A&S #A139 AUG.2017

Page 1


CONTENTS MARKET DYNAMICS

Thailand Security Market: Steady as She Goes

a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄

John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher

Editorial

General Press as-pr@newera.messefrankfurt.com Jill Lai Editor-in-Chief jill.lai@newera.messefrankfurt.com Alf Chang Senior Consultant alf.chang@newera.messefrankfurt.com Emily Lin Executive Editor emily.lin@newera.messefrankfurt.com William Pao Reporter william.pao@newera.messefrankfurt.com Prasanth Aby Thomas Reporter prasanth.aby@newera.messefrankfurt.com Art Design

Gaven Lee Executive Designer gaven.lee@newera.messefrankfurt.com Mao Chang Senior Designer mao.chang@newera.messefrankfurt.com

Circulation

Michelle Shih Officer michelle.shih@newera.messefrankfurt.com Marketing

Lisa Hsu Sr. Media Mktg Coordinator lisa.hsu@newera.messefrankfurt.com Ryan Liu Media Mktg Coordinator ryan.liu@newera.messefrankfurt.com

Corporate Management

Thomas Pin Account Manager thomas.pin@newera.messefrankfurt.com Chihung Lee IT Manager chihung.lee@newera.messefrankfurt.com

asmag.com

P.16

Jessica Yang Project Manager jessica.yang@newera.messefrankfurt.com

Secutech

Thailand’s economic outlook is definitely not as positive as some of its neighboring countries in Southeast Asia. But its security market remains steady with strong potential for growth.

Peggy Wu Trade Fair Manager peggy.wu@newera.messefrankfurt.com Veronica Chen Group Manager veronica.chen@newera.messefrankfurt.com Jason Cheng Project Manager jason.cheng@newera.messefrankfurt.com Michelle Chu Event Marketing Manager michelle.chu@newera.messefrankfurt.com

International Advertising [Headquarters]

Israel Gogol Manager israel.gogol@newera.messefrankfurt.com Audrey Fang Officer audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

SMART TECHNOLOGY

essing

Facial Recognition Helps Airports Tackle Access Control Head On

and

ospitals

P. 22 VERTICAL SOLUTION August 2017 ● www.asmag.com

Addressing Security and Management in Hospitals

Adoption of facial recognition technology has become widespread, with it now built into consumer products such as cameras, computers and smartphones.

Security in hospitals is a complex thing. Patient safety is indeed paramount; however, this is tempered by the need for systems that are discreet enough to put them at ease.

30 Creating Safe Environments in Nursing Homes 4

Carolina Pattuelli Europe (Italy) produzione@ethosmedia.it Evris Consolos Europe (U.K.) evris@kemainternational.com Adis Hodzic Southeast Europe marketing@asadria.com Manish Gandhi India manish@abcindia.biz Iris Lai Taiwan iris.lai@newera.messefrankfurt.com Carol Guan China carol.guan@newera.messefrankfurt.com Y. C. Suh Korea ycsuh517@naver.com Takashi Komori Japan komori@asj-corp.jp Nguyen Thu Ha Vietnam project1@vietfair.vn Ekaterina Shapovalova Russia shapovalovey@ru-bezh.ru Mariusz Kucharski Poland mariusz.kucharski@aspolska.pl

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.newera.tw.messefrankfurt.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Intelligent System, and a&s Taiwan (above published in Chinese). a&s Adria, a&s India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2017 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

P. 46

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices


EDITOR’S NOTE Asia Has Highest Growth Rate in Biometrics India’s Supreme Court recently ruled that citizens should have the fundamental right to privacy, an act that is described as “historic” for this country. The reason behind this ruling is that the Indian government has been collecting fingerprints and iris scans from its citizens for social welfare, bank accounts and other citizen services, for the past eight years. The so-called Aadhaar project in India is now the world’s largest biometric scheme. One HSBC report also pointed out “the people in Asia and the Middle East are ahead of the West when it comes to the adoption of biometrics techniques.” China (40 percent) is the highest adopter of fingerprint technology, followed by India (31 percent), and then the U.A.E. (25 percent), according to its survey which covered 11 countries — Canada, China, France, Germany, Hong Kong, India, Mexico, Singapore, the U.A.E., U.K. and the U.S. The high adoption of biometrics is usually due to the national ID programs rolling out in countries like India, China and the U.A.E. Another reason is that people in these countries show higher trust and interest in computers for advice on subjects such as money management, which drives higher adoption of biometrics. Other countries in Asia will definitely follow their footsteps for biometrics adoption in the near future. However, when we widely adopt it as an identity management solution for various purposes, privacy issues will become another major concern for all these societies. EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

EDITORIAL TEAM

August 2017 ● www.asmag.com

REPORTER WILLIAM PAO

EXECUTIVE EDITOR EMILY LIN

REPORTER PRASANTH ABY THOMAS

More and more, people are talking about IIoT, using connected devices and the data they generate to help factories achieve further automation. ICP DAS, featured in this month’s cover story, provides various IIoT solutions. Read about how the company has transformed from a components manufacturer to a leading IIoT solutions and service provider.

As AI continues to evolve, concepts like “symbiotic autonomy” are coming into prominence. Highlighting the importance of human-AI interaction, it involves the creation of autonomous systems/robots that can identify their limitations and seek out human help. This collaboration can bring together the best of both worlds and holds huge potential if realized in industries such as security.

The Thailand security market is growing steadily although not as fast as some of its neighbors. There are plans for several large-scale initiatives like development of smart cities and public infrastructure, but the pace at which they are implemented is a cause of concern for the industry. In this issue, we take a closer look at the situation in the country.

6

KEEP IN TOUCH WITH...

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal


PRODUCTS OF THE MONTH Veridos

Mobile Driver’s License Solution

Accessing With Mobile Devices Editor’s Note: Nowadays, almost every individual has a smartphone they use for talking, texting, searching the web and a variety of other functions. One function that many are adopting is the use of smart devices to act as a key for secure areas. There will not be a need for a physical key or even a smart card as the phone will become the primary device for access. Companies are offering many ways for the smartphone to be used as an access device. Smartphones can be so much more than simple access devices as it can also store valuable information. An example is storing a user’s identification which can be beneficial to quickly verify the individual’s identity or use the device as a single log-in portal for secure access to various services. Mobile devices present virtually endless possibilities for streamlining access control.

HID Mobile Access

With HID Mobile Access, employees can now use their smartphone, tablet or wearable to access doors, gates, networks and more. This new option for access control greatly improves user convenience in today’s mobilefirst world, as well as makes your organization look more modern and professional. The solution can be deployed as best suits the user’s needs. Implement it as a pure mobile solution or integrate it into an existing card-based access control system. Open doors and gates with a short-range tap or from a distance using Twist and Go activation, depending upon the desired application or end-user experience. The solution also supports the widest variety of mobile devices in the industry today, so users can define the mobile experience that is right for the organization. █ KEY FEATURES:

August 2017 ● www.asmag.com

•Highly intuitive “Tap” and “Twist and Go” gestures eliminate the need for an access card •Administrators can create, manage, issue and revoke credentials overthe-air individually or in batches using HID Global’s online Secure Identity Services portal •HID Mobile Access uses a cloud-based Trusted Service Manager, Seos credential technology, the Secure Identity Object data model and best practices in data integrity to bind each mobile ID to the device and protect the data at rest and in motion Supplier: HID Global URL: www.hidglobal.com

8

The mobile driver’s license can help improve verification of the driver’s credentials very fast and with a 100% degree of certainty. This will give police officers more time to concentrate on procedure and self-protection. Veridos’ solution also benefits the private sector, as digital driver’s licenses can be used on mobile devices to open bank accounts or access age-restricted services. Mobile driver's licenses could speed up a service provider’s internal processes, save time and money, and prevent other problems that accompany weaker means of identification. █ KEY FEATURES:

•Smart combination of mobile devices and communication channel security •Interoperable across population’s smartphone base/BYOD (bring your own device) •On/offline verification capable •Compliant with international driver’s license standard ISO 18013 •Mobile driver’s license holder has control over information released Supplier: Veridos URL: www.veridos.com

Jumio Netverify

Netverify combines ID verification, identity verification and document verification for a complete solution to establish the real-world identity of consumers. Leveraging advanced technology including biometric facial recognition and machine learning, Jumio helps businesses meet regulatory compliance including KYC and AML, reduce fraud, and provide a safe and secure customer experience. █ KEY FEATURES:

•Scans and verifies IDs and other credentials •Confirms the identity of your customers by matching the photo and the person’s actual face •Facial recognition ensures the person is physically who they say they are and have possession of the documentation to prove it. •Saves time and costs associated with KYC/AML requirements Supplier: Jumio URL: www.jumio.com


STid Mobile ID

A secure and user-friendly identification solution, which moves access cards onto Android and iOS smartphones alongside or instead of traditional RFID cards. It includes a free mobile app, latest generation multi-technology Architect Blue readers, and online and offline configuration tools. The virtual credential contributes to the Security Policy acceptance and adhesion in businesses, industries and governments. The STid Mobile ID solution is so ergonomic that identification becomes instinctive for users. The user can now open a door by placing his or her hand close to the access control reader. This action initializes the communication with the smartphone which will grant the access, even if the device is in standby mode or on a phone call. █ KEY FEATURES:

•Five identification methods for a unique user experience •First Level Security Certification (CSPN) delivered by ANSSI (French Network and Information Security Agency) •It uses public algorithms that comply with government requirements and standards (AES-128 / SHA-256) to encrypt and authenticate data in the application using a unique key for each user •Ensures the data authenticity and privacy all along the information chain for a secure exchange •Able to add additional security levels enforcing the smartphone unlocking and/or supplement using two factor Architect Blue reader modules Supplier: STid URL: www.stid.com

Gemalto Mobile ID

Mobile ID enables to revolutionize online activities for billions of people. Using a secure and convenient mobile phone-based second factor authentication, and consent-based digital identity management; consumers can now enjoy an easy and trusted digital journey. Mobile Connect is an initiative from the GSMA that aims to provide a universal login service for everybody worldwide. This new digital authentication standard enables interoperability and ubiquity, to ease the global deployment of federated identity. Available in Software-as-a-Service mode, Mobile ID provides scalable identity management and authentication services for MNOs to easily become a universal digital identity provider and set up all Mobile Connect services. █ KEY FEATURES:

•Identity Federation enabling Single Sign On service •Easy on-boarding portal services •End user permission-based information sharing service •Simple mobile login to access web services with one click experience (level of assurance 2) •Secured authentication and transaction with the use of a unique secret code (level of assurance 3) •Qualified digital signatures with the use of advanced digital certificate and public key signature services (level of assurance 4) Supplier: Gemalto URL: www.gemalto.com

ASSA ABLOY

VingCard Essence Electronic Lock VingCard Essence revolutionizes the electronic lock industry by housing all lock components, including the reader and mobile access board, inside the door and therefore, reaching the maximum minimalistic expression, the true essence of an electronic lock. VingCard Essence is always delivered as Mobile Access ready. With Mobile Access board included inside the reader, your property is ready for using the mobile phone as guest room key whenever required. █ KEY FEATURES:

•Solid stainless steel or brass handles with self-lubricating long life bearings •Mobile Access board included in reader •RF online capability (wireless) •RFID reader with improved reading distance •Futureproof re-programmable FLASH lock memory Supplier: ASSA ABLOY Hospitality URL: www.assaabloyhospitality.com

Kaba

Mobile Access Solutions Kaba Mobile Access Solutions offers a state-of-the-art technology to securely issue, revoke and update digital credentials on mobile devices such as smartphones, tablets and smartwatches. Using best-in-class Legic Connect cloud technology, these credentials can be used across Kaba’s line of RFID and BLE access control products to access hotel rooms, residential units, university accommodations and other protected facilities such as laboratories, server rooms, remote utilities and commercial buildings. █ KEY FEATURES:

•Hosted by Legic Connect •Compatible with Near Field Technology (NFC) and Bluetooth Low Energy (BLE) mobile devices (Android, iOS and Blackberry) •Provides real-time access on demand using over-the-air provisioning •Security system uses full 256-bit bidirectional encryption and key storage, which is one of the most secure in the world •No software to install, maintain or manage; system operates as a service to Kaba customers •Works with and without the use of secure elements (embedded, UICC and SD card) Supplier: dormakaba URL: www.kaba.com

9


ICP DAS Pushes IIoT in Asia Increasingly, the manufacturing sector is moving towards the Industrial Internet of Things (IIoT), also known as Industry 4.0. Factory operators are looking at how connected sensors and devices, combined with the data they generate, can benefit their operations. ICP DAS, a leading player in the IIoT arena, has the solutions in this regard. The company already has projects in Taiwan and is now building a stronger presence in Asian countries, for example Thailand.

DL-303

PMC-5231

BY William Pao

IoT has now become a growing trend as manufacturers leverage the power of the Internet of Things and data to enhance operations. “One major benefit of IIoT is it helps the manufacturer gain competitiveness and lower cost. They also want to use it to maintain the quality of products and ensure the safety of workers,” said Frank Cheng, VP of Sales and Marketing at ICP DAS. “Eventually everyone will move towards IIoT — it’s just a matter of who will adopt it first. Countries like Germany and the U.S. are already doing it, and Asian countries will follow suit.”

Thailand Successful Stories

August 2017 ● www.asmag.com

ICP DAS has emerged as a leading IIoT solutions provider in Taiwan. It already has projects with some of the island’s top high-tech and traditional manufacturers. Now, ICP DAS wants to promote their solution design and service to their clients outside of Taiwan. One of the Asian markets targeted by the company, according to Cheng, is Thailand. “Thailand has a great location in ASEAN, in the center of the region. It’s also got a robust car manufacturing and food industry. Opportunities are bigger for us there,” Cheng said. “We first want to help out Taiwan traditional businesses in Thailand by replicating what we do in Taiwan. Already we’ve begun several projects in their manufacturing facilities.” One of them is a palm oil production facility

10

UA-5231M-3GWA

ICP DAS' power meter concentrator, dew point data logger, and communication server.

whereby monitoring devices are installed on compressor motors to monitor the live operational status. An additional benefit to that is data that can be used to improve management. “In the past, operations relied on labor. If you wrote on the log the machine started at 8 a.m. and stopped at 5 p.m., I had to believe you. However, with IIoT in place, we have data. If the report shows the data that machine No.3 was on when it was supposed to be off, I know there’s an error,” he said. “This can help achieve more accurate management.” Another project entails motor monitoring for a production facility that does gluing operations for vehicles. “The owner of the facility found out, through our solution, that there’s a waste of 5 amperes when the machine goes from warm-up to full throttle,” Cheng said. “The owner is happy with this data because it helps him figure out how to achieve more savings. This is an extra value that our solution provides.” According to Cheng, ICP DAS hopes to keep replicating its success stories to attract even more customers. “Customers are pleased and satisfied with our service. Our Thai partners have even referred us to more people,” he said, adding that the company is now eyeing the Vietnamese market as well.

Solutions and Service ICP DAS is now a leader in the IIoT arena, offering a range of solutions and services built upon its expertise and know-how. For example, ICP DAS works with a major semiconductor manufacturer, which uses ICP DAS solution to gather critical data to improve manufacturing processes. “This IC company forbids employees to carry USB drives or smart devices, and there is no 3G. What they need is accurate and reliable data communication in their unique environment, and we can deliver that for them,” Cheng said, adding that this could not be possible without ICP DAS’ R&D effort. “We have a strong team of nearly 300 staff, and about 40 percent of them work in R&D. Revenue-wise, we devote about 20 to 30 percent to R&D,” Cheng said. Solutions aside, ICP DAS also attaches a substantial importance to service. According to Cheng, it’s natural for new plants and factories to adopt IIoT, but retrofits can be more complex as operators are unlikely to replace their existing equipment with new ones. This is where ICP DAS’ pre sale service comes in. “A


lot of what we do is we help clients upgrade their existing facilities to IIoT. So the service we provide is we go to their sites and study their processes. Then we offer them several options to choose from, based on their needs and objectives — for example, ways to connect their existing machines. Once they choose an option we will then go with it,” he said.

Intelligence on the Edge According to Cheng, one thing that differentiates the company is its focus on edge computing and analysis. The company offers a range of programmable automation controllers (PACs) that do different types of control, monitoring and data acquisition. This is different from the traditional approach of sending data to industrial PCs for further processing and analysis. “Say you walk past a hallway, and the lights turn on … Why would you send all those signals to an IPC? We

We first want to help out Taiwan traditional businesses in Thailand by replicating what we do in Taiwan. Already we’ve begun several projects in their manufacturing facilities.”

believe that edge devices should not only be able to gather data but also have logic and decision-making capabilities. On the other hand, if the customer wants an IPC, we can customize our solution to that need as well.” Aside from IIoT, ICP DAS also has building automation and home automation solutions as well. “As the economy goes up, people want to renovate their homes, and companies are looking for smart meeting rooms and other smart features,” he said. “Right now our solutions are deployed in various Taiwan government agencies whereby lights are automatically triggered by the presence of people. Even the cleaning ladies at those agencies say they are impressed, as they don’t have to turn the lights on one by one.”

Setting an Example Starting as an industrial components manufacturer, ICP DAS has transformed into a major IIoT solutions provider that helps manufacturers gain competitiveness and value. Their expertise and professionalism have won the trust of factory operators in Taiwan and overseas alike. ICP DAS indeed is an example that its peers can learn from.

Frank Cheng, VP, Sales and Marketing, ICP DAS

11


NEWS FEATURE a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.

Delta Offers to Acquire a Stake in VIVOTEK This deal will potentially integrate the technologies of these two companies, thus expanding Delta Electronics’ portfolio in building automation.

D

BY William Pao

elta Electronics, a leader in power and thermal management solutions, announced on August 8 its intention to acquire a stake in IP video manufacturer VIVOTEK, setting the stage for an acquisition that would help broaden Delta’s building automation offerings. On its website, Delta announced its board of directors has approved a proposal for a cash tender offer to acquire approximately 35 to 55 percent of the outstanding common shares of VIVOTEK with an offer price of US$3.24 (NT$98) per share. The offer, which is expected to begin on August 9 and end on September 26, will be completed when final effective tendered shares reach the 35 percent minimum, according to the website. VIVOTEK closed at $2.95 (NT$89) on August 8. The deal came after a period of relative quietness in the security M&A block. The last similar deal was the merger between Johnson Controls and Tyco as the former sought to acquire a security component to strengthen its building management offerings. Building automation and security had been working in silos for years until the Internet of Things took hold. With IoT, building automation systems and security are both becoming more network-centric, allowing easier integration between the two, paving the way to building automation companies to sell complete solutions to different vertical markets. Indeed video can play an important role in different aspects of building automation. Video analytics for example can examine how many people are visiting a building and trigger various environmental adjustments. ALPR, meanwhile, can tell whether a vehicle belongs to a certain building and activates elevator, lights and HVAC accordingly.

APPLICATION CASES

10.6 million August 2017 ● www.asmag.com

10.6 million hospitalizations in Australia (2015-2016). Source: Australian Institute of Health and Welfare

12

"Delta announced its board of directors has approved a proposal for a cash tender offer to acquire approximately 35 to 55 percent of the outstanding common shares of VIVOTEK." “Our M&A strategy is an essential pillar of Delta’s long-term plan to sharpen its competitiveness under a rapidly evolving marketplace. We, therefore, remain committed to enhancing the value-added capabilities of our building automation solutions,” said Delta Chairman Yancey Hai in a statement. VIVOTEK, ranking No. 19 on a&s’ Security 50 in 2016, has a range of IP video surveillance products from cameras, NVRs to analytics software. The company has set its goal to become the “eye of IoT” and is advancing its video surveillance technologies and strengthening its partnership with global channel players to achieve that goal. Perhaps it’s this vision that made Delta determine VIVOTEK is a good fit. “Security and video surveillance are such critical aspects in this field as they go way beyond buildings and

HEALTHCARE

NEDAP SECURES STAFF PARKING AT AUSTRALIAN HOSPITAL The Alfred hospital, situated in Victoria, Australia, has one of the busiest emergency and trauma centers in the country. It required a reliable vehicle access solution for its staff car park. Nedap’s uPASS system was installed by SKIDATA to provide the hospital with automatic vehicle identification. All staff members are granted access automatically, without having to stop their car. This solution ensures a smooth traffic flow, minimizing congestion at the entry and exit gates. A UHF windshield tag that contains a unique identification number is adhered to the windshield of all staff vehicles. uPASS Reach long-range identification readers installed at the two entry lanes and two exit lanes allow consistent reading of up to five meters. Based on ultra high frequency technology, these readers offer the right solution for straightforward access to car parks of hospitals, campuses, gated communities, etc.


Milestone Sees Video Surveillance as Key to Help Business Growth in Singapore The study found that many businesses still use video surveillance only for threat prevention, when in fact verticals such as retail can benefit from intelligent video solutions to improve sales. BY Milestone Systems

M

actually support the creation of smart cities. VIVOTEK has been developing state-of-the-art video surveillance solutions for more than 17 years, including IoT-based smart imaging analytics. Upon completion of this tender offer, we expect to produce substantial synergies by integrating the t e c h n o l o g i e s a n d m a r ke t development platforms of both companies,” Hai said.

ilestone Systems unveiled the findings of video surveillance solutions in Singapore, a research study commissioned by Milestone Systems. The study revealed that while satisfaction of video surveillance continues to remain high, few firms are fully taking advantage of intelligent video solutions, beyond basic functions such as surveillance today. 92 percent of surveyed retail businesses are satisfied with their current video surveillance solutions, with more than 50 percent of businesses recognizing basic benefits of video surveillance for security (96 percent), live recordings (61 percent), and entry and exit logs (53 percent). Despite this, video surveillance is still only seen as a necessary business cost, rather than a tool which can help optimize business processes to drive growth. Just under half of businesses surveyed were unable to assess the true benefits of video surveillance solutions. Organizations, in particular, remain unaware of additional functions such as facial recognition and heat mapping, which can help improve operational efficiency by generating a strategic overview of their processes/or customers. “Video surveillance is still seen as a deterrent to threats, not as a business enabler. With the retail industry facing a productivity crunch and operating in diverse and complex environments, it is important to embrace technology that can help them to leverage the full potential of video beyond surveillance to achieve their long-term business goals”, said Benjamin Low, VP of Asia Pacific for Milestone Systems. “Businesses have valid concerns when it comes to the adoption of video surveillance solutions, and there is a need to educate businesses on the various benefits of video surveillance. As technology continues to develop in the Asia Pacific, video surveillance will play a large part in helping organizations optimize their business processes.”

AIRPORTS

LILIN CREATES SAFER PLACES IN TAIPEI AIRPORTS Located in Taipei City, Taipei Songshan Airport shuttles many people in regularly. CPC is situated at the center of the airport, with the responsibility of supplying enough oil to each aircraft. The operation manager regards the issue of each aircraft being loaded with sufficient oil to ensure smooth flights as high priority. To capture a view of aircrafts landing and taking off the vast airport from the highest point, CPC decided to install cameras suitable for outdoor environments — 50 sets of 20x day and night 30fps Full HD PTZ Dome IP cameras, and day and night 1080p HD vari-focal IR IP cameras which incorporated Sense Up+ to successfully deliver stunning video in low-light conditions. Intelligent image signal processing, AGC control and 3D noise reduction features enable the delivery of ultimate low-light images without motion blur.

13


s the Association of Southeast Asian Nations (ASEAN) reaches its 50th anniversary this year, there is much the region can boast about. Its 10 members include the likes of Vietnam and Philippines that are growing at over 6 percent and it has tremendous investment potential as the region is expected to be the fifth largest economy in the world soon, according to the World Economic Forum. Indeed, economic and social progress, becoming a manufacturing powerhouse and achieving considerable political stability, all have helped the region come this far. But the ride to the top has not been smooth for everyone, and some have not been able to do as well as others. Thailand is an example.

According to the Bank of Thailand, the country is expected to grow 3.5 percent in 2017, which would be its fastest expansion rate in the past five years, but this is still behind neighboring emerging nations. It does have a substantial current-account surplus and Thai bonds have seen significant demand, making the local currency, baht, the best-performing currency of the year in Asia. But the World Bank last year warned that to remain competitive, Thailand has to embark on an extensive reform of the economy to lay down a future for the country, in areas such as infrastructure and advanced manufacturing. Nevertheless, the Thai economy is on track to recovery. Reports suggest that as the

Thailand Security Steady as She Goes August 2017 â—? www.asmag.com

THAILAND’S ECONOMIC OUTLOOK IS DEFINITELY NOT AS POSITIVE AS SOME OF ITS NEIGHBORING COUNTRIES IN SOUTHEAST ASIA. BUT ITS SECURITY MARKET REMAINS STEADY WITH STRONG POTENTIAL FOR GROWTH. BY Prasanth Aby Thomas

16


military rule — that has so far sought to propel the economy — could pave way for elections to take place once again in the country, there are hopes that development efforts will be reinforced to boost growth. Expectations are sky-high on several projects, especially the ones like the initiative to build smart cities that could drive a technological revolution in the country. That brings us to the Thai security market, which has also remained steady in the recent years. According to data obtained by a&s , the local security market is expected to reach 3.5 billion baht (about US$110 million) this year and grow 10 to 12 percent in 2018. Extended vertical application of security technologies in areas like smart cities and urban development,

Market:

smart retail and smart homes are expected to be the major factors supporting growth.

The Ground Reality of Thailand Security Market According to several security systems integrators (SI), the market is indeed steady, although the general sentiment is not quite optimistic. Henny Beeber, CEO of AES Group, said that the security market in Thailand is still growing but it does not seem quite as fast as before. It is expected that the demand will pick up again along with the local economy. Sakchai Somsuk, MD of TSolutions, agreed that the market is growing, mainly because the customers are becoming more and more educated about the need to improve the quality of video by using HD video in both analog and IP solutions. Somsuk added that analog HD has become the most popular video upgrade from coaxial-based installations, as the customers still look for cost-effective and cheap solutions. However, there are also customers for whom the company provides high-quality video network camera solutions coupled with two-way audio, paging system, intercom and panic button. “We have a government regulation to improve the quality of the security systems. Since they have put government tender spec for full HD network camera system, this would leverage the interoperability of all security equipment on a single platform for better situation awareness,” Somsuk said. There are others who aren’t quite so optimistic about the outlook. Wissawat Chotbenjakul, CEO of Fit IT and Solution, said that in his opinion, the Thailand security market is quite down with regard to government projects and foreign investment is quite low. The government tries to distribute the money for local projects but that is followed by stricter regulations. In the private sector, investments are low, although Chotbenjakul acknowledged that most of his foreign customers are Japanese and there is still Chinese cash inflow into the country. Interestingly, Chotbenjakul added that he expects there will be elections soon, which could pave way for more economic reforms. But during the time leading up to the elections, the market will be down. Some attribute the weakness in the market to the lack of awareness among customers on the need for security technology. Nick Wall, Business Development Manager for Greater Bangkok at Securitas, pointed out that a lot of customers still consider manned guards a better and more economically viable option compared to technological solutions. “There are several reasons to this,” Wall said. “Firstly, the cost of manpower is still cheap. Labor-wise, wages in Thailand have increased, especially since the government raised the minimum

17


Vertical Solution

Addressing

Securityand Management in Hospitals

August 2017 â—? www.asmag.com

Security in hospitals is a complex thing. Patient safety is indeed paramount; however, this is tempered by the need for systems that are discreet enough to put them at ease. The evolving healthcare environment is forcing security teams to think beyond mere access control and video surveillance, and incorporate new technology to manage resources and staff. To complicate things further, cybersecurity has become an important issue as well, with hackers targeting not only sensitive patient information but also life-saving medical equipment. The following articles aim to shed some light on these topics and point out key actions healthcare organizations can focus on to enhance their security systems. BY Prasanth Aby Thomas

22

FRAUDULENT ACTS DONE WITH STOLEN DATA FROM HEALTHCARE BREACH: Access/modify health records

Purchase items 37% Fraudulently receive care Source: Accenture

Fraudulently bill for care Fraudulently fill prescriptions


TOP PLACES BREACHES OCCURRED WERE IN:

HOSPITALS 36% URGENT-CARE CLINICS 22% PHARMACIES 22% Source: Accenture

ONE IN TWO CYBERSECURITY BREACHES RESULTED IN MEDICAL IDENTITY THEFT. Source: Accenture

AVERAGE OUT-OF-POCKET COSTS PER INCIDENT: US$ 2,500 Source: Accenture

23


Smart Energy Management in the Light of IoT

All over the world, organizations and homeowners alike are looking for ways to save on costs by reducing energy and water consumption, and managing them via more efficient ways. The emergence of the Internet of Things (IoT) is significantly impacting the way this process can be controlled and automated.

E

BY William Pao

August 2017 â—? www.asmag.com

nergy prices have risen steadily over the years. Amid this, businesses and homeowners are looking for solutions that can help them cut skyrocketing monthly electricity and water bills. Smart energy management solutions, enabled with the Internet of Things (IoT) and the data that connected devices generate, can help in this regard. With energy whole prices at a high, suppliers are under pressure to increase their prices as well. This has resulted in a proportionate rise in electricity and water bills that businesses and homeowners are faced with. To put things into perspective, electricity prices for consumers between the second half of 2014 and the second half of 2015 increased by 26.8 percent in Latvia, 15.1 percent in Belgium and 8.4 percent in the United Kingdom, according to the European Commission. How to manage energy consumption, therefore, has become critical for enterprise and home users. Against this backdrop, the IoT and the various devices associated with it have become an effective tool for analyzing

32


Cedric De Jonghe, Manager, Utility Practice, Actility

Arthur Jouannic, Principal Analyst, Delta-ee

and managing energy usage. As such, they are increasingly embraced by enterprise and home users alike. “What I can say is that the residential market is embracing the digitalization of in home devices, such as smart thermostats, smart plugs, smart lighting, all which can now be controlled by voice,” said Arthur Jouannic, Principal Analyst at Delta-ee. “The US market has been the pioneer in developing solutions, at least for the residential market. Now we see these devices invading Europe as well, and we expect Asia and Australia to follow in the coming years. The reason is partly due to speed of innovation and also the need for demand-side response in some states of the U.S., where companies like Nest started to develop solutions.” “Using IoT technology and big data on energy and water management is no doubt the future trend. It’s happening right now,” said Jason Liao, Senior Product Manager at Billion Electric. According to Liao, the difference that IoT makes is the data and insights generated by the devices. “Without IoT, there’s no data to understand the reason of energy waste. We can only see the result and passively look for solutions, which can’t solve the root problems,” he said, adding that thanks to IoT, people now have more data with which to manage energy usage more effectively. “For instance, all companies or enterprises sign contract

"The Internet of Things and the various devices associated with it have become an effective tool for analyzing and managing energy usage." 33


Drones Boost the Security Industry With Eyes in the Sky With the rapid development and incorporation of technologies like artificial intelligence (AI), deep learning and machine learning, unmanned aerial vehicles (UAV) are becoming increasingly popular in the security industry. BY Prasanth Aby Thomas

A August 2017 â—? www.asmag.com

lthough the Federal Aviation Administration (FAA) in the U.S. has come up with a strict code of conduct for commercial drones, most countries are yet to come to terms with the rapid rise in their popularity. However, this has not stopped the drone industry from making bold strides forward, coming up with innovative technologies and solutions. Companies are eagerly investing money in this sector, experimenting with the

36

hardware and software as well as their applications. Lack of regulations has not stopped users from making full use of these flying machines either. In fact, in several parts of the world, drones are increasingly being used in many industries, solving problems that have hitherto remained tedious, costly or even impossible. From security to agriculture to manufacturing and retail industries are now beginning to take advantage of the benefits that drones bring.

"According to MarketsandMarkets, the global UAV/drones market is expected to increase to US$21 billion by 2022, growing at a CAGR of about 20 percent from 2016." According to a report from the research firm MarketsandMarkets, the

global UAV/drones market is expected to increase to US$21 billion by 2022, growing at


The Increasing Role of AI in Drones

a CAGR of about 20 percent between 2016 and 2022. Among the various industries that are actively making use of drones, security stands out as an important vertical.

Categorizing Drone Operation in Security The security industry has always depended on technology to ensure maximum efficiency, especially in the form of advanced electronics, sensors and video. However, despite several companies coming up with

W

ith the advancements in technology and reducing costs, autonomous drones are becoming increasingly popular in various industries. The fact that you can assign a drone to accomplish a task without having a pilot navigating it has made them attractive to customers who wish to automate their processes, saving labor and Developments in artificial operational costs. intelligence ensure drones However, as the number of self-flying drones increases, fly safer and are more there are also growing concerns on technologies to ensure effective. these machines operate without colliding against each other. In fact, this fear has been one of the major factors hindering the development and market adoption of autonomous drones in general. Fortunately, there are now some innovative companies trying to deal with this issue and offer solutions that would enable drones to navigate through the skies without problems. One of them is the San Francisco-based Iris Automation. According to Alexander Harmsen, CEO of the company, Iris Automation has created a solution that allows the drones to see what is around them. “We’ve built a collision avoidance ‘sense and avoid’ system for industrial drones so that they can see the world the way a pilot can,” Harmsen said. “It’s 3D reconstruction and dynamic tracking of moving objects at long ranges, in order to keep the aircraft safe while they fly in national airspace, potentially beyond-visual-line-of-sight.” The solution is completely based on computer vision, harnessing the recent breakthroughs in embedded computing Developments in AI are equipping drones with software capable of understanding, segmenting and classifying objects in the and cameras to its advantage. The company surrounding. has built proprietary algorithms that Image source: Iris Automation allow their system to operate in outdoor, unstructured environments, onboard in real-time ranges that apparently no other company has ever attempted. Harmsen believes that fitting all this into a tiny module that weighs 300 grams and is actually affordable will be a game-changer for the entire industry. At the core of Iris Automation’s solution is a software that runs on an embedded GPU. The software is capable of understanding, segmenting and classifying objects in the surrounding, as well as being able to completely, geometrically, recreate the environment into an internal world model. “Propagating forward in time allows the system to assess Alexander Harmsen, CEO, Iris whether we will actually collide with anything or not, allowing Automation the system to take an avoidance action,” Harmsen added. “Of course a lot of this is not possible without the underlying deep learning and artificial intelligence onboard.” The arrival of AI has clearly revolutionized the drone industry. Before this year, drones were blindly following GPS waypoints or following the direct instructions from a pilot’s joystick or controller. Iris Automation’s solution, based on AI, allows drones to actually see the world the way a pilot does and make real-time decisions to help the mission or to actively keep the drone safe from any possible collisions.

37


Security IoT

Today, more and more connected devices are online under the IoT framework. While this brings automation and convenience, it has also introduced new risks particularly in the area of security. This column explores how industry experts and vendors address the security issues facing IoT devices. BY William Pao

T August 2017 ● www.asmag.com

he Internet of Things (IoT) has definitely become a dominant part of our lives. According to Gartner, 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. While these devices have helped made homes, offices, buildings and even cities smarter, more and more people are asking: Are they secure? Some recent examples illustrate why people have become wary of the security of network-connected devices. The rampancy of baby cams and monitors being hacked caused the New York Department of Consumer Affairs to issue an alert in January 2016. Verizon’s latest Data Breach Digest reported that at a certain college campus, connected vending

42

machines and streetlamps were used as bots to slow down the university’s network. Finally, in October last year, IoT devices including network cameras and NVRs infected with the Mirai malware were also used to launch DDoS attacks against Dyn, an internet performance management company. The result was a shutdown of service across various websites including Netflix and Amazon.com. According to the experts we spoke to, the security of devices found in the market varies. “Today’s IoT devices range from very insecure to very secure, which I don’t find surprising in an unregulated market,” said Adrian Sanabria, Director of Research at Savage Security. “There will always be businesses that, given the choice, will skip the added expense of making a product safe or secure.”


Some Best Practices for IoT Security: An Alliance’s Perspective

With cybersecurity for networked devices becoming more important than ever, the Reston, Virginia-based Online Trust Alliance (OTA) has published its latest version of “The IoT Trust Framework,” a set of guidelines to help vendors design devices that are secure and more effective at countering cyberattacks. “These updates incorporate key learnings from field testing, the evolving threat landscape and feedback from industry leaders and related efforts. Core to addressing the inherent security risks and privacy issues is the application of the principles to the entire device solution. These include the device or sensor, the supporting applications, and the backend/cloud services,” the paper said. “Serving as a risk assessment guide for developers, purchasers and retailers, the Framework is the foundation for future IoT certification programs. It is the goal of OTA to post and highlight devices which meet these standards to help consumers, as well as the public and private sectors, make informed purchasing decisions.” The guide is divided into four categories — security principles, user access and credentials, privacy, disclosures and transparency, and notifications and related best practices — with must-dos and recommendations for each category. Here are some of the main points that the OTA listed in each category. Security Principles • All personally identifiable data in transit and in storage must be encrypted using current, generally accepted security standards. • All IoT support web sites must fully encrypