customer’s satisfaction from the quality of our leading solutions, well suited for the global intelligence needs,” commented Elad Aharonson, General Manager of Elbit

Systems ISTAR Division, “Our ISTAR systems and solutions enable customers to carry out effective and flexible ISTAR operations. We see

a strong and growing global demand for ISTAR solutions, and believe that other customers will follow this Asia-Pacific customer and select our systems for their needs.” Elbit Systems Ltd. is an international high technology company engaged in a wide range of defence, homeland security and commercial programs SecurityLink India ■ 1 May 2017

CMYK

throughout the world. The company, which includes Elbit Systems and its subsidiaries, operates in the areas of aerospace, land and naval systems, command, control, communications, computers, intelligence surveillance and reconnaissance (C4ISR), unmanned aircraft systems, advanced electro-optics, electro-optic space systems, EW suites, signal intelligence systems, data links and communications systems, radios and cyber-based systems. The Company also focuses on the upgrading of existing platforms, developing new technologies for defence, homeland security and commercial applications, and providing a range of support services, including training and simulation systems. 65


CMYK

application/ case study

Dahua Transforms Cutral-Có, Argentina into Safe City Dahua Professional Surveillance System Transforms Cutral-Có, Argentina into Safe City in 30 Days

I

n just 30 days, a state-of-the-art Dahua Safe City video surveillance system comprised of 242 devices is set up completely. It enables the city to become a pioneer in modern urban security development as well as a national technology hub. The Dahua Safe City solution was developed to greatly improve police, fire, transportation, and medical emergency response speeds and efficiency through a network of reliable cameras and intelligent technologies.

Challenge

L

ocated in northwestern Argentina, Cutral-Có is the second largest city in Neuquén Province and a major oil producer in the region. Due to the recent economic downturn and the resulting crime, on top of the inefficiencies in the traffic system often

causing painstaking gridlocks, the city needed an efficient, reliable solution that would secure its nearly 50,000 residents and natural resource infrastructure. This led former Mayor Prof. Ramón Riosecoto call for a comprehensive video surveillance system that would monitor traffic, improve city management, streamline responses to neighborhood emergencies, support the Civil Defense force, and safeguard urban areas. “Without such a system, integral public services would not be able to function properly, and that would delay the city’s modernization process,” said Prof. Ramón Riosecoto.

Solution

I

n coordination with the Cutral-Có government, Dahua stepped up to the task and formed an action plan that would become one of the country’s most

Dahua Team and the Customer

66

SecurityLink India ■ 1 May 2017

CMYK

advanced security grids. Dahua Technology was chosen to develop an urban surveillance network for the city not only because of its numerous success stories but also because of its efficient technical support system. In addition, a wide range of field-tested products able to withstand the adverse Cutral-Có temperature extremes, which range from -10°C to 40°C, made Dahua the most qualified candidate for the project. Dahua kept Professional Surveillance System (PSS) software at the project’s core which could design and manage the deployment of the system’s numerous speed domes and camera components efficiently. With support for 256 simultaneous device connections, all 242 of the project’s components could be managed from one system. In order to handle the massive flows of data from multiple high resolution cameras, the Dahua DH-NVR6000 series network video recorder was integrated to provide 64TB of storage out of the box, with another 128TB added through network storage, bringing its total storage capacity to 192TB, and allowing the system to record and store video in full HD resolution for 45 days. The long archive time offered by this setup is perfect for intense data analysis, and various facial and plate identification software. Dahua SD6C230S speed domes were chosen to provide extensive cover-


CMYK

application/ case study

age around urban areas due to their longrange capabilities. With 30x optical zoom and 16x digital zoom at a resolution of 2 megapixels, the speed domes are ideal for crime prevention units and automatic number plate recognition (ANPR) at variable distances, performing well on objectives at ranges of over 320 meters. These speed domes were installed at the main entrances of integral public sites such as hospitals, schools, police stations, and crossroads. To accommodate various geographical constraints, a portion of the speed domes were interconnected wirelessly, while others were connected by optical fibers. Uninterrupted power supply (UPS) was used to power each to ensure 24/7 operation. 3 megapixel fixed DH-IPC-HF 8301E ultra-smart network cameras were placed in areas of high risk. Their progressive scan CMOS sensor, varifocal lens, and motorized auto-iris, coupled with a multitude of smart detection features including facial detection, enable the cameras to deliver superior performance during the day or at night, even in the absence of infrared illuminators. SMART Professional Surveillance System (SMART PSS) software was used to achieve integration with the entire network of cameras and digital components. This setup allowed the city to host its own internet-based data center administration system, which is the first of its kind in Argentina. Optical fibers provided by Internet providers Telefónica and Copelco provided the system with the high bandwidth capacity required to support intense data traffic, which was managed through the SMART PSS software’s load balancing system. Vigilancia Online S.A., a Dahua partner company, accomplished smooth installation and integration of

the system’s 242 cameras in only 30 business days.

Benefits

I

n just a month’s time, Cutral-Có has been equipped with one of the most advanced command and control centers in the country, which is interconnected with the radio-electric command of the neighboring city of Plaza Huincul and defense agencies, displaying the importance of a Smart

City system on both its immediate and surrounding areas. City officials can now take a relaxing breath knowing that Cutral-Có residents and infrastructure are fully protected by world-class, state-of-the-art video surveillance technology provided by Dahua. This solution demonstrates Dahua’s core value in innovation, quality, and service (IQS), which will continue to be its main driving factors as Dahua looks towards the future.

Overcoming Security Challenges at SCL Tigers Top Swiss ice hockey club SCL Tigers have put the freeze on disruption at matches thanks to the installation of a new Panasonic security camera system

T

he club has chosen the company’s 4K dome camera, the WVSFV781L, to monitor spectator stands at the ILFISHALLE stadium in Langnau. With 6x optical zoom and true 4K, the club is able to monitor the entire length of each stand using just two cameras. Alongside the 4K technology SCL Tigers also opted for WV-SW598A full HD fixed dome cameras outside the stadium and in areas away from the spectator stands. Operators benefit from a 30x optical zoom, PTZ functionality and a 128x dynamic range to capture clear evidence day and night. The Tigers play in the National League A, the top division in Switzer-

SecurityLink India ■ 1 May 2017

CMYK

land. Strict regulations regarding the safety of spectators as well as the security of stadiums meant it was crucial the club had a camera setup that would be dependable and compliant. “The stadium operators needed to be able to review the video material of the stands and the areas outside the stadium within hours of an incident taking place,” said CEO of SCL Tigers, Peter Müller, “The Panasonic brand is well known for its reliability and highquality products. Value for money was another key aspect, and Panasonic provides exactly what we were looking for. For us, it’s important that we invest capital in the best way possible and get the most out of it.”

67


CMYK

white paper

Computer Vision based Fire Detection System By Amandeep Singh Uppal – Sr. Engineer in Technology and Solutions, Sasken Communication Technologies Ltd., Bengaluru

M

any fire detection devices have been around for quite some time and they are essential safety devices. The devices that automatically detect fire have been available since 1890 when Francis Upton invented the first smoke alarm [1][2]. With further technological advances in the mid of 1960s, smoke detectors started being used in buildings all over the world and became an essential safety device [3]. But the devices like smoke detectors have some serious limitations which make them inefficient in many important situations. For example they may work well in small closed spaces like homes or offices but are inefficient in large open spaces like warehouses, theaters, verandas etc. They require sufficient levels of smoke build-up to turn on. The modern electronic fire detectors usually depend upon heat and pressure sensors and they also suffer 68

from the similar limitations as they also require certain amount of heat and pressure built up to set them off. But this is an impractical approach in case of open spaces – we cannot detect forest fires with such smoke and electronic detectors. This necessitated the need of an alternate system that can accept alternate mode of input and surmount the existing limitations. This white-paper presents a computer vision based fire detection system that takes input from the video cameras and analyze fire pixels present in it. To analyze, the system uses color and luminance features of the input images. Due to rapid developments in digital camera technology and advancements in computer-vision based methods, more and more computer-vision based fire detection systems are being introduced which do not suffer from space limitations. SecurityLink India ■ 1 May 2017

CMYK

Methodology

A

s fire is a visual phenomenon, it has many distinctive features like color, motion etc. An algorithm extracts these features to classify whether the pixels under consideration are of fire or not. As fire is not a stationary process, to reduce the computational load, the first step in the algorithm is to detect the region of the image where there is motion. This is done by calculating the difference between the nth frame (i.e., the frame under consideration) of the video with (n−1)th frame and the resultant pixels are called Region of Interest (ROI) in the image. These ROI pixels are then fed to Fire Pixel Classifier (FPC) that consists of various rules. If the ROI pixels pass all these rules, it is confirmed that the pixels under consideration belong to fire. Upon detection of fire pixels, the system can raise an alarm. The above


CMYK

white paper

procedure can be well understood with the help of the following flow chart shown in Fig. 1:

Fig. 2 Sample subsequent frames of captured video

Fig. 5 Flow chart of Fire Pixel Classifier (FPC)

Fig. 1 Flow chart of the proposed system Fig. 3 Result obtained after differencing operation

The various components of the system are:

A. Motion detector

T

he motion detector confirms the motion in a region of the image and this is done by differencing the subsequent frames of the captured video based on their intensity values. Let nth frame of the video be the frame under consideration. As this frame is a color image and the color image consists of 3 channels (i.e., R, G, B channels), motion is detected by differencing the intensity values of R, G, B channels of nth frame with (n− 1)th frame. The resultant pixels give the ROI and further processing is done on these pixels. Fig. 2 shows two subsequent frames of captured video and Fig. 3 shows the difference image obtained after applying differencing operation. The three channels R, B and G in the difference image are merged and converted to gray-scale for better visualization of result. The block diagram of motion detector is as shown in Fig. 4.

The various rules that ROI pixels have to satisfy are: Rule I: For fire pixels in case of RGB color space, R channel has higher intensity values than G channel, and G has higher than B. So, a pixel value at location (x, y) in the difference image is said to be fire pixel if R(x, y) >G(x, y) >B(x, y). Rule II: Fig. 6 shows highlighted fire pixels region in the original image and Fig. 7 shows the histograms of R, G and B channels of the highlighted fire pixels:

Fig. 4 Motion detector block diagram

B. Fire Pixel Classifier (FPC)

I

n FPC, rule based color model approach is followed. As fire pixels have color and luminance properties, the ROI is processed in RGB and YCbCr color spaces. To be identified as fire pixels by FPC, the ROI pixels have to satisfy below rules, and if the rules are satisfied they are classified by FPC as fire pixels or, those set of pixels are dropped and the process repeats for new ROI. This process can be visualized with the help of the flow chart as shown in Fig. 5: SecurityLink India â– 1 May 2017

CMYK

Fig. 6 Original RGB image on the left and image with highlighted fire pixels on the right.

