Security Solutions Today: Jan-Feb 2017

Page 1

Scan this code to visit our website




January-February 2017

CONTENTS

34 6

CALENDAR OF EVENTS

8

EDITOR’S NOTE

10 25 34

37 39 41 43 45 48

50

52 54 57

2

41

IN THE NEWS

59 59

60

Around the World Eye on Asia

62

COVER FOCUS:

64

Event Security and the Next Bout of Video Technology

APPLICATION STORIES:

Keeping up a steady flow of information Dahua delivers Efficient and Reliable Safe City Solution Begin Traffic Security Installation at 11:45 am... Have Protection by Lunch Campus Safety and the Access Control Trends that Schools Need City of Atlanta – Safe City A Fresher Look At Security On Campus

VERTICAL MARKET CASE STUDIES

Bosch Fire Alarm Systems Secure
St. Andrews International School Bangkok Sikarin Hospital secured by Bosch – Thailand Bosch provides 24/7 security monitoring in Sikarin Hospital Vienna Technical Museum Exhibits Video-Enabled City of the Future Thanks to Milestone “Ochtum Park” Outlet Centre protected with Panomera® multifocal sensor technology

Security Solutions Today • January / February 2017

70

74 76

70

82

Lowest Domestic Burglary Figures in 25 Years

SECURITY FEATURES:

Top Technology Trends in the Security Market to look for in 2017 Don’t be Held Hostage to Ransomware Solutions for Rising Video Surveillance Storage Demands

INSIDE LOOK:

Extract from “Future-Proofing the Connected World:13 steps to developing secure IoT Products”

IN FOCUS:

Interview with FST Biometrics Interview with Aruba

80

PRODUCT SPOTLIGHT

82

PRODUCT SHOWCASE

92

POST-SHOW REPORT: SECUTECH VIETNAM

*Correction in Nov/Dec issue: SST Nov/Dec Issue 2016 conducted an Interview with Mr. Kenneth Hune Peterson, Chief Sales and Marketing Officer, Milestone Systems.



January-February 2017

CONTACTS

Publisher Steven Ooi (steven.ooi@tradelinkmedia.com.sg) Editor Sharanya M (sst@tradelinkmedia.com.sg) Radio Technology Consultant Martin Gillmon (martin.gillmon@tradelinkmedia.com.sg) Group Marketing Manager Eric Ooi (eric.ooi@tradelinkmedia.com.sg) Marketing Manager Felix Ooi (felix.ooi@tradelinkmedia.com.sg) Marketing Executive Mastasha Ajang (mastasha@tradelinkmedia.com.sg) Head Of Graphic Dept/ Advertisement Co-ordinator Fawzeeah Yamin (fawzeeah@tradelinkmedia.com.sg) Graphic Designer Siti Nur Aishah (siti@tradelinkmedia.com.sg) Circulation Yvonne Ooi (yvonne.ooi@tradelinkmedia.com.sg)

Scan this code to visit our website

Photo Credit: Adobe Stock Designed by Fawzeeah Yamin

Printed in Singapore by KHL Printing Co Pte Ltd.

Security Solutions Today

is published bi-monthly by Trade Link Media Pte Ltd (Co. Reg. No.: 199204277K) 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399. Tel: 65-68422580 Fax: 65-68422581 ISSN 2345-7104 (Print)

The magazine is available free-of-charge to applicants in the security industry who meet the publication’s terms of control. For applicants who do not qualify for free subscription, copies will be made available, subject to the acceptance by the publisher, of a subscription fee which varies according to the country of residence of the potential subscriber in the manner shown on the right. The editor reserves the right to omit, amend or alter any press release submitted for publication. The publisher and the editor are unable to accept any liability for errors or omissions that may occur, although every effort had been taken to ensure that the contents are correct at the time of going to press. The editorial contents contributed by consultant editor, editor, interviewee and other contributors for this publication, do not, in any way, represent the views of or endorsed by the Publisher or the Management of Trade Link Media Pte Ltd. Thus, the Publisher or Management of Trade Link Media will not be accountable for any legal implications to any party or organisation. Views and opinions expressed or implied in this magazine are contributors’ and do not necessarily reflect those of Security Solutions Today and its staff. No portion of this publication may be reproduced in whole or in part without the written permission of the publisher.

4

Security Solutions Today • January / February 2017

ANNUAL SUBSCRIPTION: Surface Mail: Singapore - S$45 (Reg No: M2-0108708-2 Incl. 7% GST) Airmail: Malaysia/Brunei - S$90 Asia - S$140 Japan, Australia, New Zealand - S$170 America/Europe - S$170 Middle East - S$170

ADVERTISING SALES OFFICES

Head Office: Trade Link Media Pte Ltd. (Co. Reg. No: 199204277K) 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399. Tel: +65 6842 2580; Fax: +65 6842 1523, 6846 8843, 6842 2581. Email (Mktg): info@tradelinkmedia.com.sg

China & Hong Kong Iris Yuen Room 1107G, Block A, Galaxy Century Building #3069 Cai Tian Road, Futian District Shenzhen China Tel : +86-138 0270 1367 sstchina86@gmail.com

Japan: T Asoshina/Shizuka Kondo Echo Japan Corporation Grande Maison, Rm 303, 2-2, Kudan-Kita,1-chome, Chiyoda-ku, Tokyo 102, Japan Tel: +81-3-32635065 Fax: +81-3-32342064



CALENDER OF EVENTS

Intersec 2017

IOT Asia 2017

Date: 22 – 24 January 2017 Venue: Dubai International Convention and Exhibition Centre, Dubai, UAE Contact: Andreas Rex Organiser: Messe Frankfurt Middle East GmbH Tel: +971 4 389 4500 Email: intersec@uae.messefrankfurt.com Website: www.intersecexpo.com

Date: 29 – 30 March 2017 Venue: Singapore Expo Organiser: SingEx Exhibitions Pte Ltd Tel: +65 6403 2100 Email: registration.iotasia@singex.com Website: www.internetofthingsasia.com

Milipol Asia Pacific/ GSA 2017

Secutech 2017

Date: 4 – 6 April 2017 Venue: Sands Expo and Convention Centre, Singapore Contact: Andrew Marriott Organiser: The GIE Milipol, Comexposium and GSA Exhibitions Pte Ltd Tel: +65 6392 5328 Email: andrew.marriott@comexposium-sg.com Website: www.milipolasiapacific.com

Date: 12 – 14 April 2017 Venue: Taipei Nangang Exhibition Center, Taiwan Organiser: Messe Frankfurt Contact: Ms Danielle Lin Tel: +886 2 8729 1017 Email: danielle.lin@newera.messefrankfurt.com Website: www.secutech.tw.messefrankfurt.com

Interpol World 2017 Date: 5 – 7 July 2017 Venue: Suntec Singapore Convention and Exhibition Centre, Singapore Contact: See Lay Eng Organiser: Interpol Tel: +65 6389 6613 Email: layeng.see@interpol-world.com Website: www.interpol-world.com

Security Solutions Today is now on issuu!

issuu.com/securitysolutionstoday

Scan this code & ‘Like’ us on

Scan this code & ‘Like’ us on

Scan this code & ‘Like’ us on

Scan this code & ‘Like’ us on

Scan this code to visit our website

Scan this code to visit our website

Scan this code to visit our website

6

6

Security Solutions Today • January / February 2017


THE 22ND PHILIPPINE WORLD BUILDING AND CONTRUCTION EXPOSITION

Co

ction Expo tru si

lippine W Phi o ly

lding &

n tio

Bui

ns

rld

2017

The On


Dear esteemed readers,

H

appy New Year and Welcome to the first issue of Security Solutions Today in 2017! We are excited to bring to you the latest in Security.

This Jan/Feb Issue discusses Public Safety & Security for Large Events. We have also had the opportunity to broaden the focus to include the vertical market of Campus Security. Our Cover Focus zooms in on Video Technology in events while our application stories discuss barricades, secure communication systems and up-to-date technology such as face recognition systems. They highlight the need for holistic security and share similar concerns in security needs. A variety of contributors have shared their thoughts on the matter- for your browsing. The case studies in this issue complement the theme nicely, rounding up the discussion. What is also illuminating about this issue is the Security Feature by Axis Communications on top technology trends to look for in 2017. In another Security Feature, Symantec shares with us more on Cybersecurity. Read on to find out if perceptions of security and its tropes have changed and how to cope with these changes. SST has also interviewed Mr. Gary Drutin, CEO of FST Biometrics and Mr. Justin Chiah, Director and General Manager, South East Asia and Taiwan at Hewlett Packard and Aruba Networks - in an in-depth and thoughtful interview process. I believe their answers will be as enlightening to you as it was to me. I hope you enjoy reading this issue as much as I enjoyed assembling it! SST looks forward to providing you with interesting reads in 2017! We wish you a prosperous and productive year ahead as 2017 continues to unfold. Have a wonderful New Year!

Sharanya M Editor

8

Security Solutions Today • January / February 2017



IN THE NEWS | AROUND THE WORLD

Abloy Presents ISIA Locksmith Award Security expert Abloy UK has presented Crothers Security with the Locksmith Of The Year Award at the recent Irish Security Institute Association (ISIA) Awards 2016, at the Powerscourt Hotel and Resort Spa, Co. Wicklow.

E

ach year the ISIA recognises Irish security companies and their employees who have demonstrated exceptional services to their customers. The awards cover all aspects of the Security Industry - from manned guarding through to electronic security and locksmiths - and Abloy was the sponsor of the Locksmiths accolade. The Locksmith sector in the Irish market is experiencing rapid change with the advent of Private Security Authority (PSA) licensing due for implementation in 2017. Additionally, new Building Regulations will come into force next year that will clearly define the correct product combinations for Escape and Fire Door applications, and align them with European Harmonised Standards ensuring compliant specifications are not just desirable, but also essential. This year three Locksmiths were shortlisted for the Locksmiths Award, sponsored by Abloy UK. Representatives from all of the nominated businesses were in attendance, with Crothers Security announced as the winners. Kevin Crothers set up Crothers Security in 1980, providing the first 24-hour burglary repair service in Dublin. From this experience, he began to supply and fit a range of security products and solutions, including locks, safes and security doors. In 1982 a Crothers retail outlet and locksmith shop was opened in Walkinstown and since then, under the stewardship of Steven and Martin Crothers, the company has expanded its services into electronic security including Access Control, CCTV and intruder and fire alarms. Steven Crothers, said: “This is the third time we have won the ISIA Locksmith Of The Year award and are delighted to have retained it from 2015. This is a testament to the excellence of our staff as well as our careful selection of quality products, epitomised by Abloy’s range.” Pat Jefferies, Commercial Director at Abloy UK, said: “This is the first year that Abloy has been associated with the Irish Security Institute Association Awards and we’ve been impressed with the event organisation and friendly atmosphere. “We’re delighted to have presented Crothers Security with this award, and on behalf of Abloy UK I wish Martin and Steven every success in the future.” For more information, please visit www.abloy.co.uk. sst

10

Security Solutions Today • January / February 2017


AROUND THE WORLD | IN THE NEWS

Abloy UK Secures Pod Works Phone Box Offices

L

eading lock manufacturer Abloy UK has created a bespoke locking solution for ART Security Solutions (ART), to secure up to 1,000 Pod Works quirky phone box workstations across the UK, specifying the EL490 electric motor lock alongside interior and exterior keypads. The Pod Works workstations have been created using iconic red BT telephone boxes, and each typically includes Wi-Fi, plug sockets, Internet connection, printer, scanner, VOIP phone and free coffee and tea. ART, based in Henley on Thames, Oxfordshire, are responsible for securing the ‘Pods’ and Russell Square was one of the first of up to 1,000 ‘Pods’ to be installed nationwide in major cities over the next 24-36 months. ART approached Abloy UK looking for a unique locking solution to enable secure and safe electric control locally and remotely. Justin Morley, Managing Director, ART Security Solutions, said: “Security was paramount on this project - the lock had to work effectively, look good and be reliable. “We also needed a lock that had multiple functions, providing certain levels of guaranteed exit in lots of different scenarios. The EL490 from Abloy was chosen as it had unique dimensions that matched the very exact amount of space available for door hardware to be fitted - as well as offering all the safeguards we required.” Paul Radden, Senior Product Manager, Abloy UK, added: “The EL490 is a motor lock and has the unique feature of electronic handle control. For the ‘Pods’, we have used the EL490 alongside interior and exterior keypads that allow access, logging the user in and out of the ‘Pod’. “If the power fails or there is an emergency, the handle becomes live and the user can exit. We’re looking forward to working with ART going forward to ensure all of the anticipated 1,000 ‘Pods’ are effectively secured.” Abloy UK’s electric motor locks offer high security, with a secure external override and manual escape at all times. They have been fire tested and provide automatic deadlocking, as well as offering a compliant solution for both interior and exterior doors. For more information, please visit www.abloy.co.uk. sst

January / February 2017 • Security Solutions Today

11


IN THE NEWS | AROUND THE WORLD

Arecont Vision® MegaLab™ 3rd Generation Expansion to Drive Continued Industry Leadership of Megapixel Technology

L

os Angeles, CA– Arecont Vision®, the industry leader in IP-based megapixel camera technology, has announced that its MegaLab™ facility has launched a 3rd generation expansion to benefit customers worldwide while continuing to move the surveillance industry forward. The MegaLab is a dedicated testing facility and knowledge center located at Arecont Vision’s headquarters, development center, and manufacturing facilities in Glendale, California that is used by Arecont Vision and by many manufacturers of video management software (VMS) platforms, network video recorders (NVRs), storage, servers, cybersecurity solutions, utilities, lighting, and network infrastructure. The MegaLab is a key component of Arecont Vision’s continued commitment to maintaining and growing its 13 years of megapixel technology industry leadership. The facility is used to test new products, features, and capabilities with the latest products from a wide range of Technology Partner Program members to ensure the best possible integration. The MegaLab is now closely integrated with the Arecont Vision Quality Assurance (QA) labs as part of the most recent facility expansion. This allows the Quality team to leverage the MegaLab and the wide range of partner hardware and software systems prior to the release of Arecont Vision products. It also provides a vehicle for the Technical Assistance Center (TAC) team to simulate, identify, and resolve post-installation support issues. “The MegaLab was initially created for Arecont Vision engineers to verify the integration of industry leading VMS platforms with our pioneering megapixel cameras,” said Jason Schimpf, Director of Marketing Programs at Arecont Vision, and the creator of the MegaLab. “The MegaLab has grown dramatically in scope, and today is used by a growing range of VMS and Infrastructure Partners to test their products with Arecont Vision cameras onsite or remotely. The MegaLab provides a physical environment with professional security cameras and typical network infrastructure, far superior to using software to simulate real world conditions.” This testing capability is a free service available to the hardware and software manufacturers that are participants in the Arecont Vision Technology Partner Program. The original Arecont Vision certification program launched in 2008 with 64 of the company’s megapixel cameras and a basic network infrastructure setup. Eight years later the MegaLab has evolved into a dedicated workspace located in the center of the Engineering, Quality, and Technical Assistance Center departments, and has been used by continue on page 13

12

Security Solutions Today • January / February 2017


AROUND THE WORLD | IN THE NEWS

many manufacturers. The MegaLab is now a 24 hour a day, 365 day a year proving ground, troubleshooting testbed, certification lab, remote load test environment, and a customer design verification center. The facility features over 120 cameras permanently installed, along with capability to expand to well over 500 cameras when needed. “ONVIF integration is important, and fully endorsed by Arecont Vision,” commented Schimpf. “Through the MegaLab, we are able to move beyond ONVIF and integrate the features and capabilities that we are often the first in the industry to deploy with the latest products of our Technology Partners. This brings outstanding customer solutions to the market that are well integrated even before the standards groups catch up.” The MegaLab features dedicated servers for VMS and other software solutions in physical and virtualized environments, as well as NVR appliances. A robust network backbone with network switch hardware from several manufacturers is available for dedicated testing and troubleshooting. This type of flexibility allows Technology Partners and Arecont Vision’s TAC, QA, and Engineering staff to test to precisely what needs to be checked, verified, or corrected. “Access to the MegaLab has greatly enhanced our quality assurance testing. We are able to test every new firmware update and each camera with the industry’s leading VMS, storage, network, and analytics platforms before release for sale,” said George Feldman, Director of Quality at Arecont Vision. “Since our cameras have maintained a unified API since 2008, the new cameras and firmware versions are plug and play with many of our partners. This allows us to verify that our new features and cameras are designed properly, and ensures a deep level of integration when new products are released.” For more information, please visit www.arecontvision.com. sst

January / February 2017 • Security Solutions Today

13


IN THE NEWS | AROUND THE WORLD

Arecont Vision® Releases SurroundVideo® G5 Mini Panoramic Camera Series

L

os Angeles, CA– Arecont Vision®, the industry leader in IPbased megapixel camera technology, has expanded their popular SurroundVideo® panoramic indoor/outdoor camera series with fifth generation models that deliver important new features in a smaller size. These compact SurroundVideo G5 Mini cameras are the latest addition to the ground-breaking SurroundVideo multi-sensor panoramic family. SurroundVideo panoramic cameras provide four integrated lenses in either 180º or 360º configurations. The new SurroundVideo G5 Mini panoramic camera series delivers 12- and 20-megapixel (12 or 20MP) resolution at double the frame rate of previous models. The G5 Mini is also approximately 50% smaller than previous SurroundVideo models. In 2006, Arecont Vision pioneered the industry’s first multi-sensor panoramic megapixel cameras and has maintained its market leadership through continued innovation and development. Not only can a single, high definition SurroundVideo camera replace multiple pan-tilt-zoom (PTZ) or fixed-view cameras, but it does so while enhancing video coverage and situational awareness. Even more important is that reducing the number of cameras through the use of SurroundVideo lessens both project costs and complexity. The SurroundVideo series is currently in its fifth generation, with tens of thousands of successful customer installations around the globe. SurroundVideo cameras are typically mounted on walls, ceilings, rooftops, corners, light poles, and emergency call boxes. Users can view each sensor of a SurroundVideo G5 Mini megapixel camera individually or cumulatively in a full 180o or 360o panoramic view. SurroundVideo panoramic cameras are factory-aligned with a slight image overlap as a means to ensure that nothing is ever missed in the field of view. 12MP WDR-equipped models offer up to 100dB at full resolution for an optimal image, even in extremely varied lighting conditions. SurroundVideo cameras additionally feature four individual day/night mechanical IR cut filters in order to provide the highest image quality at any time of day. The entire Made in the USA SurroundVideo series is subjected to, and certified by, rigorous dust, water, and impact tests while under strict manufacturing quality control. SurroundVideo cameras offer an extended operating range and are ideal for indoor, outdoor, and vandal-prone applications. “Arecont Vision SurroundVideo multi-sensor megapixel cameras continue to be the go-to solution for knowledgeable systems integrators around the world due to the demonstrated performance, proven reliability, and outstanding costefficiency of the entire series,” said Brad Donaldson, Arecont Vision’s VP of Product Development. “The smaller size of the new SurroundVideo G5 Mini models, combined with double the frame rate of earlier models, will significantly benefit our customers.” SurroundVideo series cameras also offer advanced streaming capabilities. They are designed on the Arecont Vision highly efficient H.264 encoding platform to deliver high quality video without straining the network. Power can be supplied by either a single Power-over Ethernet (PoE) compliant network cable, or by an 18-48V DC/24V AC power supply. The camera interface allows for intuitive, fast, and easy configuration, while the convenient AV IP Utility tool enables users to quickly configure or update one or multiple cameras simultaneously. SurroundVideo cameras are integrated with the industry’s leading video management systems (VMS) and network video recorders (NVR) through the Arecont Vision Technology Partner Program and its MegaLab™ testing facility and knowledge center. The result is the best-possible integration for surveillance projects, and most Technology Partner Program VMS/NVR members further reduce project costs by charging only a single camera license for a four-sensor SurroundVideo camera. For more information, please visit www.arecontvision.com.

14

Security Solutions Today • January / February 2017

sst


AROUND THE WORLD | IN THE NEWS

BT and Toshiba launch UK’s first Quantum Security Showcase Farpointe Data’s Ranger Transmitter Supports Long Range, Proximity and, Now, Smart Card Presentation Technologies

B

T and Toshiba opened the UK’s first secure quantum communication showcase at BT’s research and development centre in Ipswich.

The showcase sees the two companies demonstrate cutting edge quantum cryptography, which can be used to protect digital information transported within banks and financial services organisations from hacking. Quantum cryptography works by delivering secret keys over fibre optic cable, using the smallest possible packets of light. It allows eavesdroppers on a line to be easily detected because any attempt to monitor the data being transferred will disturb the photons sending the keys and introduce errors to their encoding. This allows organisations to check whether the key has been intercepted by a cyber-criminal.

technology can enhance a wider range of businesses. We look forward to working with BT over the coming months to gather useful feedback and address the security requirements and concerns of BT customers.” BT and Toshiba’s system uses quantum cryptography to form digital crypto keys between the two points, which can be used to encrypt and authenticate each piece of confidential data flowing between two sites. The quantum signals used to form the secret keys can also be sent along the same fibre as the bank data, so it greatly reduces the cost of infrastructure required.

Quantum cryptography is used to securely transfer all manner of confidential information, such as personal details, biometric data and bank statements, between a bank branch and an off-site data centre. Off-site data centres are prevalent throughout the financial sector, making the secure communication of personal and banking information over digital infrastructure crucially important. Professor Tim Whitley, head of research for BT, and MD of Adastral Park, said: “We’ve been conducting research into quantum cryptography for several years now so this is a great step forward in demonstrating how our research can benefit businesses. Businesses and organisations today face a tide of ever increasing and highly sophisticated attacks from cyber criminals so ensuring the secure transfer of critical data is more important than ever. We’re confident that quantum cryptography will play an increasingly important role in helping companies guarantee that their secure communications remain water-tight in the future.” Dr. Shiro Saito, Corporate Senior Vice President, and General Manager of the Technology Division at Toshiba Corporation said: “Toshiba is already applying quantum cryptography to secure transmission of genome data in Japan, since protecting personal medical information is one of the promising application fields. Showing our secure communication system in BT’s customer showcase will enable us to demonstrate how quantum continue on page 16

January / February 2017 • Security Solutions Today

15


IN THE NEWS | AROUND THE WORLD

quantum cryptography on “lit” installed fibre carrying 10Gbps data signals for the first time. More recently they found quantum key distribution and 100Gbps data could be combined on the same fibre.

The companies have been working on techniques to integrate quantum security into conventional fibre optic communication networks over the past two years at Toshiba’s research lab in Cambridge. During this collaboration they have demonstrated success in using

BT and Toshiba Research Europe are also collaborating on a major project to build a Quantum Communication network (the “UK Quantum Network”). This initiative, which is part of the UK’s £270 Million Quantum Technology Programme, will facilitate quantum secured communications between Cambridge, Bristol, London and Adastral Park. A link connecting BT’s Labs at Adastral Park and the Cambridge Science Park is expected to be completed early next year. For more information, please visit www.btplc.com and www.toshiba.co.jp/index.htm. sst

Princeton Identity Upgrades Access Control System with Biometric Iris Recognition at Elder Care Facility
 Easy-to-Use Solution with Instant Identification and No Codes to Remember

E

rie PA– Princeton Identity has recently implemented an iris recognition system at Brevillier Village, a long term care and independent residential/retirement facility in Erie, Pennsylvania, that will make access control procedures easier and more convenient for both residents and staff. According to Jean LaFuria, Vice President of Residential Services, Brevillier Village, there were problems on-site when residents had difficulty using the access control keypads to move about the facility. A variety of options were investigated, including larger keypads to increase visibility, but none were an ideal solution. “Adding key cards to solve the problem was not an option because of liability/legal issues and larger-sized pin pads were only a partial solution,” adds LaFuria. “We were already using fingerprint technology for staff time and attendance but it was less viable for the residents, and created new concerns for accuracy and transmission of germs. After researching current technologies, we learned that iris recognition could be an ideal solution for us – it is highly accurate, non-contact, and eliminates the need to remember codes. The easy-to-use iris recognition technology from Princeton Identity was the answer for our challenges.”

16

Security Solutions Today • January / February 2017

The solution from Princeton Identity involved adding two of their IOM (Identity on the Move™) Walk-Through Identity systems and six IOM Access Control readers in the personal care building. IOM readers are installed on four sets of doors at two heights – a lower position for those in wheelchairs and a higher position for those who can stand or use crutches or a walker. Once enrolled, users simply glance at the iris reader without having to remove glasses or place their eyes close to the device. Authentication is confirmed in less than a second, and the door can be opened. Because of the system’s ease of use and reliable accuracy, the staff at Brevillier Village are also enrolled in the system. The building’s previous access control system was left in place as a back-up. “This project highlights some of the advantages of iris recognition in healthcare and assisted-living applications,” said Mark Clifton, CEO, Princeton Identity. “Many facilities need to support users with a wide range of physical limitations and challenges. Iris recognition is a great fit for these cases because it is fast and easy for users, doesn’t require a free hand, and maintains safety and security.” For more information, please visit www.princetonidentity.com. sst


AROUND THE WORLD | IN THE NEWS

Bosch introduces latest Starlight Technology The ultimate 24/7 IP video surveillance cameras just got even better

B

osch starlight cameras deliver the highest quality of relevant video surveillance, even in extremely low light conditions. The starlight portfolio will now be further enhanced still, with improved light sensitivity, superb front and backlight compensation; higher frames rates as well as a wider choice of resolutions and form factors. Another compelling enrichment is that all Bosch IP 6000, 7000 and 8000 starlight cameras will feature Bosch video analytics at the edge as standard, instead of as an optional feature. Therefore, no additional investment or license fees from the customer will be required. Bosch feels that the offering of video analytics at the edge as standard is now a necessity to cater to the ever-increasing demand for details. It is also a necessity due to the proliferation of cameras. Bosch video analytics adds sense and structure to video data already at the point of capture (at the edge), enabling users to effortlessly search through large amounts of video data and to pinpoint the information that matters most to them. In this way, users can take appropriate action faster, easier and more efficiently. It also enables them to reduce network strain and storage requirements by streaming only the data needed. The complete IP starlight camera portfolio from Bosch offers a wider selection of resolutions (720p, 1080p, 5 megapixel) and form factors including fixed box, fixed dome or moving dome cameras; as well as extremely rugged moving cameras for when conditions get tough. The starlight portfolio also offers higher dynamic ranges of up to 120 dB for perfect exposure in all lighting conditions regardless of front and backlight, as well as frame rates of up to 60 frames per second to easily capture fast moving objects. In addition, the latest sensor technology, combined with sophisticated noise suppression, results in a light sensitivity of 0.0069 lux in color and 0.0008 lux in monochrome for the 1080p models. This enables starlight cameras to produce full color images in the dark beyond the point where other cameras have switched to monochrome. Where other cameras fail to show any image at all, starlight cameras are still capable of delivering detailed monochrome images. Bosch’s video analytics at the edge enable starlight cameras to interpret data and to decide what and when to stream. This will be based on configurable triggers minimizing bandwidth requirements as needed. The end results are relevant alerts and key statistics which enhance the accuracy of the video surveillance system, providing relevant data for numerous security and non-security applications and substantially reducing the margin of error that comes with time consuming and labor intensive 24/7 human surveillance. A full suite of Essential Video Analytics will be provided as standard without additional license fees on the DINION IP starlight 6000 fixed box and FLEXIDOME IP starlight 6000 fixed dome cameras at competitive price points. All IP 7000 and IP 8000 starlight cameras will come equipped with the state-of –the-art Intelligent Video Analytics from continue on page 18

January / February 2017 • Security Solutions Today

17


IN THE NEWS | AROUND THE WORLD

Bosch; a full suite of robust video analytics algorithms offering highest accuracy for the ultimate in video analytics. As with Essential Video Analytics, Bosch Intelligent Video Analytics requires no additional investment or license fees from the customer. Essential Video Analytics offers 15 different video analytics algorithms that can be used for advanced intrusion detection and enforcing health and safety regulations. It also possesses business analytics capabilities, such as people counting and crowd density information for retail environments. Intelligent Video Analytics is specifically designed for the most demanding environments. It has the added capacity to deliver the highest level of accuracy for mission critical applications such as perimeter protection for airports and critical infrastructures, ship tracking and traffic monitoring. Intelligent Video Analytics offers 17 different video analytics algorithms and is capable of doing everything that Essential Video Analytics does. What makes Intelligent Video Analytics stand out is its ability to differentiate between genuine security events and known false triggers such as challenging environments where snow, wind, rain, water reflections and distance make images even more difficult to interpret. It minimizes costly false positives and assists users to focus on what is relevant to them. For more information, please visit www.boschsecurity.com. sst

CNL Software Expands Global Sales Team

C

NL Software, a world leader in Physical Security Information Management (PSIM) software, is pleased to announce that it has expanded its global sales team with the appointment of Simon Jones to the role of Sales Manager UK & Europe. Simon’s primary role will be to nurture the company’s existing customer relationships and to develop and expand the UK and European customer base in line with the company’s global growth strategy. With over 20 years’ experience in technical sales, Simon has recently completed a 5-year tenure at Reliance HighTech, where he was responsible for integrated security sales into various high profile accounts, including some of the UK’s largest police forces and Thames Water. He has a detailed understanding of the CNI market and the Industrial Internet of Things (IoT) sector, offering a unique insight into the challenges facing industries grappling with the exponential growth in data acquisition as well as challenges outside of traditional security applications that CNL Software is also addressing with IPSecurityCenter™ to create business value and drive innovation. “Simon brings a wealth of experience to CNL Software, not only technical, but also operational and cultural, having lived and worked extensively in Europe.”, says James Condron, VP Global Sales & Marketing at CNL Software. “We are excited to have Simon join the CNL Software global sales team at a time when we are seeing significant and increasing interest in our software solutions around the world and this appointment supports our planned growth strategy across the UK and mainland Europe.” “CNL Software offers innovative solutions, which are supported by a team of very talented, committed staff and I am delighted to have joined the team”, adds Simon Jones. “I look forward to expanding our portfolio of customers, while ensuring the highest possible levels of professionalism and integrity throughout the commercial engagement process. Adding increasing value to existing customers, and feeding back innovative applications for IPSecurityCenter to the technical teams will also prove an important and rewarding element to the role.” For more information, please visit www.cnlsoftware.com. sst

18

Security Solutions Today • January / February 2017


AROUND THE WORLD | IN THE NEWS

Enormous Interest for Delta’s New Fast-Close Barrier In First Month “Phones Haven’t Rung This Much Since ... 9-11”

P

almdale, Calif. - Delta Scientific, the leading manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, today announced that the threat of vehicles used as weapons has created unprecedented interest in its newest vehicle access control barrier, the HD200, which features a 0.63 second emergency fast operation (EFO). Also highlighting a very fast open/close cycle of 2-5 seconds, the HD200 was created for high traffic, densely populated locations that need high-speed open/close rates to get many vehicles in and out as well as very fast closing rates to protect the people. “We announced the HD200 vehicle barricade, which touts the fastest standard operating speed in the market in midSeptember and, already, we’ve had as much or more interest in this barrier than any we have previously introduced,” emphasizes Greg Hamm, Delta Scientific vice president, sales and marketing. “The phones have not rung this much since the days after 9-11. This only shows how security professionals have become very aware, since the tragedy in Nice, France, of how vehicles are now being used as weapons in terrorist attacks.” The fast operating HD200 barrier will bring to a full stop a 7.5 ton (6803.9 kg) medium duty truck travelling 30 mph (48.3 kph) in less than 3.3 feet (1 meter). The truck rebound after impacting the barrier was an incredible 11.5 feet (3.5 m) in its crash test. This results in a crash rating of ASTM M30/P1. With a 0.63 second EFO speed, the HD200 barrier will stop and destroy a vehicle moving at 30 mph (48.3 kph), equivalent to 44 feet (13.4 m) per second, if triggered within 50 feet (15.2 m) of the barrier. Especially in high traffic and high volume locations, the barrier is open much of the time, letting vehicles through. Therefore, when the location is heavily populated as well, the barrier must open and close frequently but equally importantly, close quickly. With a 24-inch (61 cm) shallow foundation and fully enclosed, flush mount design, the HD200 obviates the concerns of interference with buried pipes, power lines and fiber optic communication lines in urban applications. The shallow foundation also reduces installation complexity, time, materials and corresponding costs. The HD200 is perfect for high water table locations and areas with corrosive soils. It provides low maintenance as its totally enclosed face is easily removed for access. Leveraging the latest technologies, the HD200’s breakthrough EFO can be remotely controlled via fiber optics, touch screen control panels, NEMA rated control button panels and simple key switches. The HD200 barrier also features a full range of diagnostic indicators for early detection of any difficulties. As with most other Delta barricades and barriers that are properly maintained, projected life expectancy of the HD200 is 20+ years. For more information, please visit www.deltascientific.com. sst

January / February 2017 • Security Solutions Today

19


IN THE NEWS | AROUND THE WORLD

Chinese province Shandong chooses Evolis systems for the instant issuance of millions of financial social security cards

A

ngers– Evolis, the worldwide leader in personalization systems for plastic cards, has been selected by the Social Security department of the Chinese province Shandong for the personalization and instant issuance of multifunctional plastic cards. The cards are co-branded by the Shandong social security authorities and six Chinese banks and combine a debit card with a social security card. Over 400 Avansia printers from Evolis integrating retransfer-printing technology have been equipped with a specific smart card encoder by a Chinese system integrator before deployment in the banks end of December 2016. The contract, worth 1.2M $, includes consumables and spare parts. “We are proud that our company has been selected to be part of innovative high tech projects in China where multifunctional smart cards are becoming a real trend,” explains Emmanuel Picot, CEO of Evolis.

Several Million Cards To Be Issued Over The Next Years The Eastern Chinese region of Shandong is one of the most populous and most affluent provinces in the People’s Republic of China counting a population of around 97 million people. This innovative project has the aim to further develop the applications of

the classic social security card, up to now issued centrally by the social security bureau. The new financial security card can be issued in the six partner banks ICBC, ABC, CCB, BC, PSBC and Rural Credit Cooperative as a multi-application card offering life insurance, medical insurance, unemployment insurance, workrelated injury insurance and maternity insurance as well as all functions of common debit cards such as cash withdrawal, transfer, card consumption, investment and wealth management and bill payment, etc.

Evolis Proves Once Again Its Expertise In The Banking And Governmental Sector Evolis has been widely recognized as a leading provider of card issuance solutions to the Banking and Government sectors for the past 10 years. Numerous projects with governments around the world have been awarded to the French company for the instant issuance of secure identification cards, such as social security cards, national ID cards, voter cards or driver’s licenses and whereby hundreds of thousands of citizens can be equipped with a highly secure official card with minimum delay. In 2015, Evolis also became the world leader in decentralized issuance

of payment cards with more than 55,000 systems installed in bank branches worldwide.

Dedicated Project Team To meet the needs of such complex projects, a dedicated project team develops tailored solutions for system integrators willing to support any card-based project, whether local or global. Due to its flexible manufacturing capabilities and technical expertise, Evolis is able to position itself both on projects requiring large volumes of card issuance terminals and/or strong product customization.

Avansia, A System Designed For High Resolution Printing The Avansia system, released at the end of 2014, represents a new technology for Evolis, the retransfer. It allows users to print individually in offset quality and distinguishes itself by high durability. Avansia benefits from all types of encoding that can be combined: magnetic, chip with and without contact, for any type of highly secure card. Retransfer technology is suited for a large variety of applications such as secured access cards, student IDs, payment cards, official identification cards, driver’s licenses, and more. For more information, please visit www.evolis.com. sst

Do you have news for us?

Good! Email us at sst@tradelinkmedia.com.sg 20

Security Solutions Today • January / February 2017


AROUND THE WORLD | IN THE NEWS

FST Biometrics Continues Building Executive Management Roster, Adding Gary Drutin as New Chief Executive Officer Founder Maj. Gen. (Res.) Aharon Zeevi Farkash to Drive Global Strategy in New Role as President

R

ishon Lezion, Israel– FST Biometrics, the leading biometric identification solutions provider, today announced that Gary Drutin has been nominated as Chief Executive Officer, replacing Major General (res.) Aharon Zeevi Farkash, who will shift his focus to the areas of innovation and strategy development. “We are very excited that Gary is joining our team, given his outstanding sales and marketing experience and the huge market opportunity FST has in front of it,” said Farkash. “Gary’s international track record speaks volumes about his passion for building companies, and I am looking forward to working closely with him to grow our business aggressively.” Drutin joins FST from Allot Communications, where he served as chief customer officer, overseeing all sales and marketing for the company. Prior to Allot, Drutin held executive positions at Provigent (Broadcom), AudioCodes, Cisco and Digital Equipment Corporation. The addition of Drutin comes on the heels of Avi Naor’s appointment as FST board Chairman, as the company readies itself for its major growth phase. “Farkash and his team have built a game-changing solution for the human identification market,” said Drutin. “As the global population continues to increase – particularly in large cities – now is the perfect time for me to work closely with him, and with Avi Naor, to build FST as the global standard for ensuring safe, secure and convenient environments and facilities around the world.” “I’m pleased to have put together such a strong management team to lead FST in the coming months and years,” said lead investor Gary Fegel of GMF Capital. “I have full confidence that this team will guide the company to become the global standard for identification.” FST Biometrics’ award-winning, biometrics-based IMID Access In-Motion Identification system provides convenient and frictionless secure access for a variety of venues including leading enterprises, large residential complexes, office buildings, educational institutions, in addition to health and recreation centers. For more information, please visit www.fstbm.com. sst

January / February 2017 • Security Solutions Today

21


IN THE NEWS | AROUND THE WORLD

Capture Every Detail Up Close with Toshiba PTZ Cameras featuring 20x Optical Zoom Designed to take on the most intensive video surveillance demands, indoors and outdoors

I

rvine, Ca, - Toshiba Surveillance & IP Video Products, a business unit of Toshiba America Information Systems, Inc., is giving security integrators, dealers and end-users more options by introducing two new Pan-Tilt-Zoom (PTZ) 3MP IP dome cameras, both featuring 20x optical zoom and delivering razor-sharp streaming video at 2048x1536 resolution for applications requiring highly detailed surveillance, indoors and outdoors in any lighting environment.

Indoor/outdoor cameras Toshiba’s new IKS-WP8203R PTZ camera is designed to operate in the harsh outdoors with its IP66 enclosure protection, integrated heater and auto defogging, while the new IKS-WP8103 PTZ provides an attractive indoor solution for covering large spaces such as shopping malls, casinos or schools. True Day/Night imaging with Digital Wide Dynamic Range empower both cameras to capture images in high contrast and changing light conditions down to 0.01 lux. In addition to 24V, both cameras are powered with PoE+ which eliminates the need for power cables and reduces installation cost. Also, both are backed by ONVIF Profile S to ensure seamless interoperability with third-party ONVIF-conforming equipment and software.

20x optical zoom A core benefit of the new PTZ cameras is powerful, built-in optical zoom capability. It enables up to 20x optical magnification (f=4.7 ~ 94 mm, F1.6 to F3.5) and achieves quick subject tracking through a high-speed auto focusing system so operators can react instantly to suspicious situations. The cameras’ ability to precisely identify small details, such as car licenses or facial features, means they are suitable for users that demand enhanced detail when zooming in, plus makes them ideal to handle installations where detailed coverage of longer distances is essential including airports, borders, roads, cities and campuses. Superior image quality is matched by the cameras’ versatile, high-speed 360° continuous pan that achieves surveillance of large areas without blind spots, and its precision -10° to 190° tilt drive offering almost instant preset positioning. Equipped with 256 presets, pattern tour, autoscan and auto flip, nothing escapes the cameras’ PTZ. Toshiba IKS-WP8203R and IKS-WP8103 cameras make efficient use of available bandwidth by providing H.264 and MJPEG multi-streaming to satisfy different live viewing and recording settings. Both are immediately available. For more information, please visit www.toshibasecurity.com. sst

22

Security Solutions Today • January / February 2017


AROUND THE WORLD | IN THE NEWS

Save the date: Securex 2017 continues the tradition of security and fire technology excellence

W

ith 60% of stand space already sold for Securex 2017, the exhibition’s organisers, Specialised Exhibitions, are confident that the event will continue its dynamic growth pattern. Securex 2016 not only saw an impressive 20% increase in visitors – 6 374 pure visitors (excluding the flow-through from co-located A-OSH EXPO) – but also boasted an increased number of exhibitors. The 168 exhibitors, including 45 companies attending Securex for the first time, were

collectively pleased with the exhibition’s ability to attract their target markets. Joshua Low, Securex Event Director at Specialised Exhibitions, says that the exhibition enjoys the support of a number of industry associations, a fact that underlines the credibility of Securex as Africa’s leading security and fire exhibition. “We launched an aggressive marketing campaign and increased our penetration into a number of

continue on page 24

January / February 2017 • Security Solutions Today

23


IN THE NEWS | AROUND THE WORLD

pan-African countries. Exhibitors are unanimous in their demand for added exposure in these countries as they prepare for the next wave of business growth. Indicative of the success of our African campaign, we welcomed 314 international visitors from 25 different African countries. This is a year on year increase of 12% since the 2015 event,” Low points out. Hosted at Gallagher Convention Centre in Midrand, from 30 May to 1 June, Securex 2017 will include many of the visitor attractions popularised in the 2016 event. An example includes the New Products Display, situated at the entrance to the exhibition, provides registering

visitors with a sneak preview of hot new security and fire technology. Always a hit with visitors, the Securex Seminar Theatre will provide a wealth of information on relevant industry trends and legislation from knowledgeable industry specialists. “We encourage all companies engaged in the manufacturing and/or provision of security and fire products and services to choose their stand space now as interest is brisk,” Low concludes. For more information, please visit www.securex.co.za. sst

Vienna Museum Visualizes City of the Future in Exhibition Using Milestone Software The “Future of the City” exhibition at the Vienna Technical Museum illustrates the development of urban living spaces using video technology from Milestone Systems

C

openhagen - Milestone Systems, the leading open platform company in IP video management software (VMS), is playing an instrumental role in Vienna Technical Museum’s special exhibition entitled “Future of the City”. Milestone, together with partners Sony, SALTO and ESSECCA were the perfect solutions for illustrating, not only what is possible today, but also hinting at new video applications for smart cities of the future. Around half the world’s population currently lives in cities and, thus reside on only two percent of the world’s surface. **According to the UN, 66% of the entire earth’s population will be living in cities by 2050. Therefore, the museum’s security installation shows how smart cities can use video to optimize city functions and ensure citizens are safe. Vienna Technical Museum showcases the close-up process of innovation. Milestone XProtect Corporate with a Smart Wall multi-screen display offers hands-

24

on participation where visitors experience the capabilities security surveillance will offer in future urban planning. One exhibit uses a Sony fisheye camera recording a 360-degree image and a four-screen display installed with Milestone software. Guests can directly play with the camera controls or users can handle a touchscreen to zoom in to the surroundings. There are also realtime statistics counting people entering the exhibition areas. Another exhibit is the urban garbage room showcasing the value of using video in waste handling. In this installation guests experience the example of security personnel in large cities monitoring the amount of waste as well as who has access to garbage areas. If motion is detected in an unauthorized area, an alarm is triggered. This garbage room display is an example that has proven to be both innovative and evocative. The access control room works via SALTO software. Sony supplied the cameras and ESSECCA, leading

Security Solutions Today • January / February 2017

supplier of Austrian security solutions, helped bring the project together. Milestone Systems has always attached great importance to a partner ecosystem that uses the open platform to collaborate. “For video monitoring and equipment in Vienna Technical Museum, XProtect Corporation solution from Milestone Systems was used as it offers open IP video management software”, explains Michael Reiner, authorized officer at ESSECCA GmbH. “Hence, an integrated solution with various external systems is how we have the greatest possible flexibility”. Vienna Technical Museum’s “Future of the City” s intended as a starting point in new exhibitions that explore the future. Urban life, mobility and urban energy are the various themes to be explored in this topic. The urban cities installation is now a permanent exhibition and the museum welcomes both local and international audiences. For more information, please visit www.milestonesys.com. sst


EYE ON ASIA | IN THE NEWS

Secutech 2017 introduces two new, featured areas CompoSec and Secutech Awards deliver solutions and insights

S

ecutech will return for its 20th edition from 12 – 14 April 2017, celebrating its status as the ideal platform to explore and expand business for the global safety and security industry. Held at the Taipei Nangang Exhibition Center, the show will house more than 450 exhibitors across an exhibition space of over 35,800 sqm. Prominent brands have already confirmed their participation, including ALGATEC, Antaira, BXB, Dahua, DINTEK, Hikvision, HiSharp, HOMESCENARIO, Lilin, Rotasun, Shany, SYRIS, TIBBO, Vivotek and Yoda. Secutech 2017 is expected to attract more than 26,000 visitors from different parts of the world. Introducing the highlights of the upcoming edition, Ms Regina Tsai, Deputy General Manager of the show organiser said: “After two decades, Secutech has established itself as a must- attend event for professionals from the safety and security industry. Striving to stay on top and keep up with the fast-developing technologies, the fair never ceases to offer visitors the latest trends and market intelligence. In 2017, two brand new featured areas including the Intelligent Video Analytics Demo and Unmanned Aerial Vehicle (UAV) Application Pavilion, will be erected in light of the surging demands of related technology applications across different business sectors.” The Intelligent Video Analytics Demo will debut in response to the prosperous development of the market. Video analytics technology continues to mature with innovations in intelligent image analysis and 3D, which can be

Secutech | 12 – 14 April 2017

International Exhibition and Conference for Electronic Security, Info Security, Fire and Safety Taipei Nangang Exhibition Center Taipei, Taiwan applied to security management and other commercial purposes. Thus, solution providers such as Digifort, HuperLab, IRONYUN, LIPS, NX, OlnfO, SKYREC and TCIT are going to make good use of the Secutech platform to showcase their state-ofthe-art products and technologies. Visitors will be able to see live demos of smart video tracking, 2D / 3D people counting, direction detection and hot spot analysis. Also new to the fair is the UAV Application Pavilion, where visitors can understand how drones incorporate the integration of wireless remote technology and vision, as well as its applications in security for detection and rescue purposes. Other dedicated zones include the Software Innovation Zone, which features advanced concepts and breakthroughs in software and platform connecting security devices, as well as the Intelligent Solution Pavilion where intelligent solutions for transportation, retail businesses and factories will be presented.

CompoSec and Secutech Awards deliver solutions and insights Alongside the product showcase at Secutech, a series of fringe events will be arranged to add value to the visitor experience. The CompoSec and Secutech Awards are two major events that display innovative solutions and new insights. The CompoSec forum will highlight four technology trends that unfold the future development in the area of R&D. The first trend will be on

security components, focusing on the applications of H.265 codec in chips, VCA / IVS1 image processing chips, biometrics chips and more. The IoT component trend will emphasise the application of sensors in smart factory, healthcare, smart home and Internet of cars. The CPU / GPU / MCU2 Platform refers to core chips for CPU / GPU servers to provide quality video data processing and MCU for controllers and sensors that fulfil IoT applications. The fourth trend will center on transmission and highlight LoRa, NB-IoT and SIGFOX wireless transmission. Secutech Award 2017 will display and review the next generation 4K UHD intelligent image monitoring performance. Through the demonstration, award-winning suppliers will showcase their products and underline their strengths on image control, video smart stream saving, smart videos, as well as storage capability and software. Visitors will find it easier to make comparisons and evaluations according to their requirements to source the best products. Secutech is organised by Messe Frankfurt New Era Business Media Ltd and is held concurrently with SMAhome Expo and Fire & Safety. For more details, please visit www. secutech.com. VCA/IVS: Video content analysis / Intelligent Video Software 2 CPU/GPU/MCU: Central processor unit / Graphic processing unit / Microcontroller 1

For more information, please visit www.messefrankfurt.com. sst

January / February 2017 • Security Solutions Today

25


IN THE NEWS | EYE ON ASIA

Honeywell Puts Building Controls In Occupants’ Hands Mobile software application enables building occupants to tap into Internet of Things capabilities to address common building issues including temperature settings, access control

N

ew Delhi– Building occupants long have grappled with who to call when their work area is too cold, or how to gain access to a facility when they forget their access card at home. Honeywell (NYSE: HON) today announced a new mobile software application for building occupants that addresses these common frustrations. The Honeywell Vector Occupant App combines the convenience of today’s mobile devices with connected building features to give users more control over their comfort levels and ability to securely move about the work place. The new software is the latest example of Honeywell’s leadership in the Internet of Things around connected buildings. The new app provides digital identification and integrates with core building functions, including access and comfort control, to enhance building occupants’ experience with the touch of a screen. The app’s access control capability eliminates the need for physical cards or fobs and gives users secure access via their smart phones. In addition, occupants can quickly and easily communicate temperature discomfort for real time adjustments instead of the more time-consuming process currently used of seeking out a facility manager or making a phone call to request temperature changes. Facility managers, in turn, benefit from immediate insight into where and how comfortable occupants are, so they can make adjustments more quickly and easily. And, the app’s digital identification and access control capabilities make it easier to manage occupant credentials, eliminating the need for keeping track of and replacing misplaced access cards. “Occupant engagement is an increasingly important aspect of intelligent building solutions,” said Casey Talon, principal research analyst, Navigant Research. “The smart phone app is an innovative new platform for gathering insight that can refine environmental conditions to optimize workspaces.”

Backed by a cloud-based architecture and enabled by HID Global’s Seos® credential technology, the Honeywell Vector Occupant App works independently of underlying building systems, enabling widespread use and adoption. Administrators within facilities deploying the app access a cloud portal to manage users and features such as corresponding user identification and credentials. Users who download the app must receive an invitation from the administrator in order to gain access to its features. “Smart phones and apps continue to enhance our everyday lives, from allowing us to hail a cab to giving us direct insight into where we stand on a restaurant waiting list. We’re now applying these same concepts of insight and control to how one interacts with a building,” said Aseem Joshi, regional general manager, Honeywell Building Solutions, India. “Buildings are alive and teeming with opportunities for users to interact with them—if you can make the right connections. continue on page 27

26

Security Solutions Today • January / February 2017


EYE ON ASIA | IN THE NEWS

The Honeywell Vector Occupant App facilitates these interactions, so users can create their best experiences.” The app currently features three layers, including:

• •

Digital Identification – Eliminates the need for plastic badges or temporary tags and solves the issue of outdated photo IDs by providing an up-todate photograph. Convenient Access Control – Builds on the app’s digital identification feature, offering mobile-based access control that can easily be managed by a facility, and eliminating the need for tracking and replacing cards or fobs. Occupants, in turn, have one less item to carry, and can open doors from greater distances than traditional key cards and fobs. One-Click Hot/Cold Calls – Provides a quick and direct way for occupants to indicate when their work areas are too hot or too cold, and to receive confirmation that their issues are being addressed. Facility managers are alerted to occupants’

discomfort in real time, and can view call location, watch for patterns and quickly make adjustments to satisfy occupants. The Honeywell Vector Occupant App is part of Honeywell’s approach to connected services, which leverages the connectivity of buildings to improve how they operate and the experiences they offer for those who visit and work within them. The app is also the latest addition to Honeywell’s mobile software strategy, a significant part of the company’s efforts to provide the latest technology innovations to help keep facilities safe, secure, comfortable, productive and energy efficient. Future enhancements and capabilities are planned for the app that will take advantage of building connectivity. The Honeywell Vector Occupant App currently works with Apple and Android products and is available on iTunes® and Google Play™. For more information, please visit www.honeywell. com/country/in. sst

Tianjin Metro Extends its Qognify Video Management System to Cover New Lines Qognify supports Tianjin Transit Group’s expansion with field-proven capabilities

Q

ognify, formerly NICE Security, today announced that the Tianjin Rail Transit (TRT) in China will be extending its Qognify video management system (VMS) to provide coverage for the city’s Metro expansion. In total, Qognify technology will be helping to secure over 273 kilometers of transit lines and 42 stations, by effectively managing output from over 4,000 video cameras. Tianjin, a metropolis in northern coastal China located near Beijing, is experiencing steady population growth with currently over 15 million inhabitants. In 2015, the Tianjin Transit Group, the body responsible for managing the city’s major Metro construction project, deployed Qognify’s video management solution. Since then, the solution has been a vital part of security management, which enabled the Group officials to confidently make the choice to extend the solution to the newly built lines. “For large-scale metros, managing security in a unified, centralized and robust way is always a big challenge to operators, public security, and government authorities,” said Mr. Song, Director of Construction, Tianjin Transit Group. “With Qognify’s advanced technology and deep transportation industry experience, we’re able to provide passengers a safe and secure environment, and to our employees an easy to access, scalable, and stable system to monitor and manage our entire Metro. These capabilities give us confidence to build more metro lines in Tianjin, which will greatly increase the friendliness of the city. We trust Qognify and believe they have the depth of experience we need.” “There is a unique combination of the right technology and breadth of transportation relevant experience that makes a massive difference to the success of large scale transportation projects such as the Tianjin Metro,” commented Moti Shabtai, President of Qognify. “Tianjin Metro sets an example for public transport organizations and we’re proud to be able to provide the required level of expertise as we solidify our market-leading position in the transportation sector.” For more information, please visit www.qognify.com. sst

January / February 2017 • Security Solutions Today

27


IN THE NEWS | EYE ON ASIA

Ixia opens APAC Center for Cyber Defence, Testing, and Network Visibility Solutions

S

ingapore – Ixia (Nasdaq: XXIA), a leading provider of networking testing, visibility, and security solutions, has launched its Asia Pacific Executive Briefing Center (EBC), in response to the increasing need for organizations to test, monitor, optimize and defend networks. Located in Ixia’s Singapore headquarters, the new Executive Briefing Center is one of three such global centers and the first in Asia Pacific. The Ixia EBC is unique as it emulates a variety of network environments and can run simulations with data traffic flows of any volume. At the same time, the closed data environment also makes the Ixia APAC EBC an ideal location for cyber range training sessions. “The Ixia Executive Briefing Center is unique and a highly valuable offering for IT professionals who struggle to run real-time stress-testing on their existing infrastructure, as well as simulate data breaches with the latest malware for training purposes,” said Naveen Bhat, Managing Director for Ixia in Asia Pacific. “Ixia has fitted our EBC with enterprise-grade hardware from the industry’s top vendors to offer our customers the most accurate simulation of both benign and malignant traffic to help prepare for such an attack.”

Cyber range training – a crucial exercise for corporate IT teams One of the top uses of the Ixia APAC EBC is expected to be cyber range training. A cyber range offers real world attack scenarios for cybersecurity exercises. Corporate IT teams can rehearse their roles and responsibilities under the strain of an attack, which can range from Zero Day to a massive-scale Distributed Denial of Service (DDoS) attack. This level of cyber self defence capabilities can help business leaders address current security concerns. In fact, only 45 percent[1] of organizations worldwide expressed confidence in their security posture.

Maintaining application uptimes crucial for success in cloud, virtualized, and mobile environments A 2016 IDC multi-client study[2] revealed that that more than half of the organizations surveyed are embracing cloud deployments for their application workloads. At the same time, an average-sized company uses between 10 and 16 cloud-based applications. Layer on the additional use of mobile devices, and an increasingly large percentage of corporate data traffic will flow to the cloud, extending the network perimeter. The Ixia APAC EBC will demonstrate ways to measure the quality of experience of these real-time, businesscritical applications and share best practices for maintain performance in a reliable, fast, and secure manner. The Ixia APAC EBC is a one-stop demonstration arena of Ixia’s end-to-end solutions for customers. It is also intended to facilitate industry interaction and the co-development of solutions with partners, and will promote learning and research on cybersecurity through seminars. For more information, please visit www.ixiacom.com. sst

Do you have news for us?

Good! Email us at sst@tradelinkmedia.com.sg 28

Security Solutions Today • January / February 2017


EYE ON ASIA | IN THE NEWS

New McAfee Survey Reveals Only 45 Percent of Consumers Take Proper Security Measures to Protect Their New Gadgets Streaming Sticks, Drones and Smart Home Products Top List of Devices that Can Compromise Consumers’ Security if Left Unprotected News Highlights

• • •

Survey reveals that 80 percent of consumers will likely holiday shop online this year Holiday season brings new gifts, and while 85 percent of consumers start using connected devices within the first day of receiving it, only 45 percent claim they take the proper security measures Consumers know it’s important to secure their devices, but nearly half (46 percent) are uncertain whether they are taking the proper security steps to do so

S

ingapore–Intel Security has announced its second-annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. The No. 1 most hackable gift category included laptops and PCs, followed by smartphones and tablets, media players and streaming sticks, smart home automation and devices, and finally, drones. To accompany the list, Intel Security conducted a survey to identify the risky behaviors consumers are engaging in during the holiday season and educate them on how to protect themselves. Today’s digital world is changing fast, and our reliance on the internet is ever increasing. The recent distributed denial of service (DDoS) attack was carried out by a botnet made up of unsecured webcams and other internet of things (IoT) devices, and crippled many popular websites connected to the Dyn domain. It’s important that consumers understand they can help fight these attacks by ensuring their devices are updated and patched, which helps mitigate risks from the latest threats. “Unsurprisingly, connected devices remain high on holiday wish lists this year. What is alarming is that

consumers remain unaware of what behaviors pose a security risk when it comes to new devices,” said Gary Davis, chief consumer security evangelist at Intel Security. “Consumers are often eager to use their new gadget as soon as they get it and forgo ensuring that their device is properly secured. Cybercriminals could use this lack of attention as an inroad to gather personal consumer data, exposing consumers to malware or identity theft or even use unsecured devices to launch DDoS attacks as in the recent Dyn attack.” While a majority of consumers are aware of the vulnerabilities in older connected devices like laptops (73 percent), mobile phones (70 percent) and tablets (69 percent), they lack awareness about the potential risks associated with emerging connected devices, such as drones (20 percent), children’s toys (21 percent), virtual reality tech (18 percent), and pet gifts (11 percent). As technology continues to evolve, it is essential consumers understand the risks associated with even the most unassuming devices. While 75 percent of consumers believe it’s very important to secure their online identities and connected devices, nearly half are uncertain if they are taking the proper security steps.

This Year’s Most Hackable Holiday Gifts Include: 1.Laptops and PCs – Laptops and PCs make great gifts, however, malicious apps targeting PCs are unfortunately common, and are not just limited to Windows-based devices. 2.Smartphones and Tablets – Survey results revealed that 64% of consumers plan to purchase either a smartphone or tablet this holiday season. Just like PCs and laptops, malware could result in personal and financial information being stolen. 3.Media Players and Streaming Sticks – Media players and streaming sticks have changed the way consumers enjoy movies and TV, but consumers can unknowingly invite a cybercriminal into their living room by failing to update their device. 4.Smart Home Automation Devices and Apps – Today’s connected home devices and apps give users the power to control their homes from their smartphone. Unfortunately, hackers have demonstrated techniques that could be used to compromise Bluetooth powered door locks and other home automation devices.

January / February 2017 • Security Solutions Today

29


IN THE NEWS | EYE ON ASIA

5.Drones – Drone sales are expected to grow to more than $20 billion by 2022. They can provide unique perspectives when it comes to shooting video and photos. However, not properly securing the device could allow hackers to disrupt the GPS signal, or hijack your drone through its smartphone app.

Tips for Consumers to Protect Holiday Cheer To stay protected for a happier and safer holiday season, Intel Security has the following tips: • Secure your device. Your device is the key to

controlling your home and your personal information. Make sure you have comprehensive security software installed, like McAfee LiveSafe™.

Only use secure Wi-Fi. Using your devices, such as your smart home applications, on public Wi-Fi could leave you and your home open to risk. Keep software is up-to-date. Apply patches as they are released from the manufacturer. Install manufacturer updates right away to ensure that your device is protected from the latest known threats.

Use a strong password or PIN. If your device supports it, use multi-factor authentication (MFA) as it can include factors like a trusted device, your face, fingerprint, etc. to make your login more secure Check before you click. Be suspicious of links from people you do not know and always use internet security software to stay protected. Hover over the link to find a full URL of the link’s destination in the lower corner of your browser.

For more information, please visit www.intelsecurity.com. sst

Asia Pacific Businesses Focused on Achieving Digital Maturity in 2017 According to Hitachi Data Systems All areas of the enterprise expected to feel the benefit as region takes the lead on digital transformation

S

ingapore -Hitachi Data Systems (HDS), a wholly owned subsidiary of Hitachi, Ltd. (TSE:6501), today released its key Business and Technology Trends for Asia Pacific in 2017. According to Hubert Yoshida, chief technology officer of Hitachi Data Systems and Russell Skingsley, chief technology officer of Hitachi Data Systems Asia Pacific, digital transformation will continue to dominate enterprise IT strategies in 2017, as trends in a number of areas emerge.

upcoming Forbes Insights research survey, sponsored by HDS, enterprises in APAC generally believe they are further ahead in their digital transformation journeys than their global counterparts. A belief that is likely to be validated in 2017.

“With digital transformation rising up the agenda of CIOs across the world in 2016, we expect to see an increasing number of organizations striving to reach digital maturity in 2017,” comments Skingsley. According to the findings of an

1:Productivity Gains Will Be More About People, Process and Business Outcomes

In line with the Forbes survey, which will be officially published end of November, Yoshida and Skingsley have identified five trends for the technology market in 2017.

Despite the explosion of new technology over the past 10 years, productivity has declined compared

to the previous 10 years according to the Organization for Economic Co-operation and Development. According to Yoshida, this is because new processes have not kept up with new technologies. continue on page 31

30

Security Solutions Today • January / February 2017


EYE ON ASIA | IN THE NEWS

In the hospitality business, Airbnb has had access to the same technology as traditional hotels, but it has created a new business model that has enabled it to grow to a market valuation of $30B USD in less than 10 years. Digital transformation is about transforming the business through people and process, as well as through innovative use of technology. As a result, agile infrastructure, cloud, and the benefits of DevOps will gain greater attention as a way to speed up the development and deployment of applications and services with less defects and wasted effort.

with management software, IT will want access to the converged systems required to deliver infrastructure-as-a-service. These will enable enterprises to drive out even more cost and streamline infrastructure operations even further by combining converged solutions, like Hitachi’s United Compute Platform, with cloud management portals, like VMware vRealize, to deliver a pre-engineered approach for public, private, and hybrid cloud via a single management interface.

“The biggest benefit of agile infrastructure and cloud delivery models is the empowerment of those with the most business insight and most innovative ideas to drive their own technology projects. It’s really about putting the power of innovation into the hands of those with the best ideas”, added Skingsley

Bimodal IT refers to two modes of IT:

2: Accelerating Transition to Cloud Cloud-first strategies are the foundation for staying relevant in a fast-paced world, according to Ed Anderson- research vice president at Gartner. The Asian market has been quick to embrace this approach, with Asia leading the world in this year’s Cloud Readiness Index by Asia Cloud Computing Association. “It is clear that the predominant cloud model for the foreseeable future will be hybrid, as most understand the agility benefits of cloud but are not willing to move entirely to public cloud at this point. We expect this to continue throughout 2017,” comments Skingsley. As a result, IT managers across APAC will be focused on developing skills in cloud monitoring, cloud workload performance and security management, and cloud capacity management. Instead of buying infrastructure from different vendors and knitting them together

3: Bimodal IT

· Mode 1: Traditional — emphasizes safety, accuracy and availability. · Mode 2: Nonlinear — emphasizes agility and speed. In the same way that hybrid cloud will continue to be the predominant model for years to come, so too will bimodal IT continue to be necessary. While many may wish for the ability to simply do away with legacy application stacks and start afresh, the reality of the need for business continuity built on well understood and supported missioncritical systems continues. IT must be able to manage both modes and implement systems that can bridge between them. Converged infrastructure solutions can modernize mode 1 systems and bridge to mode 2 ones via orchestration and cloud ready interfaces. Skingsley adds, “From a storage perspective it is important that data from both IT modes can be leveraged, so organizations will look more to systems that can bridge the gap between the two. This means the ability to present cloud protocols, the capability to be instantiated on-premise or in public clouds and to facilitate data mobility between these environments.”

While the need to operate bi-modally may be seen as a necessary evil, organizations will not tolerate data being stranded in mode 1 islands at the cost of valuable business insight. Tools like Pentaho Enterprise Data Integration, that can bring together the data warehouse of mode 1, with the unstructured data of mode 2 to provide users with a clear view of all their data, will gain significant traction. 4: A Centralized Data Hub Data is becoming increasingly valuable. Recent IDC research revealed that 53% of organizations in the region consider big data and analytics important and have adopted or plan to adopt it in the near future. Companies are finding new ways to correlate and merge data from different sources to gain more insight, while repurposing old data for different uses. “It is a clear lesson learnt from the highly disruptive internetbased businesses that the ability to wield data effectively is extremely valuable. Many of these businesses are fundamentally data, a simple interface and insightful business logic. Traditional enterprises realize now that they have not used their valuable data as effectively as they might have,” says Skingsley. To ensure the governance and accessibility of this data, IT needs to create a centralized data hub for better management, use and protection of their data. This centralized hub will need to be an object store that can scale beyond the limitations of traditional storage systems, ingest data from different sources, and provide search across public and private clouds as well as mobile devices. Skingsley calls this the “repository of everything an organization knows” and believes that organizations can no longer abide by archiving or backup systems that leave this potentially important data stranded.

January / February 2017 • Security Solutions Today

31


IN THE NEWS | EYE ON ASIA

5: Growing Awareness of IoT in the Data Center The networking of things will affect every aspect of our lives, and while this may not become a major trend for APAC next year, according to Yoshida the decisions we make in IT in 2017 should be made with an eye to IoT. “The integration of IT and OT with analytics is the first step. Today, IoT requires data scientists and

researchers with deep domain expertise and most projects are in the proof-of-concept stage. In 2017 we will be at the stage where we have the recipe for IoT projects, like train-as-a-service or industry 4.0. Hitachi Data Systems, along with other divisions in Hitachi and outside partners, is developing an IoT core platform, Lumada, to develop these recipes and deliver baked IoT solutions that are open, adaptable, verified and secure,” comments Yoshida.

Russell Skingsley adds, “Next year’s trends are being driven by a clear enterprise demand to deliver on all the promises of digital transformation, with APAC set to lead the way. Regardless of industry, IT is seeing a fundamental shift as enterprises embrace the new revenue streams, efficiencies and possibilities provided by digitization.” For more information, please visit www.hds.com. sst

GCC education sector beefs up safety and security with biometric cloud-based systems Intersec 2017 shines spotlight on emerging technologies as Middle East outpaces global growth in biometric solutions

D

ubai, UAE: A Dubai university’s cloud-based Intersec 2017 | 22-24 January biometric time attendance system is growing in Dubai International Convention and Exhibition popularity across the Gulf Cooperation Council Centre (GCC), as the regional education sector joins other industries adopting new technology to boost safety and security. The Hult International Business School in Dubai was the first to test Swiss company TBS’s (Touchless Biometric Technology) 3D technology to record class attendance via a wirelessly connected kiosk and a touchless fingerprint sensor at the entrance of each lecture room, ensuring all students sign-in, even if they’re late. Alex Zarrabi, CEO of TBS, said the successful installation on the Dubai campus served as a persuasive example to Hult’s other locations, spanning over three continents; its readers are now installed in Hult campuses in London, Boston, and San Francisco. “All four sites on three continents are synchronised instantly, giving the college real-time and global control on their time and attendance data for all their students,” said Zarrabi, who will showcase the TBS 3D-Terminal and other biometric access control solutions at the Intersec trade show taking place in Dubai in January 2017. “The TBS solution allows seamless monitoring of student transfers between campuses, allowing for instant automatic and accurate tracking across different time zones. The benefits and its ease of use have convinced many universities. It’s not only solving attendance for Hult, but also for other prestigious colleges in the Gulf, such as Umm Al Qura and Hail universities in Saudi Arabia, and more than 1,000 schools for the Ministry of Education in Oman. This list is constantly growing,” he said. TBS is one of many exhibitors showcasing biometric and cloud-based security solutions at Intersec 2017, the world’s largest trade show for security, safety, and fire protection, which takes place from 22-24 January at the Dubai International Convention and Exhibition Centre. The rise in emerging technologies comes as the global market for biometrics systems is expected to reach US$24.4 billion by 2020, according to research firm MarketsandMarkets, growing annually by 18% between 2015 and 2020. Analysts from TechNavio forecast that biometrics in Middle East will grow faster at 19% annually up to 2019. continue on page 33

32

Security Solutions Today • January / February 2017


EYE ON ASIA | IN THE NEWS

Zarrabi said the rising popularity of biometrics in the Middle East is down to several factors: “The Middle East is a world-leader in biometrics, regardless of economic ups and downs,” he said. “There’s a higher awareness about safety and security issues and consequently customers plan to allocate the corresponding budget. Additionally, Techsavvy GCC governments have an inclination for convenient modern solutions based on biometrics and allow their widespread usage”. Added Zarrabi: “Biometric readers can be used not only for monitoring attendance, but also for regulating access to secure locations. Industries range from Energy sector, Corporations, Healthcare, Government, Education, Finance, Airports and more. “TBS readers can perform both functionalities simultaneously, logging time and granting access. One example is Abu Dhabi Media Company, which uses 3D touchless fingerscan on speed gates at the entrance. In one go, both attendance is logged and access is controlled.” Another exhibitor at Intersec 2017 with a wide range of biometric solutions is Matrix Comsec from India, which returns to launch its COSEC DOOR FMX, a high-performance Door Controller with a multispectral sensor that reads wet, dirty, elderly, and oily fingers. Sagar Gosalia, Senior Vice President for Marketing and Sales at Matrix Comsec said that the company’s biometric Access Control and Time-Attendance solution is hugely popular in the Middle East and African market: “The last 12 months have been quite exciting for us,” he said. “We’ve successfully executed a few major projects across the Middle East, installing Time-Attendance and Access Control solutions for Paris Group and Dulsco in Dubai, the United Development Company and Qatar Metro in Qatar, Khimji Ramdas in Oman, Al Mujdui in Saudi Arabia, and the Kuwait Oil Corporation in Kuwait. “We’ve been a growing player in the Middle East and Africa, and would like to continue the same trend for the upcoming year. We aspire to grow at an average rate of 40% over the coming years,” he added. Elsewhere, WatchNET from Canada is another exhibitor launching a CLOUD based Access Control System and Integrated Security Solution at Intersec 2017. Sathish Arya, General Manager for WatchNET in the Middle East and Africa said: “The Middle East market is good for video analytics as the demand is growing with an increased accuracy of products / solutions. As far as the Biometric market is concerned, it is growing faster in eGovernance & Identification solutions.” “We’ve received large and multi-location projects across the GCC, including more than 100 petrol stations, jails, and around 1,600 locations of integrated access control & CCTV solutions across the region. We’re experiencing 20% CAGR every year in Middle East.” Other exhibitors at Intersec 2017 specialising in biometric and cloud technology include AllGoVision from India, UAE companies Al Asma Technology, CP Plus, and Hanwha Techwin; Polish manufacturers Digital Guardian and Easy Clocking; Suprema from Korea; and Iris ID from the USA. Ahmed Pauwels, CEO of Messe Frankfurt Middle East, the organiser of Intersec, said: “Intersec, as the premier business networking and trade event for the safety, security and fire protection in the wider region, has served as a regional bellwether and launch pad for many a new technological innovations.” “Biometric technology and the use of cloud-based security systems are the latest trend in effective and efficient access control solutions worldwide and will be showcased for the benefit of regional trade buyers.” In its 19th edition, Intersec 2017 will feature more than 1,300 exhibitors from 52 countries, while over 31,000 visitors from 128 countries are expected to attend as they seek the latest solutions across seven show sections of Commercial Security, Fire & Rescue, Safety & Health, Homeland Security & Policing, Perimeter & Physical Security, Information Security, and Smart Home & Building Automation. For more information, please visit www.intersecexpo.com. sst

January / February 2017 • Security Solutions Today

33


COVER FOCUS

Photo Credit: Adobe stock images

Event Security and the Next Bout of Video Technology 34

Security Solutions Today • January / February 2017


COVER FOCUS

L

arge-scale events pose a unique threat to security officials, with the possibility of unruly crowds, low lighting during a concert or show, and the problems associated with the entering and exiting of thousands of people at the same time. Officials in these locations oversee keeping peace while responding to incidents and using data gathered to address potential problems proactively. Investing in advanced technologies, such as video surveillance and business intelligence, enables stakeholders to deliver a safe, exciting and exclusive entertainment experience. Video surveillance solutions can go a long way in protecting assets, attendees and staff during and after events, while also providing officials with valuable information on how best to respond to issues of overcrowding or high traffic in certain areas. In this article, we outline several ways video technology can be used in large-event and stadium security.

Panoramic Event Coverage

By Stuart Rawling, Director of Global Business Development, Pelco by Schneider Electric

Panoramic surveillance has taken a front seat in recent years, offering end users the ability to deploy a single camera in place of four to five traditional pan-tilt-zoom (PTZ) cameras, resulting in significant cost savings. For a specific event, panoramic cameras achieve broader coverage and improved image quality with fewer hardware investments. For example, in a large parking area, a panoramic camera can be used to assess potential threats during slower times, and monitor activity in real time. Another example is in tunnels, such as those found in a service area or leading into an arena. PTZ cameras can only see in the direction they are facing – and in some cases, incidents may occur where the camera is not pointing. Using a panoramic camera, however, can eliminate these “blind spots” by providing continuous coverage.

January / February 2017 • Security Solutions Today

35


COVER FOCUS

Photo Credit: Adobe stock images

Video Management and Storage In any event situation, incidents will arise involving angry fans, accidental slips and falls, or even vandalism and theft. The ability to quickly and efficiently pull up footage surrounding one of these incidents is critical for officials. With video management system (VMS), officials can pinpoint the exact time and location of an incident using thumbnail and timeline searches for much faster and more accurate investigations. Additionally, many VMS solutions offer a mobile application, which means officials on the ground can see exactly what’s going on in a control room at any given time, helping direct them to the scene faster and more accurately in the event of an incident. VMS platforms also have the ability to use built-in analytics to analyze traffic flow during an event or engage in people counting, which can be used to help stakeholders

36

gain more insight into peak traffic areas. For example, video cameras can collect footage from the mezzanine of an event arena. Then, the data collected can be analyzed based on the number of people in a certain area of the arena or as a result of apparent congestion in a specific location. This information can be used to alert officials to potential problems that, if not addressed, can hinder official response in the event of a threat. Additionally, traffic flow issues can be mitigated in real-time so that officials can open a new lane for security screenings or another door for more exit options. The intelligence delivered by analytics not only helps officials maintain a secure presence during a large-scale event, the data also can be used to streamline business operations.

Lighting Challenges

Large concerts often stadiums and arenas to under minimal lighting, way for pyrotechnic and

Security Solutions Today • January / February 2017

require operate making unique

light shows that have become synonymous with today’s largest tours. Artists want to dim lights or use bright spotlights during performances, so officials have to be prepared to capture clear images in any scenario. Superior image quality in extreme lighting conditions is critical for today’s modern arenas and stadiums, which is why deploying cameras with low-light capabilities is crucial. For many arenas, stadiums and large-scale event spaces, video surveillance solutions are valuable tools for enhancing the safety and security of attendees, artists, athletes and staff, as well as millions of dollars in assets. Not only can video data be used to maintain security during major events and concerts, it can also be used to optimize business operations for building management and personnel in an effort to streamline proactive response. For more information, please visit www.pelco.com. sst


KEEPING UP A STEADY FLOW OF INFORMATION | APPLICATIONS

Keeping up a steady flow of information Global scope combined with local support: secure radio communications from Airbus Defence and Space for safe and well-coordinated sporting events

T

op sporting events are magical moments for sportsmen and women and audiences alike with many records being made, goals scored and victories celebrated. A huge amount of effort goes into the meticulous planning of such events, which takes months and even years depending on size, with hundreds of people organising the event for many thousands or millions of TV viewers. Essential for the organisation of successful sports events are secure communications between organisers and participants. For many years now, digital radio communications have facilitated the secure and fast transmission of essential information. Providers of this technology are involved in arranging events such as the Olympic Games or football tournaments: for instance Airbus Defence and Space, as the major provider of Professional Mobile Radio technology, provided event managers and staff not only with radios, base stations and independent network coverage, but also advised them to provide extensive support on the operation of these radio communications systems. To set up a stable and effective radio network, Airbus Defence and Space needs to know in advance the size of the site, the

© Olympic Games

number of people attending the event and the complexity of the coordination team. Looking back to 2016, Airbus Defence and Space was able to successfully support some of the most exhilarating sport events: the Olympic Games in Rio, the European football championships EURO 2016 in France and the Biathlon World Cup in Oslo. To protect the Olympic Games in Rio de Janeiro, Airbus Defence and Space equipped the Brazilian federal police with radio communication

systems based on Tetrapol technology. The existing network in Rio de Janeiro implemented by Airbus Defence and Space covered all crucial locations, including the main venues, such as Maracanã and the Olympic village, the airports and the main routes of the city. In addition, radio communication for public safety services was available within the venues and the basement of Maracanã. This network also covered stadiums in the cities of Brasília, São Paulo, Salvador, Belo Horizonte and Manaus where football matches took place as part of the Olympics.

January / February 2017 • Security Solutions Today

37


APPLICATIONS | KEEPING UP A STEADY FLOW OF INFORMATION

Space coordinated the actions of public safety organisations to ensure security during Europe’s most important football event, the EURO 2016 football tournament. During the competition, 42,000 police officers, 30,000 gendarmes and 5,000 rescue service personnel all worked towards securing the stadiums and host cities.

© Airbus Defence and Space

During the games, the radio system in Rio consisted of 11 Tetrapol base stations with eight channels supporting more than 2,000 TPH700 terminals from Airbus Defence and Space in use by more than 40 conversation groups simultaneously; also core equipment and communication links in order to provide good network capacity. “Tetrapol was the official means of communication for all federal police staff involved in the operation. All our officers were coordinated through Tetrapol. Helicopters, boats and tactical vehicles were

also equipped with mobile Tetrapol terminals. Therefore, Tetrapol met our expectations,” says Aluisio Sardinha, coordinator of federal police Tetrapol operations in Rio de Janeiro. The federal police also cooperated with more than 50 foreign police forces to ensure the safety of the athletes and visitors. The Tetrapol system was integrated with the radio network of other forces. The French mission-critical radio networks INPT and RUBIS provided by Airbus Defence and

To reinforce security during the EURO 2016 event, tactical cells were set up to ensure communications for the special forces. Moreover, several fixed Tetrapol repeaters were placed at strategically important sites, such as police headquarters and stadiums. These tactical cells were interconnected via a virtual private network so the police forces could exchange information in the usual manner, inside and outside the grounds. This meant that they could also stay in permanent contact with the crisis management team based in Paris. To enable fast and secure communication among the coordination staff during the Biathlon World Championships 2016 in Oslo Holmenkollen, Airbus Defence and Space provided Tetra based systems: 260 Airbus Defence and Space THR9i and THR880i Tetra radios were used, as well as 26 base stations, a DXT3c switch and several RCS9500s. “The organising committee relied on a radio communication network that had been tried and tested at other large sports events”, says Erik Trosby, chief of communications in Oslo 2016 and in charge of the local organising committee. All of these events were a success because they proceeded smoothly and ended safely.

© BillyBonkers

38

Security Solutions Today • January / February 2017

For more information, please visit www.securelandcommunications. com. sst


DAHUA DELIVERS EFFICIENT AND RELIABLE SAFE CITY SOLUTION | APPLICATIONS

Dahua delivers Efficient and Reliable Safe City Solution

H

angzhou,China- Dahua Technology, a worldleading manufacturer and supplier of video surveillance products headquartered in Hangzhou, China, launched an efficient and reliable safe city solution. Recently, rapid economic and city development create big challenges to urban centers. The challenges range from crime, terrorist threats, and traffic management to natural disasters. Insufficient manpower and system capacity to protect the city from these challenges poses a big issue. Therefore, finding an efficient solution to control and manage these challenges are important to a smooth running city.

Dahua Safe City Solution Dahua has created an advanced safe city solution to enable police, transportation authority and other departments to deal with safety threats using less police force but delivering faster response. The end-to-end solution provides reliable cameras; integrated platform and intelligent technologies to ensure cities are well guarded and efficiently run. Dahua safe city solution was designed with four essential aspects: Reliable prevention via face recognition technology Armed with the No.1 face recognition algorithm in the latest LFW (Labeled Faces in the Wild) result, Dahua face recognition can effectively identify suspects in key areas of city such as downtown center, transportation hub, highrisk border and restricted infrastructure instantly. As a matter of fact, more than 100 sets of face recognition cameras have already been deployed to cover most crucial transportation hubs of Hangzhou during G20 Summit. Real-time response via integrated platform Integrated platform is tasked with unified command and centralized data storage to provide rapid emergency response and cross-system or cross-department information sharing. Through cross-department collaboration, the integrated platform ensures real-time incident response and better police resources dispatching. In addition, mobile enforcement and emergency preparedness, allow this solution to be more efficient when an emergency happens.

January / February 2017 • Security Solutions Today

39


APPLICATIONS | DAHUA DELIVERS EFFICIENT AND RELIABLE SAFE CITY SOLUTION

Effective investigation via powerful video synopsis Video synopsis is a typical intelligent analytic tool that allows a faster and more accurate crime investigation. It provides a short summary including all moving objects of a long video and supports query moving object according to different characteristics like size, color, direction and speed. Through this big data analytic tool, users are able to identify suspects from massive raw video data in a very short time. Easier system maintenance via automatic maintenance platform Due to complex working environments, video quality of devices may deteriorate after long time running. Maintenance work to upkeep video quality and storage quality will become a big problem. With the help of smart diagnose, the detection of malfunctioning equipment can be performed by automatic maintenance platform. It helps to reduce OPEX and service interruptions significantly. Using advanced technology (4K high resolution camera, thermal sensing, license plate recognition, face recognition, behavior detection and etc.), Dahua solution provides good quality video image and smart detection in any weather conditions. After being widely used by many cities, Dahua safe city solution has been proven efficiently and effectively in protecting city safety. In addition, because of its innovation and customized system architecture, this solution is flexible to upgrade with technology change and expand with city infrastructure growth. Recommended Models: Face recognition IVS-F7200 • Face detection rate ≥ 98% • Face recognition rate ≥ 90% • Complete recognition in no more than 3s • Face recognition, query, blacklist Video synopsis IVS-S7200 • Provide summary of all moving objects from raw video data • Support to search objects by type, size, color, direction and speed in video summary • High processing performance • High extraction efficiency Safe city Management Platform – DSS • Centralized management • Strong reliability and stability • High openness and expandability • Support abundant applications Automatic Maintenance Platform – NMS8100 • Ability to diagnose device online rate/video channel quality/storage quality • Professional workflow to normalized maintenance procedure • High openness, seamless integration with mainstream products • Provide a rich sets of reports to optimize system operation For more information, please visit www.dahuasecurity.com. sst

40

Security Solutions Today • January / February 2017


BEGIN TRAFFIC SECURITY INSTALLATION AT 11:45 AM… HAVE PROTECTION BY LUNCH | APPLICATIONS

Begin Traffic Security Installation at 11:45 am… Have Protection by Lunch Greg Hamm, Delta Scientific, Vice President-Marketing and Sales

H

ow can a temporary event be secured with certified crash equipment that can be simply towed away when the occasion is over – from protecting farmers’ market shoppers from an errant vehicle or a political event from car and truck bombers? Today, that question can be answered simply – with portable barriers. Moveable self-contained barricades can be towed into position to control vehicle access within 15 minutes to answer the need of organizations that quickly require a temporary barricade system to address a specific threat or secure a facility during special events. They were created for military checkpoints in Afghanistan and Iraq to provide another level of force protection. Three lengths -3.7, 4.9 and 6.1 m – have been built over the years. These mobile deployable vehicle crash barriers carry a M40 rating, stopping 7.5 ton (6803 kg vehicles traveling 64.4 kph. No excavation or sub-surface preparation is required. Once towed into position, the portable barricade uses DC-powered hydraulic pumps to unpack and raise and lower itself off its wheels. There is no hand cranking. Wheels are stored along the sides and the vehicle ramps fold out, completing

HPIM1963 – Moveable barrier at G2 Summit in Pittsburgh the implementation. To move the barrier from that spot to another, the procedures are just reversed.

Who in Law Enforcement Uses Mobile, Temporary Barriers? Today, over 1,000 of the mobile deployable vehicle crash barriers are being utilized throughout the world. Many of the MP5000s are being used in the Middle East to protect US troops from truck bomb attack.

January / February 2017 • Security Solutions Today

41


APPLICATIONS | BEGIN TRAFFIC SECURITY INSTALLATION AT 11:45 AM… HAVE PROTECTION BY LUNCH

traveled to various venues in Washington, D.C., Philadelphia and New York. During the Papal visit engagements, which were witnessed by millions, again, not one vehicle got into position to cause harm. The mobile deployable vehicle crash barriers have also helped police and military officers protect 60 heads of state and other global leaders, over 2,000 journalists, other attendees and onlookers at the Chicago NATO (North Atlantic Treaty Organization) Summit. Ten MP5000 mobile deployable vehicle crash barriers additionally helped the 4,000 police and military officers that protected participants at the Pittsburgh G-20 Summit.

Procurement Often Simplified

DC Police – Portable, crash rated barrier lets DC police vehicle through However, it didn’t take long for municipal law enforcement to discover them. Within months of introduction, the Los Angeles Police Department obtained the barriers for a host of duties. During heighted security threats, the MP5000s can easily be installed to create a safe zone at the outer areas surrounding the Parker Center headquarters. They are also used for special events, such as Hollywood awards ceremonies including the Academy Awards, major sporting contests, high-profile trials, or in the potential event of riots or natural disasters such as earthquakes to provide extra security where it is needed. Ordered by the Secret Service and provided through Global Access Control Systems (Pittsburgh), certified crash barriers also protected attendees at both the Republican and Democratic Conventions this past summer in Cleveland and Philadelphia. The fact that these barriers were ordered well in advance of the tragedy in Nice is indicative of the great foresight and planning that is undertaken by the United States Secret Service.

42

From a purchasing standpoint, it can be easier to buy portable barriers than permanent barriers. The latter are oftentimes placed into an organization’s real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for an agency. However, purchasing portable barriers is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department.

Portable barriers were also at both political conventions in 2012 in Tampa and Charlotte as well as at the Presidential Inauguration events January 21, 2013, to aid police and military officers in protecting the president, congressional leaders, judges, journalists, other attendees and onlookers. During the Presidential Inauguration events, not one vehicle got into position to cause harm.

For one-time uses, a lease plan has been created where organizations can simply lease the portable barriers, use them, pack them up and return them. Delta always keeps an inventory for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. That’s because, in many cases, they are needed for events that come up quickly, such as politician or celebrity visits and other unexpected incidents.

In September of 2015, 18 Delta Scientific mobile deployable vehicle crash barriers helped police and security personnel protect Pope Francis as he

For more information, please visit www.deltascientific.com. sst

Security Solutions Today • January / February 2017


CAMPUS SAFETY AND THE ACCESS CONTROL TRENDS THAT SCHOOLS NEED | APPLICATIONS

Campus Safety and the Access Control Trends that Schools Need By Mitchell Kane, President, Vanderbilt

G

lobally, education facilities – from K-12 to colleges and universities – face more threats to the safety and security of students than at any other point in history. As a result, governments, school officials and administrators are tasked with making the most of declining budgets to find solutions that can help address these threats and keep students safe. However, each and every campus is different; open vs. closed facilities, multiple buildings vs. a single structure, adults vs. small children – all of these factors come into play when adopting comprehensive security solutions. So what are some of the factors these officials need to consider? Today’s access control trends span a number of different directions, and here, we breakdown some of the latest.

toward hardening perimeters and increasing lockdown capabilities in the event of a significant threat to safety. Schools today are prioritizing and expediting the roll out of classroom security measures that provide lockdown capabilities.

reality, with more and more colleges and universities seeking out the ability for their security officials to manage their security infrastructure from anywhere on campus, making mobility a key factor in structuring security protocols into the future.

Smart, Mobile Applications

Smart locks are allowing officials to grant access using mobile phones or tablets on either a temporary, limited or permanent basis from any location with Internet connectivity. Not only do these integrated smart locking systems offer added functionality, they also

Open, reliable and connected devices permeate our culture, so it’s only natural that mobile applications and access in campus security do the same. Mobile applications for security officials are becoming a

Emergency Lockdown While it isn’t a scenario we like to imagine, most schools searching for an access control solution want to know how easily officials can lockdown a facility or an entire campus in the event of a serious threat. With the recent coverage of incidents on K-12 and higher education campuses, schools are faced with continued discussions on how to make schools safer. These entities will continue the focus

Photo credit: Vanderbilt

January / February 2017 • Security Solutions Today

43


APPLICATIONS | CAMPUS SAFETY AND THE ACCESS CONTROL TRENDS THAT SCHOOLS NEED

but to save significantly on energy costs for the school. For these smart integrations to occur, integrators and access control manufacturers that can take these disparate systems and bring them together to form a cohesive solution must be consulted. To find opportunities in this market, integrators should be willing to interpret the needs of their clients and be able to deliver a system that works as it was intended while paving the way for future scalability and advancements.

Applying Analytics

Photo credit: Vanderbilt

make it easier for multiple agencies to collaborate in the event of an emergency, which can lead to a quicker, more efficient response. For example, school officials can turn access over to police officers in the event of an emergency, who can then make immediate decisions on whether to grant access to a particular building, perform a lockdown or simply access records of who went through which door while viewing corresponding video data.

Event Access Management Twenty years ago, when an event took place on a campus, there had to be someone with a physical key to let people in and out of a building, and in some cases for large-scale events, this meant a whole team. With today’s security management systems (SMS) that are fully integrated with event management software, this process is no longer necessary, saving these institutions money in manpower and easing the burden of securing buildings when they aren’t in use.

44

For example, students who would like to access study facilities or presentation rooms are granted access depending on certain permissions criteria. The student can then access the room with their student identification card, which allows the university to keep tabs on damage or security issues related to this access.

Integration Between Systems Investment in solutions that easily work cohesively to save money and resources goes a long way in the education sector, where budgets can be spread thin amongst other campus-wide priorities. Today’s access control systems are working hand-in-hand with outside software programs to provide more than simply access. In some instances, a single swipe of an access card can communicate to the building management system to turn on lights in a certain part of a building. In this case, the SMS and building management software work together to not only control access,

Security Solutions Today • January / February 2017

Schools with video cameras in place and access control systems that monitor people entering and exiting a facility are collecting a large amount of data in a very short amount of time. Today’s higher education facilities are exploring ways to mine this data to find out more about how students are using a particular building, classroom or area of the university. This information not only offers valuable insight on usage, but also analyzes traffic flow patterns that help streamline campus-wide planning and operations. Analytics can help pinpoint problems before they arise, thwarting potential threats to the safety and security of faculty and students. To better leverage their investments, colleges and universities are exploring new ways of using access control systems and security management systems. Open platforms that are capable of real-time integration with multiple databases and transactional systems offer greater benefits to these institutions and make the most out of their security installations. For more information, please visit www.vanderbilt.edu. sst


CITY OF ATLANTA – SAFE CITY | APPLICATIONS

City of Atlanta – Safe City

T

he City of Atlanta has a population of over 420,000. It is the cultural and economic center of the Atlanta metropolitan area, which is home to more than five MILLION people and is the ninth largest metropolitan area in the United States. Additionally, Atlanta is one of the United States’ leading tourist destinations, both for American residents and those visiting the U.S. from abroad. In 2010, the City was the seventhmost visited city in the United States with over 35 MILLION visitors per year.

Protecting Citizens Ensuring the safety and security of citizens and visitors is key to the success and progress of any city. This is especially true for Atlanta, one of the most multi-cultural cities in the U.S., which is attracting investment from across the globe. As with any large city, Atlanta is becoming more reliant on the use of visual intelligence to enable improved situational awareness, which helps to identify and resolve security incidents faster and more incisively. Over the years, the City of Atlanta has invested in a number of surveillance systems to provide law enforcement and other public safety professionals with visual intelligence, well before first responders arrive on scene. Recently, the City upgraded aging analog cameras to digital, and moved from leased line to wireless backhaul. Historically, these systems had all operated independently and had been located across a wide geography.

Operation Shield Government agencies across the U.S. are working hard to increase collaboration on public safety efforts to achieve better efficiency and effectiveness in leveraging public security assets. One of the most cost effective methods to increase the amount and quality of intelligence available to government agencies is to deploy a centralized camera integration center. Atlanta approached this

challenge by launching Operation Shield in 2007, through the Atlanta Security Council. Operation Shield is a three-pronged security program designed to leverage existing infrastructure (cameras and radio communications) through engaging the private sector and various government agencies. The most recent development in Operation Shield has been the establishment of a centralized Video Integration Center (VIC) by the City of Atlanta Police Department. The VIC is a rapidly-developing surveillance network which provides 24/7 real time crime prevention, emergency preparedness and heightened response capability throughout the City. Dave Wilkinson, President & CEO of the Atlanta Police Foundation commented, “The Atlanta Police Department has a plan in place to utilize technology in its mission to reduce crime. Atlanta has launched Operation Shield which will not only leverage cameras, but also data and video analytics to better fight crime bringing the crime numbers down even lower than their 30 year low of today.” Operation Shield’s three-pronged success formula; video integration, COMNET (radio network for private security to communicate with APD in real time), and text alerts is enabling VIC stakeholders to effectively bridge communication gaps between the Atlanta Police Department, participating agencies and entities and the City’s business community.

A Next Generation Solution Grant Hawkins, Vice President of Programs & Strategic Projects, Atlanta Police Foundation explained “The Operation Shield team visited numerous cities throughout the United States and was able to note best practices, lessons learned, and be exposed to the latest technology in action. This research and planning gave Operation Shield’s leadership the tools and knowledge to design and build a system that brings together key aspects of the best video integration projects from around the United States to the Atlanta Police Department with best in class tools and technologies to reduce crime

January / February 2017 • Security Solutions Today

45


APPLICATIONS | CITY OF ATLANTA – SAFE CITY

and respond to emergency situations.” To protect citizens, commerce and infrastructure, the City needed to be confident that the tools and technologies selected had been proven within the Safe City framework. They selected CNL Software’s IPSecurityCenter as the command and control platform as it was deployed in the largest and most complex Safe City projects in the world. IPSecurityCenter works by connecting the diverse range of systems into the operating platform, ensuring operators do not need to learn the underlying technology, allowing them to focus on the situations that are occurring. The system has given the Atlanta Police Department the capability to integrate public and private video systems, video with computer aided dispatch (CAD), into an integrated suite of emergency dispatch applications allowing call takers and dispatchers to manage incident information more efficiently.

Public/Private Partnerships The Atlanta Police Department and the Atlanta Police Foundation have accomplished their vision to develop one of the United States’ strongest publicprivate sector partnerships. Atlanta is becoming the model city for public/private sector partnerships providing significant benefits to the citizens and visitors of the area. City leadership has leveraged the partnerships to deliver a sound foundation for Operation Shield and is poised to expand its current state to become the standard for Safe City projects across the nation. In addition to providing funding and competencies, the Atlanta Police Foundation has been instrumental in facilitating the resolution of one of the biggest challenges faced when establishing the Video Integration Center: addressing the size and scale of the integration which is driven by the disparate and legacy nature of video systems across the City, other governmental entities, and the private sector. Using IPSecurityCenter, cameras owned by organizations using proprietary technologies, can be targeted for integration. For example, the City’s Metro Atlanta Rail and Transit Authority (MARTA) operates more than 1,300 cameras, which were previously only accessible in the MARTA command center. Likewise, Hartsfield Jackson International Airport, the world’s busiest airport, had its own proprietary camera systems that will also be connected to the Video Integration Center.

46

Security Solutions Today • January / February 2017

Similarly, and as is typical across the nation, the Georgia Department of Transportation (GDOT) spent millions of dollars deploying a statewide camera system which only fed information into the GDOT Traffic Control Center. The City of Atlanta is also home to two of the State’s largest universities and 7 colleges, each with their own security systems. As part of their vision, the City also wanted to integrate a large number of private cameras located in the City, from sources ranging from the CNN Center and Coca-Cola to the Publix Supermarkets and the sizeable number of Fortune 500 companies located in the City – further increasing the complexity of bringing all of these systems into one common platform.

Increased Situational Awareness Once connected to the IPSecurityCenter platform, a common set of controls will be available for all video sources, enabling operators to seamlessly move from a camera located on a downtown street to one located in a shopping mall to one located in a bus station, allowing operators to observe incidents as they unfold. Increasing the partnership with other agencies, the Video Integration Center will be able to instantly distribute and share this intelligence to all relevant stakeholders enabling rapid responses following incidents. Through development of one common operating platform, the City of Atlanta is able to work with various agencies, entities and develop protocols for preventing, detecting, and responding to unfolding events. The information-sharing network provides a new approach to a safer city.

Increasing Efficiencies Crime, by its nature, has significant costs to any city - Its costs are far greater than the direct costs associated with policing. Some of the key cost reductions resulting from the IPSecurityCenter solution include reducing policing costs through greater efficiency, reduced overall crime levels, increased incarceration rates and faster prosecution through the courts and legal system. IPSecurityCenter also offers other involved agencies significant capital cost savings because, by tapping into the VIC, they do not need to bring their own infrastructure to levels of tools and technologies


CITY OF ATLANTA – SAFE CITY | APPLICATIONS

now provided by the VIC. The ability to access video from private enterprise furthers the attractiveness of the return on investment for the system. Dave Wilkinson, President and CEO, Atlanta Police Foundation commented “We are leveraging the private sector investment in cameras and infrastructure – making Operation Shield a unique model - allowing the Atlanta Police Department, at a substantially lower cost, to keep citizens and visitors safe.”

Intelligence Driven Policing Operation Shield’s future continues to grow with APD’s deployment of an Integrated Predictive Policing (IPP) Model, which is transforming policing across the United States. Predictive policing models are the newest tools for law enforcement using advanced technological tools and data analysis to take proactive measures to “pre-empt” crime. By combining Video Integration, multi-agency crime data and public records with other analytic technologies, Operation Shield effectively provides crime reduction and accountability, while serving as a force multiplier and increasing resource efficiency. IPSecurityCenter is enabling Atlanta to implement the IPP model. It would not be viable to manage the vast amount of video coming into the VIC without IPSecurityCenter’s ability to intelligently catalogue, map and visualize the right video at the right time with data elements already on file. One unique feature of this system is its ability to integrate many of the newest social media analytics. Officers and Detectives identify emerging crime trends and are able to predict where crimes are likely to occur by using social media analysis, data mining techniques and other advanced analytics to identify trends, major actors, associates, and elements of crimes.

emerging crime trends and stop crime before it impacts a community. Commanders issue crimefighting strategies based on an analysis of crime patterns, enabling officers to multiply their capabilities through an expansive array of innovative technologies including sensors, video cameras, license plate readers, automatic vehicle location, geospatial correlation and facial recognition technology.

Visualization and Reports Every agency has its own need for management information and reporting. The system provides an enterprise level-reporting engine, automating and delivering effective reports and statistics on overall system performance, device availability, operational effectiveness and any of the SOPs defined by the City. IPSecurityCenter delivers a custom dashboard solution fusing disparate security technologies into one common platform. This results in reduced training time and greater operational efficiency for the officers, police department and the City. Citywide integrated data is presented geo-spatially on the Operation Shield dashboard. This common operating view provides domain awareness and a real time visual of the City’s crime trends.

More than Crime Reduction As with any enterprise level system, there is a constant need to increase the system, in terms of the number of users, geographic coverage and new functionality. IPSecurityCenter allows an easy migration path to incorporate new technologies such as gunshot detection systems, tracking systems and smart video (like LPR) and analytics – all helping to enable greater intelligence driven policing.

Following an incident, when seconds count most, the system provides exceptional connectivity tools allowing camera images to be rapidly referenced against analytics and data providing a clear picture to responders. Armed with immediate situational awareness, operators are able to respond to incidents with greater accuracy and can ensure the most appropriate response to combat threats, crime and anything that can jeopardize the safety of citizens, commerce and infrastructure.

IPSecurityCenter offers integration capability allowing Atlanta to lead the way in intelligent policing. It provides the City with the framework needed to reach both public and private systems, which is required to realize the City’s vision for public-private partnerships in the foreseeable future. Soon it will also allow Atlanta to make material improvements in areas of public safety other than crime, such as flood plain monitoring and fire and other emergency services, making Atlanta a Safer City.

Police Commanders can more effectively manage resources and deploy patrol officers in areas with

For more information, please visit www.cnlsoftware.com. sst

January / February 2017 • Security Solutions Today

47


APPLICATIONS | A FRESHER LOOK AT SECURITY ON CAMPUS

A Fresher Look At Security On Campus

S

ecurity is an important aspect of university life. Students, staff and visitors all need to feel that they can move around campus safely and that a university is an enjoyable place to study, work and visit. While physical security is of paramount importance, protecting property such as valuable ICT and electronic equipment on campus is also vital. One way to do this is by using a property marking system such as Selectamark permanent marking, which leaves a visible mark on an item, clearly identifying which university it belongs to. Selectamark is produced by a UK security company of the same name and was launched in the early 1990s. It is a popular choice as a visible theft deterrent today, often being used in conjunction with tamper proof labels. Also available from the company is an Asset ID system and a wide range of asset labels under the SelectaLabel brand. The Selectamark database, where marked property is registered, is accessible globally to assist overseas police forces in identifying marked items. The database operates to the highest standards, having most recently achieved ISO27001, covering the safe and secure management of information internationally. A new Selectamark distributor has just started trading in Thailand with a major focus on helping to reduce crime in

the education sector. This follows on from great success using Selectamark to protect valuable assets from theft at hundreds of UK schools, colleges and universities. Security consultant Steve Wright from Securus Asia will start off by marketing Selectamark and SelectaLabel products in his region. “We will initially focus on introducing the product range to areas such as the Education sector,” said Steve. “With Thailand and the UK having a similar population, we aim to eventually mirror the success of Selectamark’s UK business by adding other Selectamark products in the future.” One of the company’s other products is SelectaDNA, a forensic marking product which was launched in 2004 and is the first true DNA security system in the property marking field. SelectaDNA is being used extensively at universities across the UK including at Bath University, the London School of Economics and at Dundee University. At the start of the new academic year in October, thousands of new students known as ‘Freshers’ arrived

48

Security Solutions Today • January / February 2017


A FRESHER LOOK AT SECURITY ON CAMPUS | APPLICATIONS

on UK campuses with an array of gadgets including laptops, digital cameras, smart phones, games consoles and iPads. Many universities arranged security-marking events to mark their valuable electronic equipment with SelectaDNA, which doesn’t damage the marked item in any way, but provides a unique DNA code that links the item to its owner. In the event that the item is stolen or lost, it can be traced back to the owner if it is recovered. Brian Schofield, Head of Security Services at the University of Bath said: “We are asking students to take ownership and responsibility of their property by marking it with SelectaDNA.” He added: “Local thieves know that when students arrive they usually bring new equipment, so by encouraging the use of SelectaDNA we want to eliminate the risk of theft for our students and deter criminals at the same time. “SelectaDNA is the latest in forensic marking products and as far as we are concerned it is another ‘tool in the toolbox’ that we can use to protect our students.” Meanwhile, at the London School of Economics, over 2,000 items of university property including laptops and PCs have been marked by the university’s in-house security team, and SelectaDNA kits are being offered to students to mark their own valuable property. SelectaDNA recently entered a new partnership with Securitas, one of the UK’s largest security providers, and the University of Hertfordshire. Securitas, which looks after security provision at the university, is using SelectaDNA to mark valuable equipment in a new, state-of-the-art Apple Mac ICT lab containing iMacs and iPads.

SelectaDNA Spray is also being fitted to the doors of the lab to deter theft. In the event that anyone did break into the lab, they would be sprayed with an incriminating DNA spray that would link them to the crime scene. Meanwhile, high value electronic equipment installed in state-of-the-art laboratories at the University of Northumbria is being protected from theft by SelectaDNA forensic marking. The £30 million Sport Central complex at Northumbria, Newcastle has been designed as a world-class training and event venue and contains £275,000 worth of IT equipment aswell as a hi-tech golf simulator worth £60,000, all of which has been marked with SelectaDNA. IT suites containing more than £30,000 worth of Mac equipment at the university’s London School of Design have also been marked. Head of Security at Northumbria University, said: “We have taken delivery of some amazing top of the range equipment which is not only of high-value financially to the university, but is also of high-value to our students and visitors who are using these world-class facilities for their studies.” He continued: “We are committed to reducing the risk of burglary at Northumbria and the use of SelectaDNA is a large part of that commitment.” Headquartered near London in the UK, Selectamark serves its customers both directly and through a wide network of nearly 40 distributors worldwide including in the Asia Pacific region: Australia, New Zealand, the Philippines, Hong Kong and the new venture in Thailand. For more information, please visit www.selectadna.co.uk. sst

January / February 2017 • Security Solutions Today

49


CASE STUDIES | VERTICAL MARKET

Bosch Fire Alarm Systems Secure
St. Andrews International School Bangkok • Bosch fire alarm systems provide optimal protection to safeguard life and property • Flexible and scalable modular fire panels can be expanded to user needs • Simple system design which means ease of use

B

angkok, Thailand – St. Andrews International School Bangkok, a worldclass school for ages 2 to 18, is part of Nord Anglia Education- a global network of over 43 schools in 15 countries. Situated on an attractive campus close to the city’s amenities and transport links, the school sits on expansive grounds, which makes it suitable for a wide variety of outdoor activities and sports. Protecting the safety of the children and faculty is definitely the number one priority. Once children are on school property, their safety and well-being becomes the responsibility of the school personnel and administrators. School fire safety is important as a single fire can affect the safety of over 1,100 children. It is important for the teachers to follow proper procedures to ensure the safety of the students while they are in their care. One way to ensure the safety of the children is through a school fire alarm system, to ensure that the entire school population will be alerted in the event of a fire emergency. After assessing the requirements and site, T.S.R. Telecom System Co., Ltd – Bosch Security Certified

50

Security Solutions Today • January / February 2017


VERTICAL MARKET | CASE STUDIES

Partner – proposed the fire alarm solution using the FPA 5000 Modular Fire Alarm system with customised specifications for each area. A total of 259 Optical Smoke Detectors and 23 Rise Heat Detectors were installed across the 11 buildings within the school. The fire detectors and devices were connected to an FPA 5000 modular fire panel via the LSN 1500A. Each device had an address on location, enabling the exact triggered detector to be quickly identified. The complete system was operated via a touch screen. The user-friendly interface works by adapting to the existing situation in a way that is simple, clear and intuitive. There is no special dongle required for programming to set up the system. The simple system design and ease of use was what the customer wanted. The reputation of its brand gave St. Andrews International School Bangkok confidence in Bosch. Coupled with the exceptional after- sales service they received, the school was extremely satisfied with the overall project. For more information, please visit www.boschsecurity.com. sst

January / February 2017 • Security Solutions Today

51


CASE STUDIES | VERTICAL MARKET

Sikarin Hospital secured by Bosch – Thailand Bosch provides 24/7 security monitoring in Sikarin Hospital • A highly flexible system that allows for future expansion • Valuable training provided and exceptional after- sales service

S

ikarin hospital is located in the Bang Na district in Bangkok. It got started in 1993 and it now has 3 buildings with 235 beds for inpatients. It also has the capability to handle an average of 2,800 outpatients-including the 24-hour emergency services- per day. Having a security system in hospitals is critical for precautions against fire, attacks and vandalism as in any other large facility. AheadAll Co., Ltd was awarded the contract to design and install a comprehensive security solution in the newly constructed 14- storey Building 3 to provide additional medical services to high-end patients. AheadAll Co., Ltd thus composed a security solution that is based on Bosch video surveillance systems, fire detection, evacuation voice alarm and access control systems which can be monitored centrally. A Plena Voice Alarm System with 153 speakers was installed for the hospital public address announcement and background music (BGM) purpose. For the fire alarm system, a FPA 5000 Fire Alarm Control Panel with 336 units of the FCP-O320 Optical smoke detector were installed for ease

52

Security Solutions Today • January / February 2017


VERTICAL MARKET | CASE STUDIES

of monitoring when smoke or fire are present in the hospital premise. The system alerts the hospital security officer of the exact location of the fire so that he can handle the situation with expeditiousness. To meet the needs of video surveillance, 59 units of Bosch FLEXIDOME IP indoor cameras and 26 units of IP Bullet cameras were installed in the hospital and along the perimeter of the building to provide full security surveillance to keep patients and staff safe. The whole system offers high flexibility in terms of project design that allows ease for future system expansions. The reputation of Bosch gave Sikarin hospital the confidence in this project. In addition, the valuable training provided and AheadAll Co., Ltd’s exceptional skill in project implementation & after-sales service emphasized the trust that the hospital had in Bosch.

For more information, please visit www.boschsecurity.asia. sst

January / February 2017 • Security Solutions Today

53


CASE STUDIES | VERTICAL MARKET

“Ochtum Park” Outlet Centre protected with Panomera® multifocal sensor technology “Ochtum Park” Factory Outlet Centre in Bremen relies on Panomera® multifocal sensor technology from Dallmeier to safeguard its outdoor premises.

A

nyone who has ever paid their respects to the Town Musicians of Bremen and then wanted to do a little shopping is in exactly the right place in Ochtum Park. Over 50 businesses occupying an area of 22,000 square metres attract 2.5 million visitors every year. World leading brands like Esprit, Nike, Puma, Tommy Hilfiger or Fossil, many restaurants and free parking all combine to make Ochtum Park a real shoppers’ paradise.

Complete and discreet In order to provide the most effective protection possible for the entrances and exits as well as the outdoor and car parking areas, the decision was taken to install the most modern video security equipment – which should also be discreet and unobtrusive, as recounted by Sebastian Kühne, the spokesman for the owners: “We wanted coverage of the outdoor areas to be as complete as possible, but without having to install huge numbers of cameras. After all, we want our visitors to feel comfortable here, not as if they are constantly being watched.” Ochtum Park found the solution in the Panomera® multifocal sensor technology from Dallmeier. With its patented camera technology, which unlike single sensor cameras works with multiple lenses, this system can monitor a huge expanse in the highest possible resolution from a single installation location. And in addition: “The cameras have been painted the same RAL colour as the building façades, so they blend discreetly with the overall image”, explains Dirk Lüders, Sales Manager with Dallmeier and joint manager of the Ochtum Park project. Dallmeier prepared the concept for video protection in cooperation with the design and engineering consultancy IfaS (Institut für angewandte Sicherheitstechnik -

54

Security Solutions Today • January / February 2017


VERTICAL MARKET | CASE STUDIES

Institute for applied Security technology), and the company Freihoff then installed the cameras. “One of the challenges we faced at Ochtum Park was that we were asked not to undertake any large-scale cable laying to transmit the images to the security office” explains Christian Linthaler, Sales Manager with Dallmeier. “So we set up a wireless local loop to carry the streams.”

Good visibility in low light conditions A major consideration for Ochtum Park was that the cameras should be extremely sensitive to light, so that they would still deliver detailed image material with high colour fidelity even at night with poor light conditions. For this reason, the Panomera® Nightline series was chosen, because it is equipped with the very latest generation of image sensors and encoders, which is highly sensitive to light and infrared radiation. The Nightline cameras are equipped with an ambient light sensor and a removable IR cut filter and can switch between day and night mode automatically. They are ideally suited to situations in which exceptional contrast, brilliant clarity and high colour fidelity even in poor light conditions, or exceptional infrared sensitivity for outstanding results in night mode are required. “We can identify individuals from a distance of 160 m, and even read car licence plates at night. The resolution is really incredible”, Sebastian Kühne gives voice to his enthusiasm.

The MFS systems are supplemented with IP cameras with integrated infrared illumination, which is assured with semi-discrete 850 nm high-performance LEDs.

Reliable recording The camera images are recorded on multiple Dallmeier IPS 2400 appliances. The IPS 2400 is a powerful video appliance with integrated storage system for reliable recording and storage of the video material. The “Smavia Recording Server” recording software is already preinstalled. The IPS 2400 includes high-performance server hardware with a multi-core CPU. The integrated storage system (8x 3.5” hard disks) offers ample storage capacity. A sophisticated hardware concept and perfectly synchronised components also enable rapid storage speed. With the “EasyChange” functionality, hard disks can be replaced quickly and simply from the front of the device. The IPS 2400 has been certified by LGC Forensics, which means that image material obtained with this equipment is admissible as evidence in a court of law. The video streams are analysed centrally in the security office at Ochtum Park. “Operation is really simple and intuitive”, Sebastian Kühne is full of praise.

Completely satisfied The system was commissioned in the presence of representatives from the designers, the installer, the manufacturer and of course the end customer. “The cooperation between the individual companies worked well, and we have the feeling that we are in good hands”, says Sebastian Kühne. His final word on multifocal sensor technology is unequivocal: “There would not have been any other camera system that can cover such enormous expanses from so few installation points.” For more information, please visit www.dallmeier.com and www.panomera.com. sst

January / February 2017 • Security Solutions Today

55


CASE STUDIES | VERTICAL MARKET

Vienna Technical Museum Exhibits Video-Enabled City of the Future Thanks to Milestone

M

ilestone Systems together with ESSECCA, SALTO and Sony show the use of video monitoring and access control in the “Future of the City” special exhibition at the Vienna Technical Museum. This exhibition provides information about the development of urban living space.

The Challenges The Museum needed to show in their exhibition “Future of the City” that coming cities will be smart cities using video to optimize city functions and ensure that the citizens are safe. Furthermore the system had to be highly flexible to ensure that the exhibition had the high quality level that the museum required.

The Solution Milestone XProtect with a Smart Wall enabled the Museum to highlight the use of video in a smart city. The open platform technology used in XProtect empowered the museum to design the perfect solution for the exhibition.

Advantages The open platform technology used in the Milestone VMS allowed the museum to choose the perfect solutions from the Milestone partner community, showing not only what is possible today, but also hinting at the future video applications for smart cities.

56

User-friendly and intuitive In cities of the future, security will play a greater role than ever because cities will be much larger and more interconnected than they are today. At the same time, video solutions, access control and alarm management will also play a significant role. “For video monitoring and equipment in the Vienna Technical Museum, XProtect Corporation solution from Milestone Systems was used as it offers open IP video management software”, explains Michael Reiner. “Hence, an integrated solution with various external systems is how we have the greatest possible flexibility”. From the customer’s point of view,

Security Solutions Today • January / February 2017

operation of the software is also a major factor. Because, in spite of the extensive functions that Milestone Systems products offer, the system is very easy to use. Thus, it is userfriendly and scores with intuitive operation. Moreover, there are many options for evaluating the data, from simple observation to the rendering of images where movement has taken place at a defined location. For the structure in the Vienna Technical Museum, alarm management is of paramount importance. This was combined with access control from SALTO. This guarantees the security of the building. As soon as an alarm is triggered here, the Milestone System activates the right camera and prompts automatic recording of the images.


VERTICAL MARKET | CASE STUDIES

Interactive display show casing video in the city

large facility are faced. 300 cameras or more are often installed in city centres. However, it is impossible to follow activities from that many camera. Therefore, the video systems are configured to show an image from the most relevant camera as soon as an alarm is triggered— for instance, an attempt to access a certain area or detected motion in an area. Because of this intelligence situational awareness is increased. In the exhibition, the alarm is triggered by a door opening, as the door fitting is connected to the access control system via wireless connection. On the fourth image of the video wall, all the alarms are listed which the system has already detected.

Smartphone access via Bluetooth

A ramp leads into the exhibition in the Vienna Technical Museum, which is recorded by a 360-degree fisheye camera from Sony. This has two functions: Firstly, in order to be able to count the people who enter the competition and how many of them visit the area of the control station or the garbage room. On the other hand, visitors can play with the control unit of the camera themselves. For this, a touch monitor with a quadripartite video wall is mounted in the entrance hall based on the Milestone XProtect Corporate solution from Milestone Systems. This is a high-performance IP video management system for large facilities with the highest security requirements. A central administration panel enables efficient system management, including all cameras and security devices irrespective of the size or distribution across several locations. For systems that demand aboveaverage situational awareness and precise reaction to incidents, the solution has a Smart Wall function. In addition, it offers enhanced video thinning functions and encryption, which help organizations reduce the cost of video storage and at the same time ensure the integrity of video evidence and comply with industry-specific and government regulations. One of the four images on the video wall of the exhibition shows the images from the fisheye camera in the entrance area and facilitates its control—the touchscreen and zoom can be changed via touchscreen. The second image illustrates real-time statistics of the people counting from the exhibition entrance area, operating station and garbage room. In the third image, the view from a further Sony camera is displayed in the garbage room. It shows the situation with which the security personnel in a city or in a

Access control takes place on a further monitor in the entrance hall, which enables the trash door to be opened using a smart phone. This mobile access solution enables people to open the doors via Bluetooth Low Energy (BLE)-enabled smartphone technology. A Mobile App is required for this, which uses smartphone-integrated Bluetooth interface to communicate with the electronic door components. Visitors to the exhibition enter their name and their cellphone number on the screen on the video wall and receive the mobile key to the automated access authorization on the smartphone app. This takes place “Over the Air” (OTA) using the latest state-of-theart encryption. Using the cellphone key, they can then release the door locking mechanism, open it and enter the room. For visitors who do not to wish to enter their cellphone number, a Mifare DESFire access card is also available which can be used to open the door. Inside the entrance hall, a talking garbage can with the words “Thank you for your garbage” awaits visitors. “The openness to discuss and demonstrate innovations and products which are just emerging or are trailblazing is one particularly important point to us. We have opted for these products because the “networking-controllingmonitoring” areas of conflict can best be served directly in the personal domain, explains Lisa Noggler-Gürtler, exhibition curator at the museum. The installation in the garbage room shows what can be possible in cities in the future. If access to certain areas should only be possible by authorized persons, more security can be provided. At the same time, the requirements for the exhibition show that the integration of several solutions like video, access and alarm management is more and more important.

January / February 2017 • Security Solutions Today

57


CASE STUDIES | VERTICAL MARKET

The video analytics used was the countvis solution from the Viennese company CogVis GmbH. It enables the counting of people in video streams via the use of state-of-the-art video analysis and the statistical analysis of the results in real-time via a web-interface or automatically generated reports. Using countvis, information about the utilization and occupancy of different areas can easily be evaluated and analyzed.

Security in urban spaces Around a half the world’s population today already live in cities and thus on only two percent of the world’s surface. According to estimates, even more than two thirds of the population will be living in cities by 2050. That shows that the city is the undisputed living space of the future. But here too, there are issues about organization, diet, living accommodation and mobility. The inhabitants of an urban space have different needs and constant innovation is required. In the two-yearlong “Future of the City” exhibition, which has been open since the beginning of June 2016, the Vienna Technical Museum has shown different perspectives from which the subject can be approached.

The solutions The access control systems in the exhibit works via the ProAccess SPACE management software from SALTO and JustIN Mobile BLE mobile access technology.

In order to show the potential applications in this regard, the integration firm ESSECCA and the Museum of Technology have designed one section of the special exhibition. Based on a garbage room, visitors can delve into access control and video monitoring. The areas addressed will include citizen-city-networking as well as access to public institutions. “The background to this is that the garbage room can only be used by persons who live or work there and thus are authorized to dispose of their garbage”, explains Michael Reiner, authorized officer at ESSECCA GmbH. This can also be expanded to bulky waste collection centers to which authorization can be granted based on license plate identification. As a leading supplier of electronic security solutions in Austria, ESSECCA develops flexible, holistic and client-oriented solutions for all buildings that offer a high degree of security and are convenient to use. The service provider offers its customers a one-stop shop, from expert advice, technology and installation right through to system integration, maintenance and servicing. Besides electronic and mechanical access solutions, the product and solution portfolio includes alarm and video systems as well as intercom systems and mechanical door control systems. With 250,000 access points realized and numerous alarm, video and intercom systems installed, ESSECCA has longstanding experience and can provide numerous notable references in all building sizes and business segments. Milestone Systems has always attached great importance to a partner ecosystem that uses the open platform to collaborate. Now the company is going one step further and is establishing an Open Platform Community. The result is a network in which Milestone, its partners and end customers are interlinked in order to benefit from mutual exchange. Analogous to the smartphone App Stores, Milestone will have its own marketplace for partner applications on the website. For more information, please visit www.milestonesys.com. sst

58

Security Solutions Today • January / February 2017


VERTICAL MARKET | CASE STUDIES

Lowest Domestic Burglary Figures in 25 Years The lowest figures for domestic burglary in Cheshire in 25 years have been recorded since the launch of Cheshire Constabulary’s Operation Shield using SelectaDNA.

O

peration Shield is a major anti-burglary operation protecting property and businesses across the county with DNA forensic marking. Since the campaign started in March, domestic burglaries fell by an impressive 41% in the space of just seven weeks, compared to 20102014 figures. James Brown, MD of Selectamark, said: “We are delighted that SelectaDNA has helped make Operation Shield a success in such a short space of time and has achieved a 25 year low for domestic burglaries.

“A 41% reduction in burglary in just seven weeks is a fantastic result and is reward for all the hard work that officers from Cheshire Police have been putting in to implement the scheme.” He continued: “It also shows how effective the ‘DNA fear factor’ is. Criminals know about SelectaDNA and fear that they will get caught by police if they are in possession of marked goods. These excellent results show that burglars are aware that the system is in place and are staying away from homes that are using SelectaDNA to protect valuable goods.”

emits a clear DNA-coded mist which cannot be rubbed off and sits on skin and clothing for weeks. Every person arrested in Cheshire is being screened by police under a special ultra violet light in custody. If they have committed a crime in an Operation Shield area, they will be marked, and the unique DNA will link them directly to the individual crime scene. More than 3,000 suspects have been screened for SelectaDNA so far.

But it is not just homeowners who are being protected by DNA marking under Operation Shield. Cheshire Police have also been provided with kits for businesses and retailers which use SelectaDNA Spray to protect their premises from robbery.

DI Peter Merrill, who was project lead on Operation Shield, said: “The operation commenced on the 3rd of March 2015 and I have no doubt, activity undertaken distributing the kits, supported by a carefully planned communication strategy, significantly contributed to Cheshire recording the lowest number of burglaries for the month of March in 25 years.”

The spray is activated when an intruder breaks into premises and

For more information, please visit www.selectadna.co.uk. sst

January / February 2017 • Security Solutions Today

59


CASE STUDIES | VERTICAL MARKET

GJD’s Clarius PLUS used for worldwide television series Introduction GJD a world class manufacturer of advanced presence detection, LED illuminators and security lighting systems worked closely with HotCam who is a leading professional broadcast camera, audio, lighting equipment hire and crewing company. The collaboration required GJD’s LED illuminators to use during night vision filming for a worldwide television series.

The Challenge GJD was brought in to help HotCam Ltd. develop the perfect lighting solution. Due to the high scale of the project, it was essential that the Infra-Red Illuminators would provide a reliable and precision lighting solution. Covert IR lighting was a key specification, it was essential the illuminators had the ability of lighting up a room as if it was daylight to a night vision camera, but still appear dark to the human eye so people were unaware of filming. Image quality was also key as the camera footage had to meet strict television broadcast standards. It was important to capture visible images of objects without shadows and show people with clear facial identification. The lighting solution had to be completely accurate due to very key elements of the television series would be filmed in total darkness. The location of filming was in various sized rooms which would change from day to night, so both the illumination range and angle had to match the cameras field of view.

Lighting Solution After careful consideration and thorough testing, eight Medium Clarius PLUS Infra-Red illuminators were specified. The medium Clarius PLUS incorporates the latest surface mount Dual core LED’s with enhanced optical output and outstanding reliability to deliver excellent night-time images.

60

Security Solutions Today • January / February 2017


VERTICAL MARKET | CASE STUDIES

Key Facts • Covert Infra-Red lighting • Minimal visible glow • Variety of illumination angles out of the box • Crystal clear footage for international television series • Easy to install • Dedicated lighting for IP cameras via PoE+

The advanced technology allows for significantly more light to be delivered precisely where it is required. It also reduces light wastage, which helps to reduce costs and save energy without compromising on efficiency. A distinct feature of the Medium Clarius PLUS was its interchangeable lens diffuser system, which provides a quick and user-friendly method to easily alter the angle of illumination, therefore providing versatility whilst filming. The Clarius PLUS also has a very minimal visible glow; this ensured that the lighting was invisible to the actors. Another specialist feature was the modern PoE (power over Ethernet) technology, which provided the option to run power via PoE, this saved further cabling and lowered the maintenance costs. Joe Patterson, Technical Manager at HotCam commented: “We are very happy with how the Clarius PLUS LED illuminators performed and they were perfect for the application we required. GJD also provided us with an outstanding level of customer service, I am looking forward to working with GJD again.”

The Conclusion The use of GJD’s Clarius PLUS Infra-Red illuminators provided vision in total darkness. The illuminators worked well with HotCam’s cameras and provided a flexible solution as each unit came with a choice of angles out of the box. The equipment was ordered through NBM, who is one of GJD’s trusted distributors. NBM provided a quick and reliable service, which was essential due to the strict filming production schedule. For more information, please visit www.gjd.co.uk. sst

Do you have case studies story?

Good! Email us at sst@tradelinkmedia.com.sg

January / February 2017 • Security Solutions Today

61


SECURITY FEATURE | TOP TECHNOLOGY TRENDS IN THE SECURITY MARKET TO LOOK FOR IN 2017

Top Technology Trends In The Security Market To Look For In 2017

T

he shops are getting busy, and, depending on which hemisphere you live in, it’s either time to turn on the central heating or break out the shorts and shades. But it’s also time to look ahead to 2017 and wonder what it might have in store for us. On a global level the world is going through turbulent times, with conflicts, political uncertainty, an ongoing refugee crisis and a somewhat fragile economic recovery from the most recent financial downturn. At the same time, technological developments continue unabated, with high-speed networks, big data and deep learning moving beyond that initial phase of just being marketing buzz words to enabling new and improved security offerings. Similarly, we expect the so-called ‘Internet of Things’ to be much less of a novelty and more of the fabric of our daily lives. However, that means manufacturers of internet-enabled devices will have to step up and take much more responsibility for the level of default security they ship with. All of these factors are likely to fuel demand for increased security, both physical and online.

Security as a Service As many other technologies have done, we expect customers will stop looking at physical security as simply being a collection of hardware and software connected to a network. Instead, we think they will start to see their security as a service – remote and professionally hosting and monitoring of video transmitted from the customer’s premise. Whether by

62

Security Solutions Today • January / February 2017

Johan Paulsson, Chief Technology Officer, Axis Communications

themselves, or more likely by sector-specific specialists who can not only take away the burden of managing the complex systems involved, but also reduce the costs of keeping those systems up to date and secure. This will not only free up internal resources which could be better focused elsewhere, but also improve the service level of the security system, enable better device management, and strengthen cyber security processes. On the topic of cybersecurity, we see an increased use of tools and practices that make network video a less vulnerable to attacks. In general, wider use of pre- and post-installation tools (such as Axis Site Designer, for example) will help in on-going monitoring and maintenance of systems.


TOP TECHNOLOGY TRENDS IN THE SECURITY MARKET TO LOOK FOR IN 2017 | SECURITY FEATURE

Integrated Solutions The security industry will continue its trends of offering more specific solutions to particular problems, rather than one-size fits all hardware/software. In the end, customers aren’t looking to buy a camera, or a video management system (VMS) – what they really want is to reduce shoplifting, or make sure only certain people can access the cash office, or keep track of potential threats in an airport. Although technology companies bandy around the word ‘solutions’ a lot, for once this really is the most apt term. The convergence of hardware and software as well as pre-installation and post installation tools as mentioned above, into end-toend solutions will be able to address specific security problems. They will consist of high-performance cameras, storage and access controls tightly integrated with video management and analytics tools. This approach will be easier for customers to purchase, install and implement, while offering a great return on their investment.

Expanded Use of Analytics

benefits are that although all customers are different, the environments and locations they are based in tend to fall into the same general categories, with people exhibiting the same general behaviors. Once those behaviors have been ‘learned’ the patterns that underlie them can be shared, enabling the system to flag up when something unexpected occurs. We see this as only the beginning and a very exciting space to keep an eye on.

Beyond Video However, we know that physical security doesn’t just involve surveillance of people/places/objects. It is also about physical access control, one and two-way communication and managing emergency situations – and often managing this from a significant distance. So, to extend the concept of integration even further, 2017 should be the year when security cameras work hand in glove with intelligent doors, intercoms and speakers, both locally and remotely. That means one simple system that can manage them all, in real time – enabling customers to see, hear and talk to the people in/near their buildings.

As part of this, we see that while high quality video footage is a core feature of modern security cameras, ultimately that information needs to be assessed and analyzed before a decision can be made to respond to its content. The recent advances in camera technologies, such as thermal imaging and enhanced low-light capabilities have been significant steps forward. But in the end, they just generate more footage that needs to be watched/reviewed. So, much like how tools have been developed to sift through the huge pools of numerical/ text data that is being captured every day, the security industry has been working hard on video analytics software that can work in real time to help professionals make informed decisions. We expect to see 2017 as the year when these new camera capabilities are combined with real-time analytics to address several security challenges, including facial recognition, forensic analysis and perimeter protection.

Cybersecurity

Deep Learning

We think the Internet of Things should be about better security, and more efficient businesses, organizations and cities thanks to “smart” cameras, door stations and audio equipment with network connectivity. 2017 will add more ‘smarts’ to those devices, while also enabling customers to focus on what they do best and allowing security specialists to improve the services they provide.

With all this data being gathered, we are seeing deep learning technologies coming to the fore. These use pattern recognition software to ‘learn’ about different kinds of behaviors as seen through the multitude of security cameras installed around the world. Techniques involving deep learning and artificial intelligence will see broader utilization within the security industry. The

As mentioned above ‘The Internet of Things’ has evolved from buzzword status to mainstream reality, but not without its challenges. While we still think the idea of millions of IP-enabled devices is an exciting prospect for the future, 2016 gave us a sobering reminder of the pitfalls of not properly securing all those internetconnected fridges, DVRs and unfortunately security cameras. Given that most of those devices are just plugged in and switched on by customers, it is down to manufacturers to take responsibility to ensure they are secure out of the box. Axis has always taken its customers’ security seriously, but we will hopefully see 2017 as the year when all manufacturers make this a priority. We will continue to strengthen our existing offerings and make it easier for our customers to keep their networks and devices secure.

For more information, please visit www.axis.com.

sst

January / February 2017 • Security Solutions Today

63


SECURITY FEATURE | DON’T BE HELD HOSTAGE TO RANSOMWARE

R

ansomware has quickly emerged as one of the most dangerous cyber threats facing both organizations and consumers, with global losses now likely running to hundreds of millions of dollars. Major ransomware gangs are capable of pushing their malware to millions of computers. Users who are hit with ransomware find their valuable data locked with strong, often unbreakable encryption. Recently we read about cybercriminals launching a ransomware attack on San Francisco’s computerized railway systems, resulting in "Out of Service" and "Metro Free" signs on ticket machines over two days. While the issue was not deemed serious, what if the attack was malicious, and attackers had access to the train signals?

Evolution of ransomware

Peter Sparkes, Symantec Senior Director, Cyber Security Services for APJ

In the past ransomware gangs had been largely widescale and indiscriminate in their attacks, with consumers forming the most likely target, and the proportion of consumer infections more than double that of organizations. However, since 2015, attackers are starting to change their line of fire, resulting in a slow but steady increase in ransomware attacks on organizations.

Don’t be Held Hostage to Ransomware

64

Security Solutions Today • January / February 2017


DON’T BE HELD HOSTAGE TO RANSOMWARE | SECURITY FEATURE

There are two main forms of ransomware in circulation today – locker ransomware and crypto ransomware – and it is important to understand them to defend against them. When hit with locker ransomware, users are denied access to the computer or device without encryption or deleting any files. Devices hit with locker ransomware are often left with limited capabilities, only allowing victims to interact with the attacker and pay the ransom. Crypto ransomware, on the other hand, is designed to find valuable data stored on the device and lock them with unbreakable encryption. This can cause more problems to organizations as removing the malware will not necessarily solve the issue – these files may still be inaccessible and the key to unlock them may only lie with the attacker.

True costs of ransomware As attackers have become bolder over the years, the average ransomware demand has jumped to US$679, up from US$294 at the end of 20151. Ransom demand aside, there are other more serious implications that organizations may have to face in the event of an attack. During an attack, targeted organizations may be forced to shut down systems, impacting business services and customers. As a result, there will be financial losses and reputational damage to mitigate. In the case of utility companies, loss of power or water can potentially impact millions of people and may cause accidents leading to injury or, even worse, death. In the event of a data loss due to files being encrypted and/or stolen, this can significantly impact the organization’s finances, brand, and reputation. In a worst case scenario, the ransomware gangs behind the attack may threaten to publish stolen data online in an attempt to extort more money from the victim. Unfortunately, even if the ransom fee has been paid, there is no guarantee that the cybercriminals will decrypt the files, on top of the risk that data may be corrupted in the decryption process.

Future targets of ransomware While attacks against Windows users continue to dominate the ransomware landscape, there has been a growing number of ransomware campaigns against other platforms. This trend is likely to continue as cybercrime groups compete to find unexploited target groups. The growth of the Internet of Things (IoT) has multiplied the

range of devices that could potentially be infected with ransomware. With a growing awareness of ransomware affecting traditional computers, attackers may turn to IoT to find new, softer targets. For example, Android ransomware Flocker (Android. Lockdroid.E) is capable of locking Android smart TVs. Flocker’s latest version asks victims to pay $200 in iTunes gift cards as a ransom. This kind of attack is something that was predicted last year by Symantec researcher Candid Wueest, who demonstrated a successful ransomware attack against a smart TV.

Vigilance and education To help organizations protect themselves against this growing cyber threat, here are some tips to help avoid or mitigate ransomware infections:

• • • •

Implement multi-layered endpoint security, network security, encryption, strong authentication and reputation-based technologies. Partner with a managed security service provider to extend your IT team. Ensure that the software, operating system, and browser plugins on your computer are installed with the latest updates so as to prevent attackers from exploiting known vulnerabilities. Regularly back up any files stored on your computer. If your computer has been compromised with ransomware, then these files can be restored once the malware is removed from the computer. Consider investing in comprehensive security software, such as Norton Security, to protect yourself from cybercriminals. Most importantly, never pay the ransom. When faced with cyber criminals, there is no guarantee that the attacker will decrypt the files as promised once they receive payment.

Organizations need to be fully aware of the threat posed by ransomware and make building their defenses an ongoing priority. While a multilayered approach to security minimizes the chance of infection, it’s also vital to educate end users about ransomware and encourage them to adopt best practices. As ransomware gangs continue to refine their tactics, organizations cannot become complacent. Businesses should continue to review and improve their security in the face of this rapidly evolving threat. For more information, please visit www.symantec.com. sst

http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ ISTR2016_Ransomware_and_Businesses.pdf 1

January / February 2017 • Security Solutions Today

65


SECURITY FEATURE | SOLUTIONS FOR RISING VIDEO SURVEILLANCE STORAGE DEMANDS

Solutions for Rising Video Surveillance Storage Demands Josh Woodhouse, Senior Analyst, Video Surveillance

The Video Surveillance Market Demand remains high for video surveillance solutions. The world market for video surveillance equipment will surpass $16 billion in 2016. Yet, the market is still not saturated. In a recent report on the installed base for video surveillance equipment, IHS estimates that there is one camera installed for every 29 people on the planet. As well as new installations, retrofits and upgrades are a significant part of the market, a market which globally is expected to see a compound annual growth rate (CAGR) of 20% in new camera unit shipments from 2014 to 2019.

different elements. Whilst there is a strong relationship, resolution is not always analogous to image quality and it’s important to consider other elements including (but not limited to): pixel density of scene, frame rate, and wide dynamic range. However, camera resolution is one of the most marketed components of modern surveillance cameras; it’s often the first specification item that’s quoted by manufacturers so it’s a good measure to illustrate the general trend of increasing camera specifications in the industry. Exhibit 1 shows the forecast revenues from global network surveillance cameras by resolution to 2019.

In 2016:

�© 2015 IHS

In addition to the increasing volume of surveillance cameras shipped annually, technological advances mean each new generation of surveillance cameras benefit from improvements in image (video) quality. Image quality is a complex matrix influenced by many

66

Security Solutions Today • January / February 2017

Exhibit 1: Global Network Surveillance Camera Shipments by Resolution In addition to the market increase in network camera resolution the following is also true: • HD compliant 1080p 25/30 fps cameras have firmly


SOLUTIONS FOR RISING VIDEO SURVEILLANCE STORAGE DEMANDS | SECURITY FEATURE

established themselves as the minimum expected from new cameras not just in the network camera market (Exhibit 1); in lower priced, small channel count installations HD CCTV has emerged as the replacement for many remaining standard definition analog cameras. Panoramic and 4K network cameras are two further storage hungry high growth product categories. Here IHS is also observing rapidly falling average prices and increasing shipment growth rates.

Generally, improved image quality means more data is generated. Exhibit 2 shows on average the data produced in just one day by all the new video surveillance cameras installed worldwide. The increases forecast year-to-year are a factor of the increasing camera shipments and the uplift in their specifications. Exhibit 2: Challenge of More Data Being Generated

and the increased retention demands have meant the demand for video surveillance storage has increased drastically. The problem for end-users is how to manage and store the increased amount of data.

�© 2015 IHS

Options and Solutions With more data being generated from a wider variety of sources a smarter allocation of resource is required, system design must follow accordingly. What should end-users consider regarding their system design? The storage in a video surveillance system should be viewed in a similar way to cameras. Different camera models in a system are selected for different requirements, yet all capture video. Storage can be thought of in the same manner; different types of storage can be leveraged in one system. There is rarely a fixed value or frequency of access for recorded video surveillance footage over its lifetime, yet, too often a one-size fits all solution is implemented.

© 2015 IHS

Whilst there are continuing advances in the use of prerecording analytics and compression technologies, which can provide a trade-off between image quality, bandwidth and storage requirements, these cannot completely mitigate the associated increase in data from an increased number of higher resolution linked cameras. In addition, the demands for data retention times are growing as some end- users require their data stored for longer. Aside from security and protection, longer retention is being driven by other commercial factors. Threat of litigation from civil law suits have led to some end-users storing video for longer. For example in some large North American retail deployments the cost of longer retention offset against potential costs of legal settlements. Longer retention also means a larger dataset for post-recording video analytics for both security and business insights. The increase in data produced by surveillance systems

To gain more insight and an increased return on investment from video surveillance data, a storage solution must balance high performance, high capacity and high retention. These three parameters can be flexed to provide the best trade-off between budget and mission whilst minimising sacrifice of redundancy, accessibility or scalability. When planned from the early stages of the project the storage solution can address as much of the mission criteria as possible without using a disproportionate chunk of budget. Analysis of the budget should take account of:

• •

What legislation and guidance do you need to comply with regarding data retention? What is the potential cost if you do not? What value is there on the insights you can gather from the data you collect?

Design should go beyond basic capacity planning for which there is an abundance of sufficient calculators. End-users and integrators should also consider some

January / February 2017 • Security Solutions Today

67


SECURITY FEATURE | SOLUTIONS FOR RISING VIDEO SURVEILLANCE STORAGE DEMANDS

of the following key points regarding what they require from their storage:

• • • • • •

Exhibit 3: Intelligent, Scalable Tiered Video Surveillance Storage Architecture

The majority of video surveillance data is never reviewed. Is your system geared to a heavy write focus? How does the value of your data change over time? Is there a data sub-set which is most mission critical or likely to require the most access? Can you easily move data in and out of this category? Do you want access to archiving, back-up and longer term retention in the same system? Would it be useful to pool data from multiple types of video devices (e.g. fixed, vehicle or body worn video surveillance cameras) and other sensors in one place? How easily can your solution support expansion?

Use of storage tiers in video surveillance has previously meant just a separate archive or directly attaching addon capacity to recorder appliances. We’re now seeing a multitude of options designed for video surveillance, which pull together different storage tiers (in some cases storage media) into a unified platform. This allows more efficiency in varying how recorded footage is treated throughout its lifetime.

© 2015 IHS, Enterprise and IP Storage used for Video Surveillance

Key Conclusions

Video surveillance is evolving not just in terms of higher specifications; there are no longer single purpose systems. Inputs from multiple sensor types with different analyses and management mean multiple uses for data. In any budget for maximum optimisation between performance, data retention and potential ROI build the system around the back-end architecture enabling the most efficient data management and storage.

This approach can be leveraged into localized individual systems or scaled out to large distributed systems with anything from a city to country wide scope.

Regardless of the size of your video surveillance system applying these principals to the underlying architecture can gain you a more effective use of your budget to balance between performance, maximum retention and potential ROI.

For more information, please visit www.ihs.com. sst

CapitaGreen Singapore

IMG Worlds of Adventure

ARCHITECTURE Sustainable designs & green buildings INTERIOR Retail store design Dubai, UAE LANDSCAPING Playground equipment (wet) SHOW REVIEW BuildTech Yangon 2016 PLUS Product showcase on green building products

Scan to visit our website

Hakusui Nursery School Chiba, Japan ARCHITECTURE Mulan School and Educational Landscape; Duke Kunshan University; New engineering building for Charles Sturt University; Getafe Campus extension of the Madrid Carlos III University; Marc Chagall French school; Eldon West Building at University of

ARCHITECTURE Shanghai Disney Resort in Pudong New District, Shanghai INTERIOR Portsmouth; The Diamond at the University of Sheffield & Knowledge International Arabic Santa Maria Church in Minorca; Buddha Tooth Relic Temple & Museum in Singapore; and INTERIOR Entertainment venues LANDSCAPING Pool equipment & accessories School SHOW REVIEWS WORLDBEX 2016 & SMART Facilities Management Solutions Expo 2016 Cyberjaya Mosque in Cyberjaya, Malaysia LANDSCAPING Water Features Special SHOW SHOW PREVIEW Scan to visit BEX Asia & MCE Asia 2016 REVIEW BEX Asia 2016 & MCE Asia 2016 PLUS Application Features, News & Building our website Products (Architectural Hardware, Canopies, Shades & Awnings; Paints & Coatings, Flooring and more…)

Scan to visit our website

A leading architectural magazine in Asia featuring current trends in building design, interior design, landscape architecture and facility management, plus news, projects, product reviews and reports on international trade fairs since 1974.

101 Lorong 23 Geylang #06-04 Prosper House Singapore 388399 T: (65) 6842 2580 F: (65) 6745 9517 W: www.tradelinkmedia.com.sg E: info@tradelinkmedia.com.sg

68

Security Solutions Today • January / February 2017


Launching Soon.

Will be available on


INSIDE LOOK | EXTRACT FROM “FUTURE-PROOFING THE CONNECTED WORLD”

Extract from

“Future-Proofing the Connected World: 13 steps to developing secure IoT Products” by © [2016] Cloud Security Alliance. All Rights Reserved.

T

he IoT is here and is already beginning to transform consumer, business and industrial processes and practices. The year 2015 saw the market adoption of many types of IoT products, we began to see real research that shows the concerns about IoT security are real. Based on the research that we will briefly discuss in this section, we can begin to understand some of the high level needs for IoT product security. These needs include:

• • • •

The need to protect consumer privacy and limit exposure of PII and PHI The need to protect business data and limit exposure of sensitive information The need to safeguard against IoT products being used in DDoS attacks or as launching points into the network The need to guard against damage or harm resulting from compromise of cyber-physical systems

We will now provide a discussion on issues and trends within the IoT space. We provide this discussion to point out lessons learned that can be applied by IoT product developers.

IoT Products can compromise Privacy Rapid7 recently published a report on Baby Monitor Exposures and Vulnerabilities. In this report, they described a set of vulnerabilities potentially exploited based on 1) physical access to the device, 2) direct access to the local area network (LAN), and 3) via the Internet.

70

Security Solutions Today • January / February 2017


EXTRACT FROM “FUTURE-PROOFING THE CONNECTED WORLD” | INSIDE LOOK

Other products used within the home have also been compromised. VTech, the manufacturer of high-tech educational toys for children such as electronic learning devices, announced that it suffered a security breach in December 2015, exposing personal data of 12 million people. The interesting take-away from this event was that the devices themselves were not compromised, however the online services that devices connect with were not sufficiently secured. Specifically, a report stated that the breach exploited a SQL injection vulnerability and the account registration services did not use TLS. Consider that these vulnerabilities were not related to flaws in the IoT devices themselves, but instead to flaws discovered in the infrastructure that supports the devices. IoT devices do not operate in a vacuum; they are a part of a much larger ecosystem that must also be secured sufficiently. Wearable products can also introduce privacy concerns. As an example, a study done by Open Effect showed that many wearable manufacturers had not yet taken advantage of the new privacy features designed into the Bluetooth 4.2 specification. It was found that tracking a person with a wearable was theoretically made possible when developers relied on publicly discoverable static MAC addresses for their devices.

IoT products can lend their computing power to launch DDoS Attacks If you consider the substantial quantities associated with IoT products, you can begin to imagine how useful these products can become for those wishing to perform a Distributed Denial of Service (DDoS) attack. These attacks have already begun. Researchers at Sucuri released a report that noted the compromise and use of

over 25,000 Closed Caption TeleVision (CCTV) devices towards a DDoS attack. The researchers pointed to a remote code execution (RCE) flaw exposed by some vendors in the market. This showcases again the need for software assurance techniques to be employed by vendors in the IoT market. Compromising IoT products for use in botnets does not have to be as complex as identifying an unpatched vulnerability and exploiting that vulnerability. Some IoT products ship with no password protections, or use default passwords such as admin for local access. Attackers that identify these low hanging fruit can victimize large populations of the product quickly and employ for their malicious purposes. A real-world example of this is the Lizardstresser DDoS botnet. Security firm Arbor Networks noted that the actors running this botnet have begun targeting IoT devices that share default passwords across device classes. Making things more interesting is the ability to quickly find IoT products that may not have proper authentication in place. A web crawling service ‘Shodan’, crawls the Internet at random looking for IP addresses with open ports. If the port lacks authentication, the script takes a snapshot and moves on. This data is searchable publicly.

Medical Devices and Medical Standard Protocols are Vulnerable to Attack Concerns related to the security of connected medical devices are nothing new and have been around even prior to the popularity of the IoT. In 2008, researcher Daniel Halperin and colleagues published the document titled: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero- Power Defenses. This document discussed wirelessly reprogrammable implantable medical devices (IMDs) that include pacemakers, cardioverter defibrillators and implantable drug pumps. The researchers outlined not only privacy issues associated with these devices, but also the ability to change device settings, change or disable therapies, and even deliver a shock to the patient. Further, researcher Jeremy Richards revealed a slew of security flaws in a line of infusion pumps [1]. These included: • Lack of authentication for telnet sessions; • Wi-Fi Protected Access Key (WPA) for hospital wi-fi network stored in plain-text on the device; • The device was running a vulnerable version of a webserver (e.g., the webserver component was not patched); and

January / February 2017 • Security Solutions Today

71


INSIDE LOOK | EXTRACT FROM “FUTURE-PROOFING THE CONNECTED WORLD”

A hard-coded credential was assigned to the File Transfer Protocol (FTP) service.

Vulnerabilities affecting pacemakers, hospital drug pumps and other medical devices are extremely dangerous and could result in life-threatening injuries or death. Researchers have used iStan to demonstrate these vulnerabilities. The US Food and Drug Administration (FDA) has for example issued an alert to warn healthcare organizations about the risks associated with the use of certain infusion systems.

Drones Are Approaching Mainstream Status and Being Used as a Platform for Reconnaissance Small Unmanned Aerial Systems (sUAS), also known as drones are have become popular and security researchers are beginning to investigate how to use these systems for reconnaissance activities. This includes the identification of IoT products running certain RF protocols in a geographic area. Researchers at Praetorian showed that drones are an effective tool for this when they mapped ZigBee beacons in 2015.

were never designed to connect to the Internet, the use of legacy protocols that have no security mechanisms builtin, as well as the fact that these cyber-physical systems (CPS) can cause harm and damage if compromised.

Critical national infrastructure can rely on the IoT ecosystem Connected Vehicle (CV) technology will enable myriad use cases that support reductions in the numbers of traffic incidents and injuries related to those incidents. Connected Vehicles will communicate using the Dedicated Short Range Communications(DSRC) protocol, which supports rapid transmissions of messages (e.g, Basic Safety Messages - BSMs) between vehicles (V2V), infrastructure (V2I), and applications (V2X). The CV ecosystem consists of a number of technologies, hardware and software components. Infrastructure equipment such as traffic signals broadcast messages such as: 1) Speed limits, 2) Signal Phase and Timing, 3) The presence of traffic conditions ahead. Pedestrians may even use apps on their smartphones or purpose- built dongles to communicate with vehicles and infrastructure equipment. The security of the entire CV ecosystem comes down not only to defining secure interconnection points, but also implementing secure products to begin with. These products may be the vehicles themselves, roadside units, infotainment systems, or even the 3rd party dongles that we are now starting to see sprout up on the market. We have already seen research that results in compromise of traffic management platforms as well as vehicles themselves.

Moving Forward

Critical national infrastructure can rely on the IoT ecosystem From a standpoint of interconnected smart cities or smart factories, we see that a connected smart grid of vulnerable things, a smart network of traffic lights or a smart factory that relies on massive interconnection can have a direct effect on the functioning of a modern society. If we think of a typical Industrial Control System (ICS), we see that there are many areas of concern. These areas of concern include the connection of systems that

72

Security Solutions Today • January / February 2017

Whether we’re dealing with smart farms or connected manufacturing facilities, sensors and robotics are now beginning to work hand in hand towards the – accomplishment of objectives. New research in the area of blockchain technology shows promise in extending these capabilities through machine-to-machine negotiation. These capabilities are driving the human out of the decision making loop in many instances and as we rely on IoT products to do the basic thinking for us, we will need to make sure that those products and their associated services and interconnection points are each developed as securely as possible.


EXTRACT FROM “FUTURE-PROOFING THE CONNECTED WORLD” | INSIDE LOOK

Why Development Organizations Should Care About Securing IoT Products With predictions of 50+ billion devices connected by 2020, IoT products will be widely deployed and gain entrance into our homes, workplaces, vehicles and even airplanes. Adding interconnectivity between these devices and our existing network infrastructures will open up new attack vectors that many will attempt to exploit. Security researchers today are working hard to identify vulnerabilities associated with many of the existing IoT products however not all vulnerabilities will be identified and patched prior to a malicious actor making use of them. The consequences of a particular IoT product being used to compromise sensitive user information or worse, to cause harm or damage, will be catastrophic to the product vendor. Even knowing the severe ramifications of fielding an IoT product used in a large scale attack, security professionals are often faced with a daunting task of providing a business case for expending funds to secure productsand systems. Because of this, we have enumerated some reasons that developers should care about securing IoT products. According to [24] security must be addressed throughout the device lifecycle, from the initial designto the operational environment which includes Secure booting, Access control, Device authentication, Firewalling and IPS, finally Updates and patches. Providing a sufficient budget for IoT secure product engineering: 1. Reduces the likelihood that an IoT product will be

counterfeited 2. Limits the ability for attackers to compromise your customer’s privacy 3. May limit liability in the case of a compromised device 4. In the case of CPS, may limit the ability for an attacker to cause damage or harm 5. Reduces the likelihood that your product will receive negative press 6. Can reduce the potential risk and have mitigation controls in place in case the product does have any limitations to embed the security into it In the case of a compromised IoT product, the resultant impact to your business is almost never positive. At a minimum, customers will hesitate to purchase the product based on knowledge that it leaves their systems or homes vulnerabile. At worst, a compromised IoT product will invite legal action or cause physical damage or harm. The US Federal Trade Commission (FTC) has even laid down certain IOT guidelines advising the developers to build security into the architecture, rather than as an afterthought. Other factors that contribute to consumer IoT device vulnerabilities are a mixture of bad design, non-regulated or insufficiently regulated environments, the use of third party hardware/ software and insecure cloud-based resources. Since there is a lot of variability and interdependence as mentioned, it is easy to pass the blame to any of these services as the number of interdependencies increase (overall multiple points of blame). sst

January / February 2017 • Security Solutions Today

73


IN FOCUS | FST BIOMETRICS

AN INTERVIEW WITH

MR. GARY DRUTIN, CHIEF EXECUTIVE OFFICER, FST BIOMETRICS

FST has added former Israeli Prime Minister Ehud Barak to the board, appointed Israeli entrepreneurial heavyweight Avi Naor (founder and former CEO of Amdocs) as Chairman of the Board, and most recently, nominated Gary Drutin as the new CEO of the company. How do you think these changes are projected to take FST to the next level? Before joining FST this year, I could see the company was making major moves in terms of building up its management team. As I begin my tenure as CEO, I’m energized and excited by the executive team we now have in place. I’m working with many gifted leaders from a variety of important fields including business, defense, investment and entrepreneurship and I’m extremely confident in this well-rounded and extremely capable team. For example, Avi Naor, the new Board Chairman, has immense experience with his in-depth knowledge of how to expand a company, as seen by his previously role in the mega-IT company Amdocs. What connects all of us who have recently joined FST is that as soon as we saw our technology, we each felt that this technology could be a game-changer – something that could influence the world. I, and my colleague chose FST because we believe in our products and we see our potential for leading the biometric market in the years to come.

74

Security Solutions Today • January / February 2017

Our goal this year is to take the company from the current stage of rapid growth and establish it to become the gold standard of the in motion identification market in the near future. This includes adding additional capabilities to our systems and expanding into focused markets across the globe.

FST is a leading biometrics identification solutions provider. What are your plans for the Asian region? Asia is a fast-growing market in which we have distributors working with our current customers. In fact, one of our important customers in the region is SingTel, a Singaporebased telecommunications company. We have installations in many locations in Asia, including China. Our solutions are a very good fit to meet the challenges and requirements of the Asia region.

Tell us more about the new solution developed by Farkash and team for the human identification market. FST had a goal in developing its flagship product, IMID Access. This was to create a solution that was both highly secure, and highly accurate. He realized that with biometrics, it would be necessary to utilize more than one technology. As such, FST has developed a multi-modal biometric technology, which includes a fusion of face recognition and body behavior analytics. This fusion allows for highly accurate, quick and seamless in-motion identification. Since our solution is software-based, it integrates with many existing hardware and infrastructures. In fact, we are now partnered with many secure access industry leaders and


FST BIOMETRICS | IN FOCUS

turnstile technology vendors who have chosen to integrate our biometric identification technology into their existing solution.

FST aspires to be the global standard for ensuring safe, secure and convenient environments and facilities around the world. What strategies is FST employing in order to reach this goal? There are currently global efforts taking place to create standards across the biometrics industry. Our CTO, Shahar Belkin, represents Israel in the International Standards Committee for biometrics and biometrics identification. Shahar, along with representatives from around the globe are building the global biometrics standard in biometric identification. This committee is involved in research, standards development, trialing various technologies for interoperability, as well as multi-national technology trials. We also continue to focus on our ability to work with our clients on the ground, to ensure that they receive the best and most suitable systems for their needs. Through our highly adaptable approach, alongside the ease-ofuse of our technology, we are able to create the custom solutions customers have come to expect, without the need to compromise on security or seamlessness of the solution.

Tell us more about FST’s competitive edge over others in the field of Access Control. There are many factors that set FST apart from the competition. These include: • The accuracy of our system over others • The convenience offered by In Motion Identification - authorized users do not need to stop to be identified • Identifies multiple people simultaneously – IMID Access can accurately identify groups of people entering a building, allowing for foot traffic to continue moving • A hands-free system - users don’t need keys, cards or fobs – the only interaction with the system is looking at the camera as a user walks towards to access point • Non-invasive biometrics – using face and body behavior means we don’t take any biometric data that is not visible to the human eye – no fingerprinting or iris scans.

Aesthetically unobtrusive – many systems can be an eyesore, but ours is just a mini dome that takes up little space

What challenges do you think the Asian Security Market will face in coming years and how will FST meet those challenges? The Asian security market faces a number of challenges. The first is one that we see in Asia and across the globe: urbanization. People are increasingly moving from rural areas to towns and cities. With rapid urbanization, many cannot afford to high cost of living, and this leads to an increase in the social gap, which ultimately results in a rise in the crime rate. As such, there is a need for better security systems. Our system answers the need for increased security, but does not sacrifice on convenience. We pride ourselves on offering a solution that is both highly secure and highly convenient. A second challenge that the Asia region faces is the rise in terrorism in this region. We didn’t see this level of terrorist activity in Asia, even ten years ago. This unfortunate trend, which we already see in Europe and the Middle East means that Asian organizations will need an increased ability to secure various locations. Another thing to note – often terrorists look to hit crowded locations. This makes it even more critical to keep people moving as smoothly as possible, which our solution does.

What is FST’s global strategy with regard to vertical market penetration and partnerships? FST has experienced considerable growth in our customer base and management team this year, allowing us to move ahead with our plans and form strategic partnerships with major security companies in areas such as United States, Europe and South East Asia. While we don’t want to give too much away in terms of our strategy, we are working with current and potential customers to integrate our system in focused verticals including healthcare and pharma companies, commercial buildings, banks, and leading multi-national enterprises. For more information, please visit www.fstbm.com. sst

January / February 2017 • Security Solutions Today

75


IN FOCUS | SOUTH EAST ASIA AND TAIWAN AT ARUBA, A HEWLETT PACKARD ENTERPRISE COMPANY

AN INTERVIEW WITH JUSTIN CHIAH, DIRECTOR AND GENERAL

MANAGER, SOUTH EAST ASIA AND TAIWAN AT ARUBA, A HEWLETT PACKARD ENTERPRISE COMPANY

In what ways do you think the IoT exposes new cracks in security that will challenge the security market? According to a November 4, 2016 Gartner research report, Real Time Discovery, Visibility and Control are Critical for IoT Security:

“Lack of network and device visibility is a top concern of security and risk management leaders, both in consumer and industrial IoT verticals, as they don’t know what assets they have and if protection is required. Discovery is a prerequisite to IoT security.” Also, Gartner recommended that IT teams “Determine which discovery and visibility business benefits — such as reducing costs/risks, enabling postbreach response and recovery, enabling asset discovery, being more ready for regulations and audits, and complementing BYOD security initiatives — are most compelling before architecting use cases.” In the new IoT world, security can be challenging, especially in large-scale IoT deployment at the enterprise network edge. In 2016 alone, we witnessed a number of high profile attacks on various sectors such as in finance and telco – just to name a few. Yet, many businesses are continuing to turn a blind eye to these threats and are still relying on traditional methods of cybersecurity that were not designed to tackle the sophisticated threats present today. IoT has the potential to facilitate beneficial decision making that no one device could spur

76

Security Solutions Today • January / February 2017

on its own. However, that potential can only be realized if the integrity of the information collected from the devices is beyond reproach. Simply put, regardless of how data from IoT is used, it is only of value if it comes from trusted sources, assuring data integrity. The Achilles heels of IoT is that many data sources lack credibility, and addressing that shortcoming isn’t a trivial task given the diversity of devices represented in that universe. When TCP/IP networks were created in the early 1970s, the original design supported just 256 networks. This is why at HPE Aruba, we are focusing on delivering visibility and secure connectivity for large-scale IoT deployments at the enterprise network edge. Aruba’s Connectand-Protect architecture is modeled after the best security practices used in the defense and intelligence sectors. Devices and users are un-trusted until they can be proven or made trustworthy. Activities are continuously monitored and usage rights are constantly enforced. This is accomplished using solutions from Aruba – Wi-Fi, switches, role-based access, ClearPass, ALE, AirWave network management – and best-in-class solutions from technology partners including Palo Alto Networks, MobileIron, RedSeal, and Software AG. The resulting solution brings order and trust to the proverbial hairball of old and new, proprietary and standards-based, untrusted and unsecured devices that make up IoT. Connect-and-Protect levels the playing field so the extraordinary benefits of exploiting IoT data can be realized without incurring unacceptable levels of risk.


SOUTH EAST ASIA AND TAIWAN AT ARUBA, A HEWLETT PACKARD ENTERPRISE COMPANY | IN FOCUS

We added to this framework with recent announcements of the Aruba ClearPass Universal Profiler and the Aruba 2540 Series Switches. These new solutions identify and inventory all IoT devices as they connect to the network, and drive down the per-port cost of wired IoT connectivity. The new ClearPass Universal Profiler automatically identifies the attributes of IoT devices as they attempt to connect to the network. This enables IT managers to catalog what IoT devices are on wired and wireless networks and assign the appropriate policies to each one. The Universal Profiler provides visibility and context regarding risk and performance issues derived via IoT devices. The Aruba 2540 Series Switches further protect IoT devices with unified role-based access. This feature identifies and assigns roles to IoT devices as they connect, prioritizing businesscritical applications and controlling which network resources the devices can access. The 2540 Series Switches are optimized for small-to-medium density IoT enterprise edge deployments.

How do you propose security companies meet these challenges? Security companies need a different type of security approach — one that starts on the inside and extends beyond the perimeter, and the other which can adapt to the dynamic nature of users — and mobile-oriented threats — those that can originate from anywhere. The combination of mobility and cloud definitely demands a new paradigm in approaching security. This turns the age-old paradigm of perimeter security on its head. Previously, security solutions like firewalls and IPS were designed with the concept of providing a secure bulwark on what is assumed to be the perimeter of the network / premises. IE what is beyond the firewall is a red zone / untrusted and what is within is assumed to be inside a green zone. This is no longer valid given the fluidity of users with mobility and applications with cloud.

Our Adaptive Trust model adapts to this new reality and the dynamics of mobility by leveraging rich contextual data from the network and its security systems for a stronger, wellcoordinated defense. Central to the Adaptive Trust model is Aruba ClearPass solution. It leverages an ecosystem, internal, and third party solutions to globally control and enforce access policies based on roles, devices, and other contextual attributes on any multivendor network. This approach ensures that IT can deliver new services via self-service workflows and provide an excellent user experience, while preventing insider data leakage, malware threats and other high-level vulnerabilities. The Aruba ClearPass Policy Management Platform is a central component that allows IT to adapt and apply trust levels based on every user and device that requests wireless, wired or VPN access. To do this, ClearPass leverages real-time, contextual data that IT can trust – a person’s role inside an organization, device and app attributes, location and insight from third party security solutions – to create policies that satisfy highly mobile security needs. ClearPass works across any multivendor network by replacing outdated legacy AAA with context-aware policies. And includes profiling, BYOD and guest onboarding, integration with MDM/EMM, firewalls, SIEM solutions, and scalability features to meet today’s evolving business needs. With the advent of IoT, Clearpass leverages this tried and tested methodology, extending this approach from users devices to IoT devices. Granular network access privileges are granted based on a device or user’s role, type, MDM attributes, device health, location, and time-of-day.

What strategies should Asian security companies adopt in order to have a holistic network strategy that embraces IoT while simultaneously securing their network from the edge? It is no longer safe to assume that perimeter protection is enough as devices are able to connect from anywhere. At the same time, security policies need to be simple and transparent to the employee, and must not be

continue on page 15

January / February 2017 • Security Solutions Today

77


IN FOCUS | SOUTH EAST ASIA AND TAIWAN AT ARUBA, A HEWLETT PACKARD ENTERPRISE COMPANY

of any inconvenience or hindrance for the user. Be it an Asian enterprise or global enterprise, security approaches need to adopt a strategy that meets requirements for identifying, connecting, and protecting all mobile and IoT devices at the edge.

As more data is being shared among individual IoT devices, attacks will become more popular and sophisticated, combining both device locks with credential and possible identity theft. This would point towards a possible growth in mobile data protection as well.

With new software and hardware solutions, as well as new ecosystem partners, HPE Aruba can now accelerate an organization’s move to IoT adoption in smart buildings across verticals. We have developed a new Aruba ClearPass Universal Profiler that automatically discovers and fingerprints all IP-enabled managed, unmanaged, and IoT devices on multi-vendor wired and wireless networks. This gives IT organizations the ability to see clearly how many devices in total and per category are connected at any one time. IT departments no longer have to guess or use disparate tools to see what devices are connecting to their networks.

Trust in the cloud is also expected to increase, and with it, more sensitive data and processing within the cloud. This will lead to more interest in attacking the cloud, forcing security companies to further develop their cloud security capabilities in the near future.

Comprehensive information about device type, operating system, status, and location are displayed in an easy-to-read, graphical user interface. This information can then be used for performance and security tuning across infrastructure components, and then shared with ClearPass Exchange partners to deliver user behavior analytics, deception intelligence, and firewall security. For organizations that then require policy management, there’s a simple migration path to the Aruba ClearPass Policy Manager, to enable automatic authentication and policy enforcement after devices are identified and fingerprinted. Devices that are exhibiting unwanted behavior can then be automatically remediated using data from Aruba’s partners to minimize the risk to networks.

Tell us more about projected trends in the security market for 2017. Enterprises will be paying more attention to security with IoT deployment in mind. We already see the trend of bot devices being used in DDoS attacks and more IoT malware with many opening backdoors into linked devices, networks, and smart homes that often goes undetected for extended periods of time.

78

Security Solutions Today • January / February 2017

How do you think security companies will benefit from the prediction that by 2020, 75% of large and mid-size companies would have spent up to US $1.5 Trillion on IoT solutions? It is no surprise that security companies will benefit greatly from this, as IoT becomes more integrated within companies as they try to keep up with the ‘Mobile Generation’. There would be a race by security companies to be the first to research and develop cutting edge cloud and IoT security measures that would grant companies even more flexibility as BYOD is the next phase for many organizations. This competition will definitely drive innovation within the security industry.

As more companies adopt BYOD policies, mobility has become very popular with the workforce. Are traditional security measures still relevant to mobility? Enterprises cannot be content with sole reliance on traditional security measures. This presents its own set of security issues that companies must look towards, whereby protecting its decentralized data that exists within this extended ecosystem will soon take priority. As we discussed earlier the paradigm that traditional security framework is increasingly antiquated given the trends of mobility. Our Adaptive Trust framework leverages rich contextual data from the network and its security systems for a stronger, wellcoordinated defense. With the Clearpass


SOUTH EAST ASIA AND TAIWAN AT ARUBA, A HEWLETT PACKARD ENTERPRISE COMPANY | IN FOCUS

Policy Manager, we can apply policies that align with the organization priorities using the granularities and richness of contextual network and third party information data. At the same time, there is a need to automate BYOD workflows so that this does not become a burden on IT operations and as such adopting a policy framework approach help to bring about a high degree of automation in a secure manner. A global study conducted by the Economist Intelligence Unit & sponsored by Aruba in March 2016 titled “Mobility, Performance and Engagement”, which surveyed 1,865 employees in nine countries—Australia, France, Germany, Japan, New Zealand, Singapore, the UAE, the UK and the US, has established a measurable link between more mobile-first working environments and an increase in employee engagement, proving that CIOs can drive increased business performance through welldeveloped and executed mobile strategies. The study showed that companies rated by employees as “pioneers” in how they support mobile technology saw a rise in productivity (16%), creativity (18%), satisfaction (23%), and loyalty (21%), when compared to organizations that were poorly rated at supporting mobile technology. In addition, six in ten (60%) employees said mobile technology makes them more productive, while more than four in ten (45%) believe it causes their creativity to rise. Enterprises need to ensure that they are creating processes that are applicable for the mobile worker and that there are automated workflows that allow their employees to participate in the security process. Solutions such as the Aruba ClearPass Management system allows organizations to set policies evolving user, security and business needs.

At HPE Aruba, we advise our customers to adopt a 4 Steps To Aruba’s MobileFirst Approach 1.

Beef up wireless to optimize for mobile and

IoT - Aruba’s 802.11ac portfolio delivers an enterprise-grade, stable wireless solution so that mobile users can roam while accessing business applications and data. 2. Futureproof your wired infrastructure - The integration of the HPE and Aruba access portfolios is a key ingredient in our mobile-first approach. As organizations transition to the digital workplace, they won’t need as many ports as before because of the increased use of Wi-Fi. Although a highly mobile workforce means that the majority of users will connect via wireless, the surge in IoT devices and the increasing use of Wi-Fi bandwidth means that the wired infrastructure is critical, too. 3. Predict network issues before they happen - Aruba’s AirWave software is a powerful tool for not only monitoring your entire access network but also improving user experience with rich analytics. As the number and adoption of mobile devices and IoT increase in the digital workplace, the first thing that stands in the way of scalable growth is the lack of tools and resources for network operations teams to maintain visibility to all things connected and the network infrastructure. Aruba AirWave 8.2 meets this challenge by offering better network analytics and predictive visualization. 4. Secure the network with smart policy management - The Aruba ClearPass Policy Management Platform allows IT to assert and enforce trust on every user and device on the wireless, wired and VPN network. To do this, ClearPass leverages real-time, trusted, contextual data — a person’s role inside an organization, device and app attributes, location and insight from third party security solutions — to create policies that satisfy highly mobile and IoT security needs. For more information, please visit www.arubanetworks.com. sst

January / February 2017 • Security Solutions Today

79


PRODUCT SPOTLIGHT | BOSCH

DIVAR network and hybrid recording solutions Bosch DIVAR recording solutions make professional video surveillance easy for everyone.

D

IVAR hybrid models are a cost-effective way to upgrade from analog to IP video surveillance one step at a time. For enterprises that are already digital, DIVAR network models can be scaled up as their business grows. All DIVAR solutions are future proof and support up to 12 megapixel network video surveillance cameras plus H.264 and H.265 video compression technology. They guarantee safe data storage and make it easy to watch live footage, playback recorded content, or reconfigure local unit settings anytime from anywhere.

For more information, please visit www.boschsecurity.com. sst

80

Security Solutions Today • January / February 2017


COMNET | PRODUCT SPOTLIGHT

RLGE / RL1000 Features:

• • • •

Substation-Rated, Enhanced Security SCADA-Aware Ethernet Layer 2 Managed Switch/Layer 3 Router. Optional 2G/3G & 4G LTE Cellular Radio Link with 2 SIM card slots. Enhanced Network Security with enterprise-class firewall (Deep Packet Inspection). Fully compliant with the requirements of IEC 61850-3 and IEEE 1613 Class 2 for use utility substations and NEMA TS-1/ TS-2 for Traffic Signal Control Equipment.

For more information, please visit www.comnet.net. sst

January / February 2017 • Security Solutions Today

81


PRODUCTS

SECURITY MANAGEMENT

CCTV & IP SURVEILLANCE

Model: Surveon NVR2100 Series with hardware RAID By: Surveon

i www.surveon.com

• • • • • • • • • •

82

Used in Surveon’s professional casino solutions. Inclusive of a series of HDR cameras, 5 megapixel fisheye cameras, enterprise hardware RAID megapixel recorders as well as central management software, also called as Surveon Control Center (SCC). Casinos can easily track every event that occurs at any time with improved profitability and with cost savings. Caters to demand for complex light conditions and coverage from various angles. 3 megapixel cameras provide 1.5-time larger monitoring range at 30 FPS, becoming an ideal option for monitoring areas with high speed, such as roulette wheels. PTZ cameras offer wider view angles and coverage with excellent megapixel image quality, protecting people from potential threats. Among Surveon camera selection, 2MP compact box CAM2311SC with WDR, 3MP indoor dome CAM4321LV with 3-axis support, 2MP PTZ dome CAM5330SZ with 10x optical zoom, 3MP outdoor speed dome CAM6471EZ, and 5MP indoor fisheye CAM7511 are to be recommended for such application. Supporting up to 64-channel 5MP recording, the Surveon NVR2100 Series with hardware RAID provides large capacities for longer video retention periods, overall system stability and zero video loss. It is hot-swappable, has thermal proven cables and redundant components with industrial grade standard make it possible to achieve 24/7 non-stop megapixel recording. Paired with Surveon Enterprise VMS with SCC management software, the advanced matrix wall management enables monitoring.

Security Solutions Today • January / February 2017


SECURITY MANAGEMENT

PRODUCTS CCTV & IP SURVEILLANCE

Model: Matrix Video Surveillance Solution By: Matrix

i www.MatrixSecuSol.com

• • • •

Helping hoteliers improve their businesses by enhancing customer retention as well as customer referrals A smart solution with preventive security that issues real-time alerts, thus enabling premises owner to take timely action and prevent damage. Guarantees foolproof security, giving customers peace of mind. Enhances customer service to provide a memorable experience to guests.

Issue 4/2016 Issue 3/2016

Issue 2/2016

INSTALLATION TECHNOLOGIES INSTALLATION TECHNOLOGIES

Royal Albert Hall awash in Clay Paky lighting

Another Jewel in the crown for Avolites

INSTALLATION TECHNOLOGIES

Stockholm’s Royal Seaport transformed for one night

LAVA is a one-stop entertainment technologies publication that covers the Asia-Pacific region, bringing you the latest news and information from the lighting, audio and visual solutions industries. With a wide readership made up of designers, installers, specifiers and rental specialists, LAVA has what it takes to put your brand in the spotlight.

101 Lorong 23 Geylang #06-04 Prosper House Singapore 388399 T: (65) 6842 2580 F: (65) 6745 9517 W: www.tradelinkmedia.com.sg E: info@tradelinkmedia.com.sg

January / February 2017 • Security Solutions Today

83


PRODUCTS

SECURITY MANAGEMENT

ACCESS CONTROL

Model: Model: COSEC Door FMX (Multispectral Fingerprint Door Controller) By: Matrix

i www.MatrixSecuSol.com

• • • • • •

COSEC Door FMX is a cutting edge multispectral fingerprint based door controller, which boosts security and productivity of modern enterprises. The advanced multispectral technology of COSEC Door FMX reads surface and subsurface of a live fingerprint and gives very clear and strong image even if the surface layer is not available due to dirty finger, dry finger, oily finger, poor ridge image or other environment problems. It detects live fingerprint, which ensures access denial of trespassers with fake fingerprints. This unique identification process outperforms all other fingerprint sensors and provides robust, reliable and highly secured biometric information of the user. Due to its powerful fingerprint-reading algorithm, COSEC Door FMX provides high-end security and can work in extremely harsh environment where a user’s fingerprint is difficult to scan. High security is essential at places where risk of intrusion is high. A few industries where COSEC DOOR FMX can prove useful: - Defence - Airport - R&D - Gems and Jewellery - Banks

Different Conditions Condition Industry

Condition Industry

Dry Manufacturing, Oil & Petroleum

Elderly Banks, R&D Centers, Pharma Sector

Wet or oily Construction Sites Variable Pressure Mining Industry, Mining Industry Construction Manufacturing

Dirty Construction Sites Mining Industry Manufacturing

84

Security Solutions Today • January / February 2017

Damaged Construction Sites Mining Industry Manufacturing


SECURITY MANAGEMENT

PRODUCTS

RADIO COMMUNICATION TECHNOLOGY

Model: Ka-Band SATCOM Antenna By: Rantec Microwave Systems i www.rantecantennas.com

• •

12.0” (30.48 cm) Aperture P/N 501410

Frequency Bands Receive Transmit

Band 1 Band 2 19.2 to 20.2 GHz 20.2 to 21.2 GHz 29.0 to 30.0 GHz 30.0 to 31.0 GHz

Antenna Polarization Receive Transmit

LHCP or RHCP Circular, orthogonal to the receive

Receive G/T

11 dBi/K at 30° elevation

Receive IF Output

For both Bands, 950-1950 MHz. The signal must be diplexed with a 10 MHz reference.

Receive Amplification

72 dB relative to feed input

Transmit EIRP

44.9 dBW at P1dB nominal

Transmit IF Input

For both bands, 950 to 1950 MHz. The signal must be diplexed with a 10 MHz reference.

Weight Antenna ACU

26 pounds maximum 4.0 pounds maximum

Power Requirements

28 Volts DC, 7 Amps

Elevation Performance Travel Range Velocity Acceleration

5 degrees to 85 degrees relative to mounting plate in aircraft tail 30 degrees per second minimum 40 degrees per second per second

Azimuth Performance Travel Range Velocity Acceleration

Continuous 30 degrees per second minimum 40 degrees per second per second

Environmental Operating Temperature Vibration/Shock

-55°C to +70°C RTCA/DO-160G

January / February 2017 • Security Solutions Today

85


PRODUCTS

SECURITY MANAGEMENT

RADIO COMMUNICATION TECHNOLOGY

Model: Ku-Band SATCOM Antenna By: Rantec Microwave Systems i www.rantecantennas.com

• •

18” (45.7cm) Aperture P/N 501409

Frequency Bands Receive Transmit

Band 1 RF 10.95 – 11.75 GHz IF 1200 – 2000 MHz RF 13.75 – 14.5 GHz IF 950 – 1750 MHz

Band 2 11.7 – 12.75 GHz 950 – 2000 MHz

Antenna Polarization Rec. Gain at Feed Output Receive G/T IF Output & Bias Voltage Receive Amplification Transmit EIRP Transmit Gain Transmit Power

Linear, Orthogonal Transmit and Receive 32.2 dBi minimum at 11.7 GHz 11 dBi/K nominal at 30° elevation angle IF frequencies must be diplexed with 10 MHz ref. and 18 Volts DC 72 dB minimum relative to feed input 44 dBW minimum at P1 dB nominal 34 dBi minimum at 14 GHz 11 W minimum into feed port

Weight Antenna ACU

31 pounds maximum 4 pounds maximum

Power Requirements

28 Volts DC, 12 Amps

Elevation Performance Travel Range Acceleration

5 degrees to 85 degrees relative to mounting plate in aircraft tail Velocity 30 degrees per second minimum 40 degrees per second per second minimum

Azimuth Performance Travel Range Velocity Acceleration

Continuous 30 degrees per second minimum 40 degrees per second per second minimum

Polarization Performance Travel Range 270 degrees total, ± 90 degrees from vertical or horizontal Velocity 30 degrees per second minimum. Acceleration 40 degrees per second per second minimum Environmental Operating Temperature Vibration/Shock

86

-40º to +60ºC RTCA/DO-160

Security Solutions Today • January / February 2017


SECURITY MANAGEMENT

PRODUCTS

RADIO COMMUNICATION TECHNOLOGY

Model: Phantom Fin multiband antenna FHQ69273CE-518VC5 By: Laird Technologies i www.lairdtech.com

• • • • • •

Laird’s Phantom Fin multiband antenna provides an excellent solution for the public safety, transportation and aftermarket fleet applications. The Phantom Fin requires only (1) one single hole mount/fixing which reduces vehicle damage, cost of installation and visual impact. The Phantom Fin design provides multiple antenna functions while remaining discrete. The Phantom Fin multiband antenna integrates 4G/ LTE, GPS, UHF and WLAN frequency operation into one IP67 rated aerodynamic housing. Number of Ports: 4 (4G/LTE, WiFi, UHF & GPS) Specs - 4G/LTE. WiFi & UHF: U Frequency band: - 698-960 MHz / 1710-2700 MHz - 2400-2500 MHz / 4900-5875 MHz - 430-520 MHz U Pick Gain, Typical: - 3.5 dBi/6.5 dBi - 6.6 dBi - 2.1 dBi U Nominal Impedance: 50 Ohms U Polarization: Vertical Lineal U Azimuth Beam Width: Omnidirectional U Dimensions (HxLxW mm and inches): 98 x 70 x 160 ( 3.9”x 2.7” x 6.30”) U IP Dust and water ingress rating: IP67 U Connector: - LTE: SMA- Male - WiFi RPSMA-male - UHF: PL259 Specs – GPS - Frequency Band: 1575.42 MHz (GPS L1) - Band Width: 6MHz (Typical) - Amplifier Gain: 27 dB ± 3 dBc - Nominal Impedance: 50 Ohms - Cable - Exposed Length: RG174-518.2 cm (17 ft.) - Connector: SMA- Male

January / February 2017 • Security Solutions Today

87


PRODUCTS

SECURITY MANAGEMENT

RADIO COMMUNICATION TECHNOLOGY

Model: Vehicular 4-port MIMO antenna VLQ69273B21G-518A By: Laird Technologies i www.lairdtech.com

• • • •

88

Laird’s vehicular 4-port MIMO antenna covers the 698-960 / 1710-2700 MHz, 2300-2700 / 4900-5900 MHz as well as GPS (1575.42 MHz) frequency ranges. Configured with 3-port, dual-band elements in addition to 1-port with integrated GPS. Number of Ports: 4 (2-ports 3G/4G LTE, 1-port WiFi, 1-port GPS) Specs - 3G/4G LTE & WiFi: U Frequency band: - 698-960 MHz / 1710-2700 MHz - 2300-2700 MHz / 4500-4900 MHz U Pick Gain - 3.3 dBi/4.6 dBi - 5.5 dBi /5.3 dBi U Nominal Impedance: 50 Ohms U Polarization: Vertical Lineal U Azimuth Beam Width: Omnidirectional U Dimensions (DiaxH): 132 mm x 75 mm (5.2” x 2.9”) U IP Dust and water ingress rating: IP67 U Connector: - 3G/4G: SMA- Male - WiFi RPSMA-male Specs – GPS - Frequency Band: 1575.42 MHz (GPS L1) - Band Width: 6MHz (Typical) - Amplifier Gain: 27 dB ± 3 dBc - Nominal Impedance: 50 Ohms - Cable - Exposed Length: RG174-518.2 cm (17 ft.) - Connector: SMA- Male

Security Solutions Today • January / February 2017


SECURITY MANAGEMENT

PRODUCTS

RADIO COMMUNICATION TECHNOLOGY

Model: Military VHF Broadband Antenna VHF3088VMS By: Taiweb

i www.taiweb.com.tw

Product Specifications:

• • • • • • •

Military Frequency: 30~88MHz VSWR: max 3.5:1 Gain: relative1/2 Whip on GP-4~3dB Impedance: 50ohm Polarization: Linear, Vertical Connector: BNC, Female Power: 100W

Model: Marine VHF antenna - MFB-1200 By: Taiweb

i www.taiweb.com.tw

• • • • • •

Frequency: 156~162MHz Center band: 156MHz Gain: 3.5dB VSWR: <=1.2 Length: 1.2M Weight: 1.2kg

January / February 2017 • Security Solutions Today

89


PRODUCTS

SECURITY MANAGEMENT

MIXED CATEGORY

Model: EX78000 series PoE Switch By: EtherWAN i www.etherwan.com

• •

• • • • • • • • • • • •

90

Network Connectivity Solution EtherWAN’s hardened EX78000 Series PoE switches supply ample power for wireless access points and surveillance cameras directly through LAN cables. EtherWAN offers a customized mechanical design in regards to the physical dimensions and connector placement in limited space. Reliable ppower over Ethernet as the EX78000 hardened managed Ethernet switch provides 8 ports of 30W PoE per port with IEEE802.3at standard, delivered over Ethernet cables. Efficient network management as Network management functions help facilitate data communications efficiently and securely, while reducing maintenance hassles. EtherWAN’s Alpha-Ring self-healing ring technology provides a recovery time of less than 15ms after a fault, ensuring non-stop transmission and minimizing packet loss. Network engineers can access management features such as port security, IGMP snooping, port-based VLAN, GARP protocols and link aggregation, via web browser, Telnet, SSH, SNMP, RMON, TFTP, and RS-232 console interfaces. For quick maintenance, an external storage device is available for switch configuration backup and restoration. It has no moving parts and an extended lifespan as EtherWAN’s EX78000 series hardened Ethernet switches are constructed from durable materials, and undergo environmental testing from -40°C to 85°C. The fanless and ruggedized housing provides extra durability against shock and vibration. The switches are also compliant with EN 55022 for high immunity from electrical interference, an important factor in rail environments. There is optimized mechanical design as EtherWAN provides customized dimensions and mounting methods to make switch installation compatible with unique structures. Related products EX78000 Series, Managed Hardened 8-port 10/100BASE PoE and 2-port Gigabit Ethernet Switch EX76000 Series, Managed Hardened 16-port 10/100BASE PoE and 2-port Gigabit Ethernet Switch EX78900 Series, Managed Hardened 16-port Gigabit (8 PoE) Ethernet Switch

Security Solutions Today • January / February 2017


SECURITY MANAGEMENT

PRODUCTS MIXED CATEGORY

Model: EX77900 Series Rackmount Hardened Managed Switch By: EtherWAN i www.etherwan.com

• • • • • • • • •

EX77900 Series, a Hardened Full-Gigabit Managed 28-port switching platform that combines the advantages of Layer 3 routing protocols with robust management features and hardened specifications. With support for static routing, Routing Information Protocol (RIP) V1/V2, and Virtual Router Redundancy Protocol (VRRP), these switches deliver outstanding flexibility and security in a high performance and cost-effective package. The EX77900 switches are designed to operate in harsh environments and can withstand temperatures from -40°C to 75°C (-40°F to 167°F). The EX77900 series is extremely well suited for network connectivity in intelligent traffic systems and critical infrastructure installations. Meeting the strict EMC requirements of NEMA TS2 and IEC 61850-3 standards, the switches can maintain continuous operation during voltage dips and electrical interruptions of up to 0.5 seconds as per IEC 61000-4-11. Power and network redundancy is available from the EX77900 with dual power inputs, and support for STP, RSTP, MSTP or EtherWAN’s Alpha-Ring™ protocols. With four 10G SFP+ ports, the EX77900 can connect to a core network or form a redundant ring with ease. The EX77900 is fully managed via RS-232, CLI, Telnet and web browser, supporting SNMP, port mirroring, QoS, flow control, VLAN, Link Aggregation, IGMP snooping, DHCP, and DDM. Additional features of the EtherWAN EX77900 include dual firmware image backups, which prevent firmware upgrade failures, and support for USB dongle for quick configuration backups.

Do you have a product story?

Good! Email us at sst@tradelinkmedia.com.sg January / February 2017 • Security Solutions Today

91


POST-SHOW REPORT | SECUTECH VIETNAM

Secutech Vietnam

International Security, Fire & Safety Exhibition & Conference Friendship Cultural Palace Hanoi, Vietnam, 21 – 24 September 2016

Biggest ever Secutech Vietnam sets records with jump in exhibitor and visitor attendance Show gained overwhelming support from local government and industry

S

ecutech Vietnam, the leading International Security, Fire & Safety Exhibition & Conference in the country concluded its ninth edition successfully. Running from 21 – 24 September 2016, the event is the springboard for suppliers to tap into the expanding market in Vietnam. Celebrating the 55th anniversary of the General Department of Fire Prevention & Rescue, the show made its special edition in Hanoi, Vietnam’s capital city and the trade hub of the country’s northern region. A dramatic increase of exhibitors, from 110 to 250, was recorded and it reinforced that the members of the industry are optimistic about the Vietnamese market. Exhibiting brands included ASTEC, Chang Sung ACE, Dahua Technology, Diteco, ECOME, Fire Protection Technologies, Hikvision, Hi-Max, HI SHARP, Honeywell, Merit LILIN, Namson Technology, Nha An Toan, Phuc Binh, Rapidrop, SilverSea, Techpro, Vantech, Vietsafe and Western Digital. The show attracted a total of 7,473 trade visitors from 18 countries and regions, representing a 41% increase to last year’s show (2015: 5,272 visitors). Besides Vietnamese visitors, the top five visiting countries and regions were Korea, China, Taiwan, Singapore and Japan. In addition to visitors from Asia, the show also attracted trade visitors from America and Europe, such as France and the US. To facilitate sourcing, four themed zones were established, which were Security, Fire & Safety, Smart Home, as well as Electric & Automation. Moreover, there were international pavilions from Korea and Taiwan and

92

Security Solutions Today • January / February 2017

the Underwriters Laboratories (UL) Pavilion displaying the latest technologies and solutions to visitors. Ms Regina Tsai, Deputy General Manager of the show organiser, Messe Frankfurt New Era Business Media Ltd, shared: “We are dedicated to enhance visitor’s experiences by offering a diverse fringe programme alongside the product showcase. During the four-day show, we have launched a series of product demonstrations such as fire extinguishing as well as organised 25 sessions of interactive seminars and forums. They were highly relevant to the current hottest topics in the areas of digital security solutions, fire and disaster precaution and industry automation. Collectively we have welcomed over 1,000 audiences in these events. I am sincerely grateful for the support and Secutech Vietnam will continue to serve as a global platform committed to unfolding the industry’s advancements and future trends.” Secutech Vietnam is a security industry trade fair that benefitted from the support of various parties. The President of Vietnam, Mr Tran Dai Quang, and the Deputy of Prime Minister, Mr Truong Hoa Binh visited the show. Their attendance revealed the government’s support of the industry’s development. The show also gained continuous support from the industry-leading companies. Western Digital (South East Asia) is a loyal exhibitor for Secutech Vietnam. The company’s Country Sales Manager, Mr Khuat Thanh Nam said: “This is our fifth year to attend Secutech Vietnam as an exhibitor, and we met some great visitors who hold the key channels to the fast-growing security


WE THINK SECURITY

Blk 28 Kallang Place #06-12/14 Singapore 339158 Tel: (65) 6741 5200 Fax: (65) 6741 6200 RCB No: 19880111W

Email: info@coselec.com.sg www.coselec.com.sg

Asia-Pacific’s leading source of information for professionals interested in the technique and technology of quality architectural, interior and landscaping design.

Showcasing products in categories that include access control, CCTV/ surveillance systems, integrated security systems, detection and alarm systems, fire extinguishing systems and passive fire protection.

A regional trade magazine designed to reach a progressive, diverse and dynamic audience of the bathroom, kitchen and ceramic industries.

With a solid network of designers, installers, specifiers and rental specialists in the lighting, audio, and visual solutions industries, LAVA has what it takes to place your brand in the spotlight.

A publication that aims to promote lighting’s purpose as an integral part of realising a quality built environment, emphasising the importance of the role of professional lighting designers in the total design process.

V Victoictoria T ria C heatr once e rt H & all

Apr

- Jun

2016

ARCH ITE Singap CTURE Pal Hotel ore; Musee ace Gar Expres de l’Ho den Baz roof; aar mme The Ver s Inn in in Bud Empr in Na & Int ape ernatio tical Gar shik, Ind Paris INT ess Pla ERIOR st; Alkaff ia LAN nal Sto den by ce, Sin The Par Upper DSCA Patrick ne, Ma PING gapo Serang k rble Glouce Lane, Ho and CerBlanc SH re OW ng Kon oon Mosqu ste amic g; NU e Show REVIEWS r Gatew O Bei in 2015 GreenU ay gets rbanSc a new jing; ape Asi green a 20 15 Scan to visit our website

COV ER

TIN BAT Y SPACHERSOOM APR

IL - JUN

Scan this code visit our websiteto

Features civil and structural projects in the region and all over the world, the latest in construction equipment, materials, technology and industry news.

KITC Re-d efin HEN SP ing The AC SURFAC Kitchen ES s in Geo E SPAC met ry ES

A Clas

STO RY

E 201

6

INS

IDE Sho Lighting w Prev iews for Lighting Facade / Reviews for Inte s + Landsca rior Spa pes ces

Issue 2/2

016

IN STAL

LATIO N

NO LO GI ES St Royaolckholm’s tra Seapor for onnsformedt e nigh t TECH

a AstW orialdHorf ot COVE R

STOR Y

el

Scan to visit our website

101 Lorong 23 Geylang #06-04 Prosper House Singapore 388399 T: (65) 6842 2580 F: (65) 6745 9517 W: www.tradelinkmedia.com.sg E: info@tradelinkmedia.com.sg


Scan this code to visit our website

Scan this code to visit our website

Scan this code to visit our website

Security Solutions Today (SST) is a leading publication on the latest security information, trends and technology, and products that include Access Control, CCTV/IP Surveillance, Intrusion Detection and Integrated Security Systems. SST is packed with the latest developments in security technologies and trends, events, previews and reviews of major global trade shows, product launches and security installations worldwide.

Scan to visit our website

WE ALSO PUBLISH

101 Lorong 23 Geylang #06-04 Prosper House Singapore 388399 T: (65) 6842 2580 F: (65) 6745 9517 W: www.tradelinkmedia.com.sg E: info@tradelinkmedia.com.sg


Fax your order today +65 6842 2581

Subscription Form

Singapore ARCHITECTURE Sustainable designs & green buildings INTERIOR Retail store design LANDSCAPING Playground equipment (wet) SHOW REVIEW BuildTech Yangon 2016 PLUS Product showcase on green building products

Scan to visit our website

SINCE 1974

Middle East

S$170.00

Southeast Asia Construction

1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00 Middle East

SINCE 1994

S$170.00

Security Solutions Today

1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00 Scan this code to visit our website

SINCE 1992

IMPORTANT

Middle East

S$170.00

Bathroom + Kitchen Today

CapitaGreen

1 year (4 issues) Singapore S$32.00 Malaysia / Brunei S$65.00 Asia S$80.00 America, Europe S$130.00 Japan, Australia, New Zealand S$130.00 SINCE 2001

Middle East

S$130.00

1 year (4 issues) Singapore S$32.00 Malaysia / Brunei S$65.00 Asia S$80.00 America, Europe S$130.00 Japan, Australia, New Zealand S$130.00

Lighting Today

1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00

SINCE 2002

Middle East

S$130.00

1 year (4 issues) Singapore S$32.00 Malaysia / Brunei S$65.00 Asia S$80.00 America, Europe S$130.00 Japan, Australia, New Zealand S$130.00

Lighting Audio Visual Asia

Southeast Asia Building

(Please tick in the boxes)

SINCE 2013

Middle East

S$130.00

Please commence my subscription in _____________________ (month/year)

Personal Particulars

NAME: POSITION: COMPANY: ADDRESS: TEL:

FAX:

E-MAIL: Professionals (choose one): Architect

Landscape Architect

Interior Designer

Developer/Owner

Property Manager

Manufacturer/Supplier

Engineer

Others

I am sending a cheque/bank draft payable to: Trade Link Media Pte Ltd, 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399 RCB Registration no: 199204277K * GST inclusive (GST Reg. No: M2-0108708-2) Please charge my credit card (circle one): Amex / Diner’s Club Card Number:

Expiry Date:

Name of Card Holder:

Signature:


POST-SHOW REPORT | SECUTECH VIETNAM

market in Vietnam. We will definitely come back next year!” Due to city development projects in Vietnam, Mr Khuat expected the security market in the country is growing. At this year’s show, Western Digital was presenting the latest surveillance storage solutions to visitors.” Vantech, another long-term exhibitor from Vietnam, echoed the sentiment. The company’s International Sales Manager, Mr Florian Le Guen, shared: “Secutech Vietnam is an excellent business platform serving local industry professionals well. Vantech has been supporting and exhibiting at the show for many years. This year, we are beyond thrilled to have met some leading buyers based in the ASEAN countries. It is definitely helpful for expanding our business network in the region. We will come back in 2017 for sure!” Overseas suppliers also regarded Secutech Vietnam as a springboard to tap the local market opportunites. Mr Hyeong-Gweon Kim, General Manager for Korea Fire Institute, was satisfied with the exhibition. “Secutech Vietnam is the perfect place to meet up with local distributors and deepen the connection with the key person in the Vietnamese fire protection market,” said Mr Kim. Promoting the Korean company’s products and services on fire and safety, he described the visitors as professional and they have exceptional knowledge in the fire protection industry. UK-based manufacturer of fire sprinkler system

products, Rapidrop International, exhibited at the show for the first time. The company has already expressed their desire to exhibit at the next edition because of the excellent result. The company’s General Manager, Mr Ian Brough commented: “This is our debut at Secutech Vietnam and this outcome is beyond our expectation! The trade show is well-organised and we met some great partners and buyers at the show.” Secutech Vietnam is jointly organised by Messe Frankfurt New Era Business Media Ltd and Vietnam Advertisement & Fair Exhibition JSC – VIETFAIR. The show’s next edition is scheduled to run from 16 – 18 August 2017 at Saigon Exhibition & Convention Center (SECC) in Ho Chi Minh City. For more details, please visit www.secutechvietnam.com. Alternatively, please call Ms Michelle Chu at +886 2 8729 1068 or send an email to michelle.chu@newera.messefrankfurt.com. With 11 events, Messe Frankfurt is one of the world’s leading organisers of fairs and congresses for the expanding international field of civil security. These platforms provide optimum opportunities for gaining a foothold in dynamic growth markets all over the world. Presently Messe Frankfurt organises events in Germany, Asia, the Middle East, Russia, South America and East Africa. Further information can be found at www.safety-security.messefrankfurt.com. For more information, please visit www.messefrankfurt.com. sst

ADVERTISERS’ INDEX GIGA-TMS 13 INTERPOL WORLD 2017 3 INTERSEC 2017 OBC IOT ASIA 2017 5 MILIPOL ASIA PACIFIC / GSA 2017 1 SECUTECH 2017 IBC SMAHOME 2017 9 TRADE CONNECTION 93 WORLDBEX 2017 7 ZHEJIANG DAHUA IFC

96

Security Solutions Today • January / February 2017


The 20th International Security Expo 12 – 14 April 2017 Taipei, Taiwan

Entire Security Ecosystem in Your Hand Elevate security solutions to intelligent vertical solutions Smart Factory Intelligent Transportation Intelligent Retail Intelligent Building Smart Home

Sync with latest tech trends with Live Demo Smart Sensor Intelligent Video Analytics Drone 4K & UHD Awards Software Innovation

Deep Dive into experts’ insights with educational seminars Int’l CompoSec Forum GDSF Asia Asian Systems Integrator Forum Int’l SMAhome Conference

www.secutech.com

Concurrent with Plan Your Visit


22 – 24 January, 2017 Dubai, UAE

The world’s leading trade fair for Security, Safety & Fire Protection 7 Show Sections Commercial Security Information Security Fire & Rescue Safety & Health Homeland Security & Policing Smart Home Perimeter & Physical Security

www.intersecexpo.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.