The logical explanation of this behavior is that image of fire is composed of yellow color with traces of red color in it. Yellow color in turn is a combination of green and red color. So, the histogram of fire image will have a number 69


CMYK

white paper

Fig. 7 Histograms of R, G and B channels of highlighted fire pixels

of red components in high tonal range, green components from medium to high tonal range and the blue components will lie in low tonal ranges. Based on the above observations, a threshold Rth for R-channel, Gth for Gchannel and Bth for B-channel can be set such that for a pixel at location (x, y) in difference image is said to be fire pixel if R(x, y)> Rth and G(x, y)> Gth and B(x, y)< Bth. Images of RGB color space can be converted to YCbCr color space. For the nth frame of video, the mean values of Y, Cb and Cr channels denoted as Ymean, Cbmean, Crmean are calculated. Rules III and IV: The intensity of fire region in Y and Cr channels is more than that of Cb channel. So, the pixel at location (x, y) in the difference image is said to be fire pixel if Y(x, y) ≥ Cb(x, y) and Cr(x, y) > Cb(x, y). Rule V: As fire region in an image is made up of yellow and red color components, Cr of fire region pixels will be greater than mean Cr of whole image and Cb of fire region pixels will be less than Cb of whole image. Also as fire region in an image is of high intensity, Y of fire region pixels will be greater than mean Y of whole image. Rule VI: Fig. 8 shows the RGB image and its YCbCr converted image and Fig. 9 shows histograms of Cb and Cr 70

tions. The other set didn’t contain fire, but contained fire color regions like sun, flowers, etc. The following condition was used to declare a fire region – if the model achieves to detect atleast 10 pixels of fire in ROI, Fig. 8 Original RGB image on the left and RGB to YCbCr converted original image on the right only then it is assumed that the image contains fire region and fire alarm is raised. Fig. 10 shows the classification error matrix obtained by the authors in [4]: Fig. 9 Histograms of fire region of YCbCr image. Histogram of Cb channel on the left and Cr channel on the right With above methodology, the authors in [4] channels of the fire region in YCbCr im- were able to achieve classification accuracy of 92.5%. age: Hence, the thresholds Cbth and Cr th for the channels Cb and Cr can be set Conclusion such that for the pixel at location (x, y) he paper discussed the existing alin the difference image is said to be fire gorithms for fire detection through th pixel if Cb(x, y)≤ Cb and Cr(x, y)≥ vision sensors based on the color-space approach. RGB and YCbCr color spacCrth. es are used by authors in [4] and [1] to Performance evaluation obtain the classification accuracy of ased on above discussed methodol- 92.5%. The further advancement to the sysogy, the authors in [4] used classification error matrix for performance tem may involve machine learning to evaluation. For this, they collected two achieve high classification accuracy and sets of images. One set comprises the to decrease false-alarm rates. images that consisted of fire. The fire set References consisted of 200 images, with diversity in fire color and environmental illumina[1] N. True, “Computer vision based fire

T

B

Fig. 10 Classification Error Matrix

SecurityLink India ■ 1 May 2017

CMYK

detection,” University of California, San Diego, San Diego, 2008. [2] F. B. Upton, “And fernando j,” Sep. 23 1890, US Patent 436,961. [3] Wikipedia. Smoke detector. https:// en.wikipedia.org/wiki/Smoke_detector. [4] V. Vipin, “Image processing based forest fire detection,” International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 2, pp. 87–95, 2012.


CMYK

National Roundup

International Security Conference & Expo 2017

PSIA Demonstrates New Use Case

Arecont Vision® Showcases Biometrics adds multi-factor authentication SurroundVideo® Omni G3 Omnidirectional Multi-Sensor to PLAI he PSIA hosted a successful demonstration at ISC West, Camera with Remote Setup

T

showing integration’s of iris scan biometrics systems from EyeLock and Princeton Identity with PLAI. Enterprise customers are now considering multi-factor authentication in critical security areas of their company, including IT centers and industrial operations and PLAI is a perfect complement for this application. Also demonstrated was one of the initial use cases for PLAI, the synchronization of disparate physical access control systems (PACS). Three leading PACS vendors, Kastle Systems, Lenel (UTC) and Software House (Tyco Security Products) relied on native implementations of PLAI in their MyKastle, OnGuard, and C*CURE products respectively, to demonstrate how this standard can provide a more robust security system with dynamic identity management. Finally, the use of mobile credentials was shown, with Allegion demonstrating how a smart phone could receive credentials from a trusted source to allow access to a building or facility. The PSIA is planning a virtual demo, replicating the ISC West event for those people who were not able to attend.

A

recont Vision® has expanded the ground-breaking multisensor, multi-megapixel SurroundVideo® omnidirectional camera series. The SurroundVideo Omni G3 is the industry’s first camera in the multi-sensor product category that Arecont Vision pioneered that now offers no-touch, remote setup. The new Omni G3 series was featured in the Arecont Vision booth at the ISC West 2017. “The SurroundVideo Omni G3 continues the Arecont Vision tradition of being a market leader through innovative new products,” said Brad Donaldson, VP of Product Development, Arecont Vision, “The Omni G3 is the easiest multi-sensor omnidirectional camera in the industry to install, setup, and configure, saving our customers both time and money.” Arecont Vision continues to lead the multi-sensor camera market that the company first pioneered in 2006. A single highdefinition SurroundVideo camera can replace multiple pantilt-zoom cameras or a large number of single-sensor cameras for a wide range of surveillance requirements. SurroundVideo has been proven in thousands of customer projects around the world, integrated with the customer’s choice of leading video management systems (VMS) and network video recorders (NVR).

SecurityLink India ■ 1 May 2017

CMYK

71


CMYK

National Roundup

International Security Conference & Expo 2017 The new SurroundVideo Omni G3 goes the final step, delivering no touch remote setup. The Omni G3 can be quickly installed on a wall, corner, ceiling, pole, emergency call box, or other structure. The camera is then connected to a single PoE (Power over Ethernet) IP network cable. The installer can then dismount from the ladder or lift, and connect to the camera’s integrated webpage over the network for setup. 180°, 270°, or 360° preset views can be selected, or the installer can adjust and position each of the sensors remotely, including remote focus, zoom, and tilt. New presets can also be saved, so that the view can be completely changed when needed. For example, a stadium may have different viewing requirements for a sporting event versus a concert. The user can select the appropriate preset, and the camera will move the sensors to that new perspective. The camera can then be returned to the original view just as easily. This can all be done without requiring the time and cost of manually mounting a ladder or lift to remove and then replace the dome bubble after adjusting the aim of the 4 sensors, or shifting the entire camera.

Heavy Foot Traffic and Lots of Cloud Interest

T

his month started off with a hugely successful showing during the ISC West 2017 Conference and Expo in Las Vegas, flanked with heavy foot traffic throughout the show and a lot of interest in our latest products and offerings. We previewed the new ACT365 cloud-based access control and video management solution for our valued partners and customers, which was well received and brought a lot of discussion to the forefront on the future of access control. Vanderbilt started off the week weighing in on some predictions for the big show, including the cloud, IoT and openplatform systems, in a round table discussion alongside other thought leaders in the industry. The themes identified remained true, as many visitors to the Vanderbilt booth wanted to know about cloud-based applications for access control and how to72

day’s connected devices will affect the industry moving forward. SourceSecurity Editor Larry Anderson spoke with Vanderbilt President Mitchell Kane about this development, citing the importance of integrator and dealer education on the changing business models for recurring monthly revenue (RMR) for hosted solutions. Larry also shared the ACT365 solution preview with his readers following the show. Security Systems News Managing Editor Spencer Ives also received an overview of the major trends in the access control world, including hosted solutions and mobile credentials, citing these in his show wrap up for the publication.

Vanderbilt also showcased its tried and true access control solutions, including lite blue, bright blue and Vanderbilt Security Management System (SMS), all of which encompass all aspects of the market. With foot traffic and engagement as high as it was this year, Vanderbilt looks forward to sharing the show floor during ISC West next year, and we are eager to introduce our latest product offerings to a larger audience as the show continues to grow.

Video and Access Integration

Innovative software offers SMB market unprecedented benefits that fit their budgets

3

xLOGIC, Inc. demonstrated its newest, integrated video and access control software platform at ISC West 2017.

SecurityLink India ■ 1 May 2017

CMYK


CMYK

National Roundup

International Security Conference & Expo 2017 “We are changing the rules of the game for video and access control for the SMB market with our new integrated, hosted video and access control solution,” announced Matt Kushner, 3xLOGIC CEO, “We have achieved the most powerful commercial feature set at a price that fits the budget for even the smallest business owners.”

of reach due mainly to the labor required for such a complex installation process, coupled with the high up-front cost of servers and software. Eliminating the expensive labor component and removing the cost of software and servers have opened the market for SMB customers to enjoy the management benefits of a highly sophisticated, integrated security solution without the crushing up-front labor and capital costs. “What’s more, now medium and even smaller-size integrator partners have access to this technology as part of their market offer,” said Kushner, “Our intergrators can comfortably, competently do the installation while reaping the benefits of growing their RMR business.”

HID Global’s New Indoor Positioning Services for Workforce Optimization The latest software innovation does not stop at the powerful feature set of pushing notification to a user’s cell phone, or that customers can use their cell phone as their credential, or even that it enables total remote system administration from a mobile device. 3xLOGIC has broken new ground by making this video and access control solution the easiest to install in the industry. There are no wires from the access control system to the video system, all data exchange is through the software. Total ease of installation has been achieved by developing an automated, cloud-based programing tool, so one simply scans a QR code from a smartphone and installation is virtually complete! This new integrated solution removes the expensive technical labor from the equation of installing commercial integrated video access control security. “The small business market is totally untapped for integrated video and managed access control,” Kushner continued, “Until recently, the cost for a commercial grade, integrated solution was out of reach for the majority of small businesses and even medium-sized businesses.” For the SMB market, integrated video and access was out

H

ID Global received the Most Valuable Product (MVP) award from Security Sales & Integration (SSI) magazine for its new HID Location Services solution that was unveiled at ISC West 2017. The company’s new solution for workforce optimization provides organizations visibility into the location of their workforce in a facility, making it possible to analyze room usage for better building management and increased operational efficiency. The offering was acknowledged as the top commercial access control solution in the MVP award’s Access Control category. “We are honored that HID Location Services has been recognized for its leading workforce optimization capabilities that deliver deeper analytics around the movement of personnel in buildings to optimize facility usage, plus address a number of customer security challenges,” said Harm Radstaak, Vice President and Managing Director, Physical Access Control Solutions with HID Global, “Our new solution goes beyond typical indoor positioning service offerings to provide robust location services that are easy to deploy and manage, while also enabling organizations to incorporate a broad range of additional security and building management capabilities in the future.” HID Location Services is enabled by Bluvision, a com-

SecurityLink India ■ 1 May 2017

CMYK

73


CMYK

National Roundup

International Security Conference & Expo 2017 pany recently acquired by HID. The solution includes a cloud service, portals and Bluetooth beacons in the form of HID smart cards, providing a one-card solution for both indoor positioning services and physical access control. Future use cases can extend beyond workforce optimization to include building automation capabilities, and features that increase security to facilitate life safety management and compliance.

upgrade certain legacy products to benefit from this exciting new technology. Avigilon Corporation provides trusted security solutions to the global market. Avigilon designs, develops, and manufactures video analytics, network video management software and hardware, surveillance cameras, and access control solutions.

Avigilon Previews the Future of its Self-Learning Video Analytics

Pelco Drives Analytics Innovation with VideoXpert™ Integrations

Avigilon unusual motion detection technology marks the next evolution in video analytics capability

A

vigilon Corporation previewed the new Avigilon Unusual Motion Detection (UMD) video analytics technology at ISC West 2017, Sands Expo and Convention Center booth 22043, in Las Vegas, USA, from April 5 to 7, 2017. UMD is an advanced artificial intelligence (AI) technology that brings a new level of automation to surveillance. This technology is designed to continuously learn what typical activity in the scene looks like and focus the operator’s attention on atypical events needing further investigation. By continuously learning, UMD is able to automatically detect unusual events, such as a vehicle moving in the wrong direction on a road, or a crowd running in panic in a public space. This technology enables users to quickly search through volumes of recorded footage with ease, revealing events that might have otherwise been missed. “A critical mass has been reached in the volume of video data captured today and the limits of human attention,” said Dr. Mahesh Saptharishi, Avigilon’s Chief Technology Officer, “Through the power of AI, we continue to develop technology that better focuses human attention to what matters most in order to dramatically increase the effectiveness of security systems.” This technology is designed for Avigilon’s complete line of video analytics solutions. Existing customers will be able to 74

P

elco by Schneider Electric has announced plans to form strategic alliances with industry analytics providers to expand VideoXpert™ video management system (VMS) capabilities. These integrations, several of which were highlighted at ISC West 2017 will enable Pelco to further enhance the value they deliver to the video security market by offering solutions incorporating exceptional analytics capabilities to provide actionable information and insights enabling proactive risk mitigation. “Our objective is to collaborate with industry analytics providers to leverage their expertise to create unique solutions that address global needs and opportunities in video security,” said Diane Feliciano, VP, Global Marketing, Pelco by Schneider Electric, “This initiative is in line with our corporate mission to deliver solutions that solve problems for our customers through meaningful innovation.” VideoXpert, Pelco’s leading video management system, is designed on an open platform to enable extensible functionality and maximum flexibility. Through partner integrations, not only will users of VideoXpert benefit from the platform’s exceptional user experience, they will also experience added value with video analytics capabilities to redefine the way in which video data is analyzed and leveraged. By unifying operational and security data over system video, and all via a single user interface, Pelco delivers integrated solutions that are unmatched in the industry. Key verticals targeted through these integrations include

SecurityLink India ■ 1 May 2017

CMYK


CMYK

National Roundup

International Security Conference & Expo 2017 city surveillance and airports. In both verticals and any application where public safety is a concern, the ability to locate and monitor a subject quickly and accurately, requires intelligent video analytic capabilities to make actionable decisions. With partner video analytics, users can enhance their investigative capabilities by leveraging video made available by Pelco’s VideoXpert VMS. By combining the expertise of Pelco and partner analytics providers, Pelco is bringing new features and solutions to the video security market around the world.

‘CyberVigilant™ Cyber Security Product

I

ndigoVision, showcased their upcoming ‘CyberVigilant™’ cyber security product at ISC West 2017. Birds, fish, even people, move in predictable patterns. After 21 years in IP surveillance experience IndigoVision knows that data also flows in predictable ways. By monitoring that flow, IndigoVision’s CyberVigilant™ technology, working with Control Center, detects hacking or performance-affecting anomalies and helps keep your data safe. “CyberVigilant™ is the latest innovative product in IndigoVision’s extensive security portfolio,” says Marcus Kneen, IndigoVision’s CEO, “By applying our expert knowledge to your existing system, CyberVigilant™ provides a tailored solution to monitor your system and protect you from hackers.”

StorNext Honored with SIA NPS and Govies Awards Industry awards highlight increased importance of storage for video surveillance

Q

uantum Corp. and its StorNext® data management software won top honors for the video surveillance data storage categories in two prestigious awards at the ISC West 2017

Conference in Las Vegas. StorNext was recognized by the Security Industry Association (SIA) as category winner in the New Product Showcase (NPS). In addition, StorNext also received the Platinum Govies Government Security award given by Security Today magazine. Sponsored by the Security Industry Association, the annual SIA NPS is one of the top accolades for product innovation in the security industry. A panel of judges evaluated StorNext 5.4 and determined the data management software was the best new data storage product offering for video surveillance. Security Today magazine and securitytoday.com announced the 2017 Platinum and Gold winners in The Govies Government Security Awards competition. The awards honor outstanding government security products in a variety of categories. An independent panel of judges from the security industry selected the top entries in the 2017 categories and named them winners using criteria including features, innovation, user friendliness, interoperability, quality, design, market opportunity, impact on the security industry, technical advances, and scalability.

StorNext innovation

S

torNext provides a unique combination of industry-leading performance, low-cost capacity and ready access for managing unstructured data. Enhancements in StorNext 5.4 include FlexTier™, which integrates existing public cloud storage accounts and third-party object storage – starting with Amazon Web Services (AWS), Microsoft Azure, Google Cloud, NetApp StorageGRID, IBM Cleversafe and Scality RING – as tiers in a StorNext-unified name space. It also provides embedded application deployment in StorNext appliances, leveraging industry-standard virtualization for simple integration with VMS and analytic applications, as well as data management and sharing applications.

Increasing industry accolades

Q

uantum is increasingly being recognized by video surveillance partners and industry publications alike for demonstrating technology innovation: ● Axis Communications, the market leader in network video,

SecurityLink India ■ 1 May 2017

CMYK

75


CMYK

National Roundup

International Security Conference & Expo 2017 named Quantum 2016 Technology Partner of the Year at its 11th annual Axis Connect and Converge Conference. ● Milestone Systems, the industry-leading VMS vendor, honored Quantum with its Technology Partner of the Year award for 2016 at this year’s MIPS Americas Conference, and named Quantum Best Milestone Solution Partner for 2016 in the Asia Pacific region. ● American Security Today magazine recently awarded Quantum the platinum 2016 ‘ASTORS’ Homeland Security Award for best video data storage solution. The award recognizes outstanding product development achievements and new technologies to address growing homeland security threats.

IDIS Celebrates 20 Years

With industry briefing and champagne reception honoring partners, customers, and security media

S

outh Korea’s largest video surveillance manufacturer celebrates Two Decades of Innovation with attendees and honorees during IDIS’s third appearance at ISC West in Las Vegas At the close of the second day at ISC West 2017 in Las Vegas, Nevada, global surveillance manufacturer IDIS recognized both customers and media partners by presenting awards at its booth #18059 during a press briefing in celebration of its two decades of surveillance innovation. After opening the event with a brief history of the growth of IDIS over the last 20 years, a Q&A panel on the new solutions showcased by IDIS at ISC West, and recognition of security media, Dr. Albert Ryu, President of IDIS, recognized the indispensable partners and customers that have made two decades of IDIS success possible, including new key relationships cultivated since the launch of IDIS America in 2015. Recognizing these past, present and continued partnerships, Ryu presented partner awards to IDIS customers including: SARC Monitoring: Surveillance Acquisition Response 76

Center (SARC) Monitoring is an emergent pioneer of the virtual guarding space, and leverages the specialized expertise of hand-selected former law enforcement, military, and intelligence professionals. IDIS and SARC have partnered to deliver a virtual guarding solution in a fully reimagined way to customers and provides a solution able to work in close coordination with local law enforcement agencies to prevent and address security incidents proactively and interactively from an offsite, central location. SARC has completed multiple IDIS installations at various commercial and government facilities, and their innovative solutions have yielded immediate benefits to end-users. INET Security: INET Security is a full-service security solutions provider with innovative product lines in video, access control, intrusion detection, infant security, asset tracking, and loss prevention. Their specialized live-monitoring and intrusion deterrent services are a perfect match for intuitive and powerful IDIS technology, and have been utilized to great effect by municipal governments at installations requiring 24/7 monitoring and constant threat deterrence. Kratos Public Safety & Security Solutions: Kratos approaches security system integrations with a client-first mentality, and their specialization in converged security and IT services ensures that both the current and emerging needs of end-users are met as their businesses grow. Kratos has helped IDIS America grow locally in the area surrounding their regional headquarters in Texas, partnering to provide an end-toend total solution to more than 25 local retail locations, con-

SecurityLink India ■ 1 May 2017

CMYK


CMYK

National Roundup

International Security Conference & Expo 2017 sisting of 10+ NVRs and 75+ cameras total. GardaWorld: With over 62,000 staff globally, GardaWorld is one of the largest privately-owned security companies in the world, processing currency for an entire continent and protecting both assets and people on a daily basis. GardaWorld chose to partner with IDIS to upgrade their legacy video surveillance solution across their 250+ sites, requiring the installation of over 700 IDIS cameras and the establishment of two major central monitoring facilities powered by the powerful and intuitive video management software (VMS) solutions IDIS DirectCX and IDIS Solution Suite.

NetWay™ Spectrum Fiber Solutions

New line of switches and media converters deliver fiber and power

A

ltronix, the recognized leader in power and transmission solutions for the professional security industry, introduces its NetWay™ Spectrum Series of advanced hardened PoE switches and Ethernet over fiber media converters at ISC West. This new NetWay Spectrum Series delivers greater flexibility and integration for systems deploying fiber optic cabling. “Adaptive transmission technologies continue to support the growth of IP video and access systems,” said Alan Forman, President, Altronix Corporation, “Our new NetWay Spectrum Series provides the versatility to support fiber or copper infrastructure.” NetWay Spectrum Series hardened PoE switches and Ethernet over fiber media converters accommodate

single or multi-mode fiber, as well as composite cable, which combines fiber with copper to simultaneously deliver low-voltage power and data at distances up to a mile. The new NetWay Spectrum Series includes rack mount media converters for head-end installation, as well as a wide range of indoor and outdoor models with single or multiple SFP Ports for remote deployment and embedded LINQ™ Network Communications Technology for remote monitoring, control and reporting of power/ diagnostics from anywhere over the network.

Safeguarding People and Places in a Mobile World Brands showcase latest in mobile solutions

M

obile devices are changing how people access hotel rooms, office buildings and even their homes. At the forefront of the movement to make security products more accessible on the go, brands like Lenel and Interlogix are delivering innovative mobile solutions that add to end-user convenience, safety and security. Both brands, alongside Supra and Onity, showcase these offerings at ISC West 2017. Lenel, Interlogix, Supra and Onity are part of UTC Climate, Controls & Security, a unit of United Technologies Corp. “We are continually looking to deliver innovative products based on key trends we see in the industry,” said Jurgen Timperman, President, Global Security Products, UTC Climate, Controls & Security. “We are moving from protecting people within four walls to protecting people wherever they are, as well as responding to the growing need for users to have real-time access to their systems through their smart devices.” For almost two decades, UTC brands have provided cutting edge, cloud-based solutions for keyless access. In real estate alone, the Supra business has an installed base of more than 2 million Bluetooth keyboxes in North America. In hospitality, Onity’s DirectKey™ technology is deployed at thousands of hotel rooms. The cloud-based system allows

SecurityLink India ■ 1 May 2017

CMYK

77


CMYK

National Roundup

International Security Conference & Expo 2017 hotel guests to bypass the front desk by securely downloading their room keys to their smartphones. The mobile key credentials along with Bluetooth hardware modules in door locks provide easy, secure access to the guest room and other accesscontrolled areas on the hotel property. “Now we’re taking our mobile technology across the portfolio,” said Ron Virden, Managing Director, Global Access Solutions, UTC Climate, Controls & Security, “With the recently introduced BlueDiamond™ mobile credentials and readers for Lenel systems, we can provide customers mobile credentialing for enterprise-wide commercial applications.” Integrated into the OnGuard® 7.3 platform, the new BlueDiamond mobile ecosystem is a complete cloud-based service with a smartphone app and Bluetooth readers. Credentials are activated by e-mail and the smartphone app detects the readers when nearby while the access control system authorizes or denies entry based on current access rights. An add-on version of the reader can provide Bluetooth capability to most existing readers. “Smartphones reduce the need for employee access cards, diminishing the cost and security concerns that go along with plastic badges,” Virden said, “They also provide an added layer of identification when device PIN codes or biometric verification are enabled.” And, rather than use a dedicated badging station equipped with a computer, camera and card printer, the new OnGuard credentials module allows administrators to onboard a new employee, take their photo, and issue a mobile credential to their phone – all from a tablet while being out of their office. “We’re taking mobile solutions even one step further by aligning with Everbridge and AlertEnterprise to offer a total on-premise and off-premise security solution – protecting people wherever they are, and whatever situation they are in,” said Virden. Other ways the company is offering convenience to consumers is through its latest smart home offerings. The UltraSync™ SmartHome system from Interlogix allows homeowners to lock and unlock doors, arm and disarm a security system, control lights, thermostats and appliances or view live and recorded video – all from their smart device. 78

“Our mobile technology is expanding the ways professionals interact with and protect their smart buildings; and the way families control and secure their smart homes,” said Timperman, “It’s part of our constant dedication to innovate and make the world a safer and more convenient place to live.”

OnPremises Automated Data Verification Solution

V

iakoo showcased their new OnPremises solution for organizations with policies that restrict use of cloud-based solutions. Like the Viakoo solution for the Cloud, OnPremises minimizes surveillance and security system downtime to ensure that actionable data is captured and retained properly. OnPremises also provides current Viakoo customers with an additional way to scale the company’s innovative automated data verification solution across their organizations. “Viakoo OnPremises gives customers the same capabilities as our flagship cloud offering to eliminate physical security risks, and provides organizations with policies or compliance stipulations that require applications to reside behind their firewalls,” said Viakoo, CEO, BudBroomhead, “We developed OnPremises incorporating input from our customers, and we’re pleased that leading organizations like SanDisk Western Digital and Oracle have already deployed it with great success.” Internal policies, compliance and industry regulations require some organizations to do all computations within their own data centers. Viakoo OnPremises delivers enterprise-wide physical security verification that adheres to these requirements while providing easy deployment, increased reliability, and high scalability. Like Viakoo’s award-winning and patented Cloud solution – field-proven at scores of organizations with over 100 million hours of surveillance – Viakoo OnPremises runs advanced system analytics to provide early problem detection, scientific diagnosis, and recommended courses of action to ensure that surveillance and access control system operations are fully

SecurityLink India ■ 1 May 2017

CMYK


CMYK

National Roundup

International Security Conference & Expo 2017 documented and in continuous compliance. Viakoo OnPremises can be accessed remotely by authorized personnel. As with Viakoo’s cloud offering, three versions (Proactive, Preemptive, and Predictive) are available for On-Premises deployment. Combined with Viakoo’s experienced technical support team, this gives Viakoo customers all the resources they need to effectively detect, diagnose and solve surveillance and access control system issues from anywhere 24/7.

TruVision® Navigator 7 Expands Capabilities to Offer Complete Security System Management

I

nterlogix, a global leader in security and life-safety solutions, introduces TruVision® Navigator 7, the latest release of its popular video management software. TruVision Navigator 7 now works seamlessly with Interlogix TruPortal® access control systems and IFS® network switches – allowing end users to manage their entire security system from one single, easy-to-use interface. Interlogix is part of UTC Climate, Controls & Security, a unit of United Technologies Corp. With the new TruVision Navigator 7, users can configure and manage multiple TruPortal access control panels from Interlogix, add panel and door locations to a built-in interactive map and link cameras to doors to receive event notifications with live pop-up video verification. The new software also offers a built-in IFS network switch discovery service that provides switch login and configuration through its native web client. “TruVision Navigator 7 is now more than just video management – it’s a complete, connected security system with cameras, recorders, network switches, and access control functionality,” said Michael Chiavacci, general manager, Interlogix, U.S. and Canada. “We’re continuing to invest in more tightly connected solutions that add increased value, convenience and functionality for our customers.” Other new advanced video features in TruVision Naviga-

tor 7 include: ● The ability to drag and drop websites for native viewing and navigating in the viewer panel ● Real-time device bandwidth monitoring ● Logical device views and filtering that provides smart event management ● Continued operation in a client-server configuration when the server is offline TruVision Navigator 7 can continue to be used as a powerful VMS. It offers recording of 360-degree cameras by dewarping the images natively within the software; customizable viewing panes that can be saved for one-click retrieval; remote device configuration capabilities and system health monitoring service that can reduce costly on-site maintenance service calls. Integrated with TruPortal, the system can provide a fullyfeatured, web-based access control solution, scalable to secure up to 64 doors. And, with the ability to seamlessly add the full range of IFS high-performance networking switches users will be able to meet the needs of many demanding security environments. “This integration equips our customers with a powerful centralized security solution that’s perfect for mid-sized commercial applications and small campus environments,” said Chiavacci.

PSIM Solutions to Improve Security, Optimize Operations and Reduce Costs Innovative Immix CC platform delivers more integrations, easy deployment and simple operation

A

t ISC West 2017, SureView Systems, a global provider of command center solutions, brings a unique perspective to the development, deployment and management of fully integrated system solutions for Security Operations Centers

SecurityLink India ■ 1 May 2017

CMYK

79


CMYK

National Roundup

International Security Conference & Expo 2017 (SOC). With nearly 20 years of experience in the development of solutions for commercial central stations and enterprise security operations centers (SOC), SureView’s Physical Security Information Management (PSIM) solution is designed to provide customers with the one view that matters most – the one they need to better respond to security events and manage risks.

Immix CC makes the security monitoring process easy and convenient for users while maximizing efficiency and ROI. With deployments at such high profile companies as Paramount Pictures, Sanofi, Cox Communications and AIG, as well as numerous small to medium-sized companies around the globe, Immix CC is a proven PSIM solution with unique attributes.

RightCrowd Essentials The culmination of SureView’s efforts is evident in the latest release of the company’s innovative Immix Command Center (CC) PSIM platform. Immix CC simplifies control and management of all critical surveillance and security systems on a unified platform. Hallmarks of Immix CC include a simple-to-operate User Interface (UI), the largest library of technology integrations in the industry, and unique modular, web-based architecture that provides unparalleled flexibility. “Security professionals are increasingly deploying multiple security, business and risk systems to protect the people, assets and brand of the enterprise,” said Sean Garcia, Director, Enterprise Command Centers, SureView Systems, “The problem is, the vast majority of these systems do not speak to one another, and the problem only gets worse as more systems are added. We focus on simplifying operations in the SOC by bringing together these islands of technology into one operational view. Our PSIM platform, Immix CC, is the culmination of this focus. It addresses the need for an easy-to-use system that is quick to deploy, with the flexibility to adapt to the changing needs of enterprise organizations.” Immix CC PSIM correlates data from disparate surveillance, access control, security, building management and business systems on a unified platform, and automatically initiates actions and workflows based on events from all of these sources. This provides security personnel with the vital data and direction they need to take swift and comprehensive action. 80

Wins Top Honor in SIA NPS Awards Award marks second major accolade for RightCrowd’s technology innovation

R

ightCrowd’s Essentials product was honoured with the Best New Product Award in the Convergence and Integrated Software and Solutions category of the 2017 SIA New Product Showcase (NPS), awarded at ISC West. The RightCrowd Essentials solution was recognized for its innovative approach to enhancing physical access control systems and delivering powerful enterprise-class workflow and compliance features to small and medium business customers. The 2017 SIA NPS award recognition, one of the top industry accolades for product innovation, represents the second such honour for RightCrowd Essentials within the past year. In September, RightCrowd was awarded the 2016 Security Best Award as part of the ASIS Accolades Award, another industryleading awards program that recognizes the security industry’s most innovative products, services and solutions. “RightCrowd is very proud of the continued recognition from the security community of RightCrowd Essentials, which supports and automates business processes to deliver increased efficiency and productivity to the small to medium business market,” said Peter Hill, CEO of RightCrowd, “By leveraging information from existing access control and business systems, it has been designed to deliver the key benefits many customers seek to significantly improve safety, security, and compliance within their business.” RightCrowd Essentials allows customers to take full ad-

SecurityLink India ■ 1 May 2017

CMYK


CMYK

National Roundup

International Security Conference & Expo 2017 vantage of RightCrowd’s years of experience, simplifying the deployment of the software while automating and standardizing people processes to improve productivity. “RightCrowd Essentials contains a powerful subset of features and workflows to drive security efficiencies for small and medium businesses that were not viable before, and we acknowledge organizations such as Microsoft Global Security, who have led the way in security management best practices,” Hill said. RightCrowd is partnering to establish an expanded integrator channel to deliver and implement RightCrowd Essentials. Companies such as Convergint Technologies deliver and integrate the solution quickly and efficiently for corporations seeking to increase efficiencies and drive real-time automation.

Lenel, Everbridge Announce Strategic Alliance

To protect, communicate with people wherever they are

L

enel and Everbridge, Inc. have announced an alliance to interface their leading solutions. With the combination of Lenel’s OnGuard® platform and Everbridge’s Safety Connection® software, organizations will now be able to offer comprehensive security management on-premises and off-premises – to help protect and notify employees, contractors or visitors during critical incidents regardless of their location. With the Everbridge interface, system users can now aggregate data about severe weather, terrorism and other incidents and use last-known location data to locate potentially at-risk individuals and nearby first responders and enable two-way communication. The alliance will provide users with a more powerful solution to deliver critical communications, including real-time assessment and notification of important safety information. Safety Connection’s ability to actively collect, assess and respond to events from OnGuard and external data inputs pro-

vides users with a real global view of their environment and potential threats to their workforce. “The interface of the Everbridge Safety Connection software with the OnGuard system provides a unique opportunity for our customers – a 360-degree solution,” says Ron Virden, Managing Director, Global Access Solutions, Lenel, “As Lenel continues to enhance its value proposition from an on-premises platform to a complete, mobile security solution, Safety Connection plays a critical role. With the increasing complexity and frequency of global threats, it is no longer adequate to just look at doors and video within the enterprise. Lenel can now deliver a solution that helps protect people wherever they actually are.” Everbridge’s Safety Connection collects multiple data inputs. These include severe environmental conditions, terrorism and other threat intelligence feeds and incident reports. The system then locates people and responders and enables two-way communication so security teams can provide instructions to and confirm if people are safe or need help. Its certified interface to the OnGuard system enables Safety Connection users to acquire last-known-location data to aid in locating employees, contractors or visitors during critical incidents. Safety Connection can synthesize data from company wired and wireless network access points, travel itineraries, home and office location records, and check-ins through its mobile application to take a multi-pronged approach to locating people. The solution also offers panic button functionality through a mobile application that employees can use to send a geo-tagged SOS message to their security team when they are in distress. “With an increasingly mobile workforce, distributed teams and large campuses, organizations cannot rely on physical and perimeter security alone to keep people safe,” says Jaime Ellertson, CEO of Everbridge, “The Lenel and Everbridge alliance showcases our commitment to transforming the traditional paradigm of physical security – by enabling customers to locate and assist people wherever they are – whether that is on or off the premises.” Everbridge Safety Connection is available now through Lenel value added resellers worldwide.

SecurityLink India ■ 1 May 2017

CMYK

81


CMYK

feature

Five Reasons to Move Your IIoT Platform to the Cloud By Jimmy Chen – Field Application Engineer, Moxa

T

he Industrial IoT (IIoT) has created a wave of big data that is coming in at an unprecedented rate and volume that most business operators are not equipped to handle. To add to the complexity, the information collected from the multitude of devices and sensors, deployed in every conceivable sphere of operation, also comes in a variety of different data formats. To gain meaningful insights into this huge volume of data and derive useful information that can help business operators make the right decisions, this data needs to be securely stored, analyzed, and integrated with back-end business applications. Considering that most industrial operators are not data scientists and do not have the in-house expertise to store and analyze big data, these tasks are best left to data experts. In this regard, cloud based IIoT solutions have gained considerable ground by providing data solutions that are scalable, secure, and cost-effective. In addition, their ability to integrate devices with computing infrastructure, development platforms, and business applications in the cloud, has redefined the IIoT. Many companies are turning to the cloud to mine their IIoT data so that they can derive useful insights into their business operations. In this article, 82

we discuss five reasons why you should consider moving your IIoT platform to the cloud.

Faster time to market

D

eploying an IIoT solution is not an easy task. For most companies, an IIoT deployment involves upgrading their network infrastructure to accommodate the steep rise in data traffic, acquiring and deploying new devices and sensors, creating new databases, integrating the new systems with the existing infrastructure, and building data management and analysis capabilities. This could result in high costs and is a huge drain on the company infrastructure. Adopting cloud-based IIoT solutions helps you get your IIoT up and running at a faster pace, with better resource utilization, and a much lower cost compared to on-premise deployments.

Data mobility

C

loud storage solutions provide data mobility to your IIoT devices and applications. Data stored in a cloud server can be accessed from anywhere and is free from the infrastructural constraints of private clouds, which means you get fast access to your data when you need it. Storing data in the cloud also makes SecurityLink India â– 1 May 2017

CMYK

it easy to use cloud-based tools to carry out predictive analysis of your IIoT data to facilitate your business decision making process.

Scalability

A

dopting a cloud-based IIoT solution frees you from the constraints of an on-premise IIoT deployment. You no longer have to maintain complex network infrastructure, development platforms, and applications that are usually required to process IIoT data. Cloud-based solutions are available in a convenient pay-per-use model with services such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Applications as a Service, making it easy to develop the IIoT applications that you need. You can also benefit from the collective expertise of data scientists and business analytics experts who are usually involved in developing these solutions.

Integration

M

ost cloud-based solutions provide easy integration of your IIoT devices with your back-end applications such as enterprise software. This is a huge load off your back as you no longer have to worry about integrating


CMYK

feature

your IIoT devices with your enterprise applications and systems. A good cloudbased IIoT solution lets you connect your devices and sensors to powerful data acquisition and analytics applications in the cloud, which in turn, can process your data and make it available to your back-end enterprise system in the format that they require.

Big data and advanced analytics

M

oving your IIoT platform to the cloud is the first step towards developing big data and advanced data analytics capabilities in your system. Cloudbased solutions are optimized for storing large volumes of data and can make the data available to your enterprise applications with minimum latency. You can also deploy advanced analytics tools available in the cloud to process your IIoT data to derive value from your data that can help you increase operation efficiency, reduce costs, improve your products, and serve your customers better.

Moxa can accelerate your move to the cloud

M

oxa’s ThingsPro™ Suite simplifies the development of IIoT applications and facilitates data acquisition as well as remote device management. ThingsPro provides Modbus communication, data acquisition, wireless networking, and device management capabilities in a few simple steps, allowing users to focus on developing applications. For integration with cloud-based solutions, ThingsPro provides interfaces to popular cloud solutions such as AWS IoT and Azure IoT. You can also use the ThingsPro Server to set up your own cloud and to manage data-acquisition gateways and devices deployed at your field sites.

Making the Cloud Work for You Understanding how cloud access control systems can lead to new business opportunities

T

he business model for today’s access control channel partners is continually evolving to accommodate technology advancements and to meet changes in the ways customers buy and use the technology. Integrators are finding success selling and delivering more complex solutions that have the potential to position them as a trusted partner. Many access control providers have already transitioned their businesses from product sales to offering service contracts which provide a basis for value-added opportunities and subsequent recurring revenue streams. They’ve learned to speak the language of today’s business by focusing more on process and outcome and less on technical specs. The value proposition becomes even more attractive for the integrator when the subject of access control as a service (ACaaS) is introduced. These services present significant opportunities for integrators looking to grow their business with high value service offerings that target access control challenges. Potential applications for ACaaS SecurityLink India ■ 1 May 2017

CMYK

are seemingly unlimited given the ease with which cloud-based access control systems can scale, making them appropriate for practically any size customer and application. The flexibility and scalability of these systems allow users to specify the level of control they need now and easily add doors later as needed, ensuring that the system can keep pace with an enterprise’s growth as well. Fortunately, adding cloud-based services to the integrator’s portfolio does not require a monumental shift in offerings. Beyond the conventional onsite user-managed system, the addition of a user-managed cloud-based system and a remote managed cloud-based system will cover most applications and requirements.

On-site user-managed system

I

n this scenario, the customer purchases (or leases) the equipment from an authorized re-seller/ integrator who installs the system and provides training. A service/ maintenance contract may be included in the sale/ lease. 83


CMYK

feature

The value proposition becomes even more attractive for the integrator when the subject of access control as a service (ACaaS) is introduced. These services present significant opportunities for integrators looking to grow their business with high value service offerings that target access control challenges. The customer is responsible for all programming activity on the dedicated PC including entering/ deleting/ modifying names, scheduling, reports, backup and software updates. Depending on the system, badging may also be included. Other than the install and training and any service/ maintenance agreement, the re-seller/ integrator has no additional responsibility.

Cloud-based usermanaged system

S

imilar to the on-site user-managed scenario, the equipment is purchased or leased from an authorized re-seller/ integrator who installs the hardware and provides training. The difference between this application and the previous one is that the software is in the cloud, and is managed, along with the supporting infrastructure, by the integrator or service provider. All backup, software upgrades, system monitoring, programming, scheduled door locking and unlocking and other vital access control actions are performed remotely by professional monitoring providers on a 24/7 basis. The user often only manages the simple day-to-day functions of entering/ deleting/ modifying names, and sometimes badging, through a web portal. These types of systems work well 84

for sites with little or no IT staff such as franchise locations or property management sites. Each location can handle the day to day functions of entering/ deleting/ modifying names and scheduling via a web portal but reports, applying patches and updates, backup and other group functions are handled in the cloud by the integrator. A definite advantage of this scenario is that the browser application can be accessed at any time and from any device by the user.

Cloud-based remotemanaged system

tering/ partitioning allows the end user to access only their information (cardholders, access groups, hardware etc) while the service provider can have full access to all customers. To deliver a strong, effective and efficient cloud-based access control solution, integrators should partner with best-in-class providers who offer the solutions and services that make up a robust, fully-functional system. Open platforms that enable seamless integration between door hardware, access readers, software and other system components allow dealers and integrators to utilize best-in-breed solutions from providers who specialize and excel in their specific areas, and who can focus on what they do best rather than trying to provide the full end-to-end solution themselves. Best of all, by working with trusted partners to deploy, administer and maintain systems, end users can devote their time and energy to their core business and operations.

T

he user has little or no access to the head-end software in this scenario and all activity is performed by the service provider. This service is popular with enterprise level organizations. Hardware can be new from the integrator or existing, owned or leased. When modifications are required, the service provider is notified to make the changes and reports can be run and sent to the end user on a scheduled or as-requested basis. Credentialing (badging) is also handled by the service provider. A single service provider may host access control systems for numerous organizations in the cloud; in these situations the security of the data is ensured with AES encryption. Multi-layered filSecurityLink India â– 1 May 2017

CMYK

Authored by Robert Laughlin President, Galaxy Control Systems


CMYK

International Updates

INTERPOL World 2017 Congress & Exhibition

To lead industry dialogue for a unified approach to combat future crime

I

NTERPOL World 2017 is set to bring law enforcement agencies, government bodies, academia, security professionals and solution providers together over three days of networking and information exchange this July. The global exhibition and congress aim to stimulate collaborations between stakeholders to address crimes in the future.

The INTERPOL World 2017 Congress

T

his year the Congress will see a brand-new conference structure to give attendees a more guided experience with an end-to-end approach. Featuring over 40 speakers across the public and private sectors, it will address pressing concerns via three dedicated tracks –

Cybercrime (4 July), Safe Cities (5 July) and Identity Management (6 July). All three days will begin with a macro dialogue to highlight the spectrum of future security challenges. This will be followed by a segment covering strategic perspectives from practitioners, researchers and academia, who will cast light on technologies that are available to address the security challenges. The days will end with insightful case studies featuring real-life applications and results that some organizations have achieved in different parts of the world. Participants at the Congress will hear from leading security solutions providers such as Kaspersky Lab, Microsoft, NEC, Securiport and SICPA, as

well as thought leaders from police departments and various security research institutions.

The INTERPOL World 2017 Exhibition

W

hile the second edition of the INTERPOL World 2017 Congress will take place from 4 to 6 July 2017, the trade exhibition will take place from 5 to 7 July 2017. The exhibition will feature international manufacturers and solutions providers presenting their latest cutting-edge technologies across cybersecurity, public safety, biometrics, identity solutions, forensics and investigations and many more to over 10,000 security professionals and buyers from both public and private sectors.

Eminent Speakers ● Arthur Holland Michel, Co-Director, Center for the Study of the Drone, Bard College ● Cheri McGuire, Chief Information Security Officer (CISO), Standard Chartered ● Dr Donato Colucci, Senior Regional Immigration and Border Management Specialist, International Organization for Migration (IOM) ● Jim Pitkow, Chair Technical Task Force, Thorn ● Michael Hershman, Group CEO, International Centre for Sport Security (ICSS) ● Nils Andersen-Röed, Operational Specialist/ Project Leader Darkweb Team, Dutch National Police ● Rob Leslie, Chief Executive Officer, Sedicii Innovations Limited (World Economic Forum’s 2015 Technology Pioneer) SecurityLink India ■ 1 May 2017

CMYK

85


CMYK

International Updates

Dahua and Intel Jointly Release New Industrial Camera and Present Blueprint for the Machine Vision Industry

D

ahua Technology and Intel have recently held a joint product launch themed ‘Quality drives Leadership; Innovation builds Value’ at Kerry Hotel in Pudong, Shanghai, to showcase Dahua Technology’s latest research and development output: the 50MP large array camera, Movidius AI powered smart industrial camera, a full range of Sony IMX industrial cameras, and other new products. Vice President of Dahua Technology; Zhang Xingming, Deputy General Manager of Dahua Machine Vision; Li Ming, Marketing Manager of Intel; Xie Qingshan, Secretary General of China Machine Vision Union; and Yu Xiaojuan and other partners were present at the launch. Zhang Xingming stated that Dahua Machine Vision, inheriting Dahua’s decades of experience in image processing technology, is supported by Dahua’s R&D center, Dahua Advanced

Vice President of Dahua Technology, Zhang Xingming giving a speech

86

Technology Research Institute and Big Data Research Institute. In terms of ISP, software, algorithms, hardware, architecture, ALT testing and other areas, Dahua Machine Vision has some core competitive advantages. In the current stage of Industry 4.0 that is just about to take off, Dahua Technology set a very clear target: to become Marketing Manager of Intel, a high quality supplier of core Xie Qingshan giving a speech parts for machine vision and to develop together with partners in the industry. 50MP large array Marketing Manager of Intel, Xie camera Qingshan said, “Market transformations his camera is the world’s first 50MP under the ‘Internet+’ strategy represents large array industrial camera. It a spirit of openness, cross-boundary fu- uses the CoaXPress interface, and has sion, and compatibility. This is what Intel a maximum bandwidth of 25G. Under has always advocated, and this is espe- an ultra-high definition of 7920x6004 it cially prominent in the field of machine supports up to 30fps. With delicate imvision.” He said that Dahua has over ten age quality and sharp details, it can be years of experience in global security in- applied in the fields of visual inspection, dustry, and that Dahua Machine Vision semiconductors, PCB, LCD screens, has unlimited development potential for glass covers, and so on. the future. Intel is very optimistic about the partnership with Dahua Technology and hopes to maintain a long-term in depth partnership. In the session of product release, Li Ming, Deputy General Manager of Dahua Machine Vision, explained in detail the technical specifications of the software, algorithm, hardware, architecture of the 50MP large array industrial camera. He also delved into the new Movidius AI powered smart industrial camera Deputy General Manager of Dahua and the full range of Sony IMX indusMachine Vision, Li Ming introducing the new products trial cameras.

T

SecurityLink India ■ 1 May 2017

CMYK


CMYK

International Updates

Movidius AI powered smart industrial camera

M

ovidius AI powered smart industrial camera: Powered by the latest generation Myriad2 vision processing unit from Movidius (acquired by Intel in 2016), it greatly increases processing power, while significantly reduces power consumption. Furthermore, the cameras have reading/ stabilization/ matching/ measurement/ OCR algorithms embedded within and can be used in a wide range of industrial applications.

Full range of Sony IMX industrial cameras

S

ony IMX industrial cameras use the latest generation IMX series global shutter CMOS sensors from Sony. Resolution covers 2MP, 3MP, 5MP, 6MP,

12MP, and more. With outstandingly low noise, wide dynamic performance, superb craftsmanship, ultra-high sensitivity, along with Dahua Technology’s powerful ISP algorithm, Sony’s IMX array industrial cameras will have a great impact on quality in the machine vision industry. At the outset of 2017, Dahua Technology will keep in mind its new mis-

sion of ‘Turning Vision into Productivity,’ continue to increase technological innovation so as to provide more comprehensive world-class products and services to its customers globally. Dahua Technology will relentlessly release high quality products and strive to become a provider of high quality core parts for machine vision and contribute to the ‘Made in China 2025’ initiative.

Apollo Set to Showcase New Products at Firex 2017 A

pollo Fire Detectors, specialists in the design and manufacture of high quality fire detection products, is looking forward to its return to FIREX in 2017 and the opportunity to showcase its latest ranges to the industry. Visitors to this year’s three-day event, being held June 20–22 at ExCeL London, will be able to see a variety of Apollo products in action on stand G100. New for 2017, Apollo will be demonstrating its latest Visual Audio

Devices (VADs) including red flash VADs and sounder VADs which are all compatible with the XP95 and Discovery Apollo ranges. Apollo is also looking forward to introducing the new Apollo Test Set to FIREX visitors. The new portable testing kit has been introduced to help on-site commissioning and fault finding across all three Apollo analogue-addressable protocols – CoreProtocol®, Discovery and XP95. Speaking about FIREX 2017, Ed SecurityLink India ■ 1 May 2017

CMYK

Browning, EMEA Sales and Marketing Director at Apollo said, “We always look forward to meeting with our customers and partners at FIREX to discuss developments in the fire safety market and how Apollo products can address their needs. All our products are developed in close collaboration with fire safety professionals, underlining the importance we place on designing products which address technical needs in the global fire detection market.” 87


CMYK

International Updates

Is the Video Doorbell Paving the Way for Greater Adoption of Video Verification in Home Alarm Systems? By Anna Sliwon – Analyst, residential Security, IHS Markit

A

s the popularity of video doorbells increases, owners are likely to become more comfortable with video cameras in their homes. For many homeowners, a video doorbell is their first experience with an IP camera. Installing it, setting up the app and then later using it to view something remotely all help to build consumers’ familiarity with network video cameras. This raises consumer awareness and lowers privacy concerns, two of the main barriers responsible for slowing adoption of video in the home in the past. This also has the potential to lead to increasing demand for integrating video doorbells with home alarm systems. For example, if the two are combined with an electronic lock, this would allow a consumer to grant someone access to his or her home safely from anywhere with a Wi-Fi connection.

New revenue stream for installers

A

rise in the popularity of video integration with intruder alarm systems potentially creates new product development and marketing opportunities. It enables integrators and installers to upsell cameras as part of their standard offering and gives manufacturers a unique selling point to market. Cloud storage services offer another opportunity for revenue generation, which professional monitoring compa88

nies could try to integrate with their existing service offerings. Increased consumer preference for video cameras could result in less spending on traditional intrusion equipment like PIR detectors, magnetic contacts or break glass sensors. In the short-term, it seems that video cameras would be adopted as an add-on to the existing system, strengthening the abilities of the traditional equipment and the system overall. However, as video analytics continue to improve, it remains to be seen how this trend could affect demand. In 2015, 1.1 million (21 percent of) residential connected professional monitoring service contracts included some form of video monitoring service in the American region. This proportion is forecast to increase, particularly with the emergence of facial and object recognition, promising to further enhance the future functionality of video verification. This functionality offers potential savings both to consumers and providers of monitoring services through lowering false alarm rates.

Future opportunity for video doorbells Professionally installed alarm solution providers such as Vivint, Comcast and Alarm.com are adding video doorbells to their offerings. Currently, however, the typical profile for a buyer of a video doorbell (young and tech-savvy) SecurityLink India â– 1 May 2017

CMYK

is also closer to that of one who would purchase a DIY alarm system rather than a professionally installed system. It is therefore likely that in the short-term, the DIY market will feel these proposed effects first if they are to become apparent. With a global market size of $78 million in 2015, video doorbells are only just beginning to gain traction among residential consumers. Their adoption is still largely limited to the US and despite many new entrants; market supply is currently concentrated with a few larger suppliers such as Ring. As competition increases, demand will accelerate and prices will fall. However, the primary barrier today remains price. A normal, non-video-capable doorbell costs less than $20, while video doorbell costs often exceed $150. Raising consumer awareness of the benefits will be key to increasing the adoption rate. IHS Markit forecasts that the global market for video doorbells will experience a 28 percent CAGR over the next five years. As the market continues its rapid ascension, partnering with video doorbell providers could prove lucrative for home alarm manufacturers and service providers. Another option would be to work with third-party integration software providers like IFTTT and Stringify to build a clean, easy-to-use integrated solution.


CMYK

International Updates

VIVOTEK Expands Strategic H.265 Integration Partnership V

IVOTEK not only offers a wide range of H.265 surveillance products, it also aims to integrate and increase H.265 presence in partnership with the Solution Integration Alliance (SIA) partners worldwide. VIVOTEK recently announced the existence of ten H.265 integration SIA partners, including: AxxonSoft, Genetec™, Milestone, NUUO, Synology, and newly-added Cathexis, Digifort, Luxriot, Macroscop and Mirasys. Working closely with VIVOTEK’s SIA partners, customers will equip themselves with a comprehensive H.265 solution that meets the technical demands of all projects.

“As a leading IP surveillance solution provider, VIVOTEK forges alliances with innovative SIA partners to deliver the most advanced and up to date H.265 solutions,” says Shengfu Cheng, Director of Brand Business Research & Development Division, VIVOTEK Inc. “With our self-developed Smart Stream II and H.265 technology, customers can deploy the most efficient system, increasing the usage of storage and bandwidth, while optimizing the image quality of a specific area or object; working hand in hand with our partners maximizes user efficiency and capability, while expanding the global market with our outstand-

ing partners, is a win-win for all of us.” VIVOTEK offers comprehensive H.265 solutions to meet market demands. An impressive lineup of H.265 surveillance products includes their professional video management software (VMS), VAST and VAST 2, 6 different network video recorders (NVR) and 24 network camera models since 2015, with the release of more cameras scheduled for the near future. Combining H.265 and Smart Stream II technology creates the most efficient system, maximizing bandwidth and storage efficiency and reducing bandwidth and data storage demands by up to 80% relative to H.264 systems.

Cisco Completes Acquisition of AppDynamics

Together, AppDynamics and Cisco will give customers comprehensive visibility from code to consumer and everything in-between

C

isco has completed the acquisition of AppDynamics, a leader in application and business monitoring. Together, Cisco and AppDynamics will deliver visibility across the network, data center, security and applications and drive digital transformation that improves customer experiences.

As digital experiences get simpler for consumers, they get more complex for companies trying to stay ahead of customer expectations. The rise of connected devices, distributed architectures, and multi-clouds have increased the complexity of application environments. Companies need insight SecurityLink India ■ 1 May 2017

CMYK

into the health of every application and every transaction in order to keep up with the pace of change. AppDynamics empowers the world’s largest customers to digitally transform themselves faster and with more confidence. With AppDynamics, enterprises can watch every line 89


CMYK

International Updates

of code and understand its impact on user experience and application performance, while providing real-time insight into the digital business. Together with AppDynamics, Cisco will now be able to offer intelligence, correlation and insights at every level of the infrastructure, security and application. This will enable customers to make more informed IT decisions and improve business results. “In a digital world, the user experience, application, and business are converged and inseparable. AppDynamics sits at this intersection monitoring the impact of every line of code on business outcomes,” said David Wadhwani, Chief Executive Officer, AppDynamics, “By joining forces with Cisco, we’re able to double down on our vision of helping companies overcome the complexity of modern software so they can deliver exceptional customer experiences and drive better business performance.” “We acquired AppDynamics because they are a market leader in a category that will be a cornerstone for

how enterprises drive their business forward,” said Rowan Trollope, Senior Vice President and General Manager, Internet of Things (IoT) and Applications, Cisco, “Together, AppDynamics and Cisco will be the only company that can deliver complete visibility spanning from the infrastructure to application to end user.” In its last fiscal period as an independent company, AppDynamics saw year over year revenue growth of over 50%, with approximately 75% of last year’s product revenue purely subscription-based. The company has enjoyed significant success and customer traction, including: ● Continued growth with customer wins with the European Organization for Nuclear Research (CERN), Vodafone, and Wells Fargo. ● Introduction of breakthrough product innovation including Business iQ, a new App iQ performance engine, and Microservices iQ, a new performance engine in the App iQ Platform. ● New partnerships with Microsoft

for delivery of advanced support for real-time monitoring digital businesses in Microsoft Azure cloud environments, and AppDynamics for ServiceNow to enable companies to proactively manage enterprise applications to deliver exceptional business uptime. ● Significant industry accolades, including being named a leader in Gartner’s 2016 Magic Quadrant for Application Performance Monitoring Suites, San Francisco’s Best Technology Work Culture, and top 10 of Forbes 2016 World’s Best Cloud Companies List. AppDynamics will continue to be led by David Wadhwani as a new software business unit in Cisco’s IoT and Applications business, reporting to Senior Vice President Rowan Trollope. As part of Cisco, AppDynamics will serve a critical role in helping drive Cisco’s continued transformation into a software company. Under the terms of the agreement, Cisco paid approximately $3.7 billion in cash and assumed equity awards.

acquires Jerith Aluminum Fence in the US A

SSA ABLOY has acquired Jerith Aluminum Fence, a leading supplier of aluminum fencing for residential, commercial and industrial applications in the US. “I am very pleased to welcome Jerith into the ASSA ABLOY Group. Jerith is a complementary addition to ASSA ABLOY. The company reinforces our market leadership in North America and 90

is a good step in providing a complete range of products for total door opening solutions,” says Johan Molin, President and CEO of ASSA ABLOY. “Jerith has established a very strong position in the aluminium perimeter security market which gives us additional opportunities to serve fully our customers’ needs,” says Thanasis Molokotos, Executive Vice President of ASSA ABLOY and SecurityLink India ■ 1 May 2017

CMYK

Head of the Americas Division. Jerith was established in 1961 and has some 75 employees. The head office and factory are located in Philadelphia, Pennsylvania. Sales for 2017 are expected to reach some USD 20 million (approx. SEK 200 million) with a good EBIT margin and the acquisition will be accretive to EPS from start.


CMYK

International Updates

WAN Spending by Businesses To grow more than 20 percent annually

By Matthias Machowinski – Senior Research Director and Advisor, Enterprise Networks and Video, IHS Markit

A

s companies embrace digital transformation, the WAN is becoming a strategic component of technology infrastructure, enabling commerce and communication between employees, customers and partners. This, combined with changing application delivery architectures and requirements, is driving a renewed focus on WAN security and performance. Our survey reveals that there’s no end in sight to traffic growth, respondents expect their bandwidth needs to grow around 30 percent annually, with data centers having the highest capacity needs (1.7 Gbps per site) and growth (40 percent per year). Consequently, enterprises plan for major increases in their WAN spending by more than 20 percent annually – to well over $1 million in 2017, reflecting the significant demands placed on their WANs.

Top WAN changes and traffic drivers; growing bandwidth needs

T

he top changes respondents plan to make to their WANs over the next year are increasing capacity and improving security. New application requirements and changes in IT architectures

are driving significant growth in WAN traffic, necessitating upgrades to deliver adequate WAN performance. At the same time, hacking has evolved into a multi-billion dollar industry, requiring a constant focus on security to ensure that hackers don’t gain access to sensitive information. Meanwhile, the leading drivers of WAN traffic are backup/ storage and collaboration tools. Backup/ storage allows companies to keep copies of critical information and recover quickly from failures, while collaboration tools have become an essential productivity tool for globally distributed teams.

● Enterprises participating in IHS Markit’s wide area network (WAN) survey expect their WAN expenditures to rise by more than 20 percent annually – exceeding $1 million per year beginning in 2017. ● Better security and more capacity are the top changes respondent enterprises plan to make to their WANs over the next year. ● Interest in software-defined wide area networking (SD-WAN) is reaching critical mass, with four out of five respondents having plans for SD-WAN over the next 4 years. SecurityLink India ■ 1 May 2017

CMYK

SD-WAN reaches critical mass

T

he SD-WAN lab trials of 2016 are turning into production deployments in 2017 and 2018. Forty-two percent of respondents started SD-WAN lab trials in 2016; and in 2017, many are moving into production trials and onto live production networks.

WAN survey synopsis

F

or the 33-page WAN strategies survey, IHS Markit interviewed purchase-decision makers at 163 medium and large enterprises about their evolving requirements for wide area networks. The study takes an in-depth look at how companies are evolving their WANs in light of new requirements, including WAN growth expectations, growth drivers, plans for new types of connectivity and technologies, preferred suppliers, interest in SD-WAN and spending plans. 91


CMYK

International Updates

AMG Systems Launches

New Website and Brand Identity

New look reflects AMG’s specialist experience and expertise in innovative Ethernet networking technology and custom built transmission solutions

A

MG has launched a new website and refreshed its brand identity to better reflect its position as a market leader in the provision of specialist Ethernet and IP systems and products. The new brand identity and website updates offer a visual representation of AMG’s capabilities as the only UKbased manufacturer of Ethernet switch technologies. The changes also incorporate a new tagline, ‘Transmission with Innovation,’ which encapsulates AMG’s flexible and adaptable approach: devel-

oping innovative and custom built solutions to overcome some of the most common transmission challenges, in the most difficult environments. AMG Business Development Director, Sara Fisher said, “We wanted to ensure that our new look reflected AMG’s unique approach and position in the specialist networking transmission sector. As a UK manufacturer of sophisticated IP and Ethernet switch solutions, we have complete control of our firmware, thanks to our in-house technology

design team. This means we are far less vulnerable to cybersecurity issues than manufacturers who source their firmware or products externally. “We also have a long history of designing bespoke transmission solutions integrating signals such as CCTV, standards-based or bespoke audio, and any type of serial data onto the same Ethernet transmission network, with systems to cater for almost any situation. Our new look and website are designed to convey that unique expertise and experience.”

Gemalto Wins 2017 Cybersecurity Excellence Award for Best Encryption Product with SafeNet KeySecure G

emalto has been named a winner of the 2017 Cybersecurity Excellence Awards. Gemalto’s SafeNet KeySecure was voted ‘best encryption product’ by over 300,000 members of the global information security community. Gemalto’s SafeNet KeySecure provides an organization’s security team with the ability to centrally manage and store encryption keys easily and securely. To demonstrate compliance with mandates or internal data protection policies, the 92

solution offers IT administrators a single pane of glass to simplify the auditing processes. All key state changes are monitored through a centralized logging system, which immediately alerts a company’s security administrator to any key modifications or attempted breaches. This real-time information allows the security team to quickly address the situation and inform stakeholders saving valuable time. SafeNet KeySecure provides flexibility across physical, virtualized and SecurityLink India ■ 1 May 2017

CMYK

public cloud environments, so customers can choose the deployment model that works best for them. The solution also integrates with a broad ecosystem of cloud service providers in addition to interoperability partners using the OASIS KMIP standard. Depending on what the customer needs, Gemalto’s SafeNet KeySecure and encryption and key management products support multiple encryption use cases in one single platform helping IT administrators reduce operat-


CMYK

International Updates

ing expenses and workloads. “The Cybersecurity Excellence Awards is an annual competition honoring individuals, products and companies that demonstrate excellence, innovation and leadership in information security,” said Holger Schulze, founder of the 300,000-member Information Security Community on LinkedIn, “Every

year we receive hundreds of entries and only the very best-in-class cybersecurity products make the cut in our selection and voting process.” “The vote of excellence from our peers in the information security community recognizes our commitment to providing customers with easy-to-use, business-driven security solutions,” said

Todd Moore, Senior Vice President of Encryption Products at Gemalto, “Organizations suffer hefty consequences if their data is lost, stolen or compromised. Integrating Gemalto’s SafeNet KeySecure for encryption and key management helps companies secure their data mitigating the risks associated with data breaches.

Comnet Enters Access Control Market New CNAccess Line Provides Up To 32 Door Solution

C

omNet, Communication Networks, a US based manufacturer of transmission and networking equipment, has announced its entry into the access control marketplace. ComNet is introducing two systems; the CNA100 line, a 2 to 8 door solution for smaller applications and the CNA200 for up to 32 doors for bigger applications. This effort is ComNet’s first entry into this marketplace and will be the first access control product line with the quality required to wear the ComNet brand. The CNAccess line utilizing embedded intelligence, does not require special software or a dedicated PC. This convenience allows users the flexibility to manage a system from any location with internet access. Both products support standard Wiegand devices, Schlage AD Series electronic locks, and various card formats and technologies such as proximity, smart card, magnetic stripe and Bluetooth®. The CNA100 can be easily upgraded to the capacity of the CNA200 with a

simple software upgrade. Both CNAccess products are network compatible and operate seamlessly with any ComNet IP product. The line will consist of these two products as well as the complimentary line of reader interface products, proximity readers, power supplies and accessories. According to Andrew Acquarulo Jr., ComNet CEO and President, “We’ve spent a lot of time and effort focusing on the next step in the ComNet growth cycle. We were looking for a natural extension of the business. Now that ComNet has been acquired by ACRE, we were able to source a quality product and it gave us a huge advantage in gaining an access control product line that has a great appeal.” SecurityLink India ■ 1 May 2017

CMYK

“The CNAccess line represents ComNet’s decision to package a quality access control product with an application specific communication solution tailored directly to our customers’ needs. It is a major undertaking, but we believe there is a great need for these products,” said Skip Haight, ComNet VP of Marketing, “Adding the CNAccess line will differentiate ComNet from other manufacturers and creates significant value for the user.” ComNet offers an extensive line of fiber optic, copper and wireless video and data transmission equipment that is uniquely designed to meet the needs of the Security, Intelligent Transportation System, Utility and Industrial markets. 93


CMYK

International Updates

Cloud Adoption and Escalating Threats Accelerate Encryption Deployments For the first time business unit leaders break through as top encryption strategy influencers

T

hales announces the results of its 2017 Global Encryption Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales, captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their most sensitive data. The report reveals enterprises have accelerated adoption of encryption strategies, with 41 percent of respondents saying their organization has an encryption strategy applied consistently across the enterprise. Notably, for the first time in the study’s 12-year history, business unit leaders have a higher influence over encryption strategy than IT operations. Other critical findings demonstrate organizations continue to show a preference for control over encryption and key management when those activities migrate to the cloud. Protecting data at rest in the cloud: ● 67% of respondents take one of two routes: they either perform encryption on premise prior to sending data to the cloud, or encrypt in the cloud using keys they generate and manage on premises. ● 37% said their organizations turn over complete control of keys and encryption processes to cloud providers. 94

Other key findings: ● 31% are currently using or planning to use Hardware Security Modules (HSMs) with Bring Your Own Key (BYOK) deployments, with 20% claiming the same for Cloud Access Security Broker (CASB) deployments. Overall, usage of HSMs with CASBs is expected to double in the next 12 months (from 12% to 24%). ● Use of HSMs among organizations grew to its highest level ever, at 38%; of those respondents, 48% own and operate HSMs on-premise in support of cloud-based applications. ● At 55%, compliance is the top driver for encryption – followed closely by protecting enterprise intellectual property (51%), customer information protection (49%) and protection from external threats (49%). Dr. Larry Ponemon, Chairman and Founder of The Ponemon Institute, says, “The accelerated growth of encryption strategies in business underscores the proliferation of mega breaches and cyberattacks, as well as the need to protect a broadening range of sensitive data types. Simply put, the stakes are too high for organizations to stand by and wait for an attack to happen to them before introducing a sophisticated data protection stratSecurityLink India ■ 1 May 2017

CMYK

egy. Encryption and key management continue to play critical roles in these strategies.” John Grimm, Senior Director of Security Strategy at Thales e-Security, says, “This year’s findings align with key trends demonstrating an increased reliance on the cloud, ever-evolving internal and external threats, and new data sources mandating stronger protection. The survey further reinforces that cloud key management offerings are more important than ever – and businessleader involvement is crucial to a sound security strategy. Thales is attuned to this development, and to its customers’ need for strong and flexible safeguards for the cloud. Recently, for example, we announced integrations with AWS, Google, Microsoft and Salesforce cloud platforms. Our support encompasses BYOK, key management as a service (KMaaS) and RESTful API use cases, with additional collaborations on the way.” The Global Encryption Trends Study is now in its twelfth year. The Ponemon Institute surveyed more than 5,000 people across multiple industry sectors in the United States, United Kingdom, Germany, France, Australia, Japan, Brazil, the Russian Federation, Mexico, India, Saudi Arabia and the United Arab Emirates.


CMYK

International Updates

IPSecurityCenter™ Wins Govies Platinum PSIM Award for Second Year The Govies Government Security Award 2017 honors outstanding government security products

F

or the second year in a row, CNL Software’s IPSecurityCenter solution has been voted the most outstanding PSIM product by Security Today magazine in the Govies Government Security Awards. Sponsored by Security Products, securitytoday.com and GovSec magazines, the participation in the awards program has been strong as government security continues to be an ongoing concern. An independent panel of judges from the security industry selected the top entries in the 2017 categories, including IPSecurityCenter PSIM, based on criteria including features, innovation, user friendliness, interoperability, quality, design, market opportunity, and impact in the security industry, technical advances, and scalability. “The Govies is an amazing product recognition program whereby companies in the security industry can highlight their technology and solutions that work flawlessly within the government vertical,” said Ralph C. Jensen, Editorin-Chief of Security Today magazine and securitytoday.com, “We received 28% more entries this year, which also corresponds with the need to provide better security options not only at the federal level but also at the state and municipal level of government. I believe these products and solutions only prove that the government relies heavily on the technology advances in the

private sector.” “We are delighted that IPSecurityCenter has been chosen for the top award in the Govies PSIM category for a second year,” says Mike Mostow, General Manager – Americas at CNL Software, “Our IPSecurityCenter is critical to the missions of many homeland security, defense, safe cities, and mass transit customers who rely on the platform for situational awareness, the accurate and early detection of incidents, and the ability to resolve them faster and more incisively. CNL Software was chosen for these important security programs because of our superior technology, innovation, and the technical and operational know-how to help drive impactful outcomes.” IPSecurityCenter is deployed in some of the largest global government security programs today. Supporting the safety and security of citizens, visitors, commerce and infrastructure, IPSecurityCenter allows the intelligent integration of the widest range of security and homeland defense technologies such as video surveillance and analytics, facial recognition, license plate recognition, crowd monitoring, gunshot detection, chemical, biological, radiological/ nuclear and exploSecurityLink India ■ 1 May 2017

CMYK

sives detection, geospatial mapping and asset tracking. CNL Software is a world leader in Physical Security Information Management (PSIM) software and its award-winning technology is deployed to secure cities, critical resources and global commerce. CNL Software’s IPSecurityCenter™ PSIM solution sits at the heart of some of the largest, most complex and ground-breaking security integration and business value initiatives in the world. Its work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as energy reduction, process compliance and business advantage in converged environments. The PSIM Group brings together users, integrators, consultants and manufacturers of Physical Security Information Management software to share ideas, thought leadership, tips, tricks, future developments and more. 95


CMYK

96

SecurityLink India â– 1 April 2017

96

CMYK


CMYK

97

SecurityLink India â– 1 April 2017

97

CMYK


CMYK

Annual Subscription: 1500/- for 12 Issues

“Security Link India” payable at New Delhi dated__________

* Please subscribe through admin@securitylinkindia.com

WE ARE UPDATING OUR DATABASE For free listing in Database:

For

Advertisement Contact:

editor@securitylinkindia.com

* Send your detail to admin@securitylinkindia.com

Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 98

SecurityLink SecurityLink India India ■■ 11April May 2017

98

CMYK


0x270mm_v1.ai

CMYK

LIST OF ADVERTISERS

May 2017

S. No.

1

21/2/17

Company

Page #

S. No.

01.

05, 09 Gate Fold

07.

96-97

02.

10

08.

13

03.

06, 11 Back Cover

09.

53

04.

15

10.

07

05.

Inner Front Cover & 17

11.

100

06.

08

12.

53

Company

Page #

6:17 pm

99

SecurityLink SecurityLink India India ■■ 11April May 2017

99

CMYK


CMYK

100

SecurityLink India â– 1 April 2017

100

CMYK




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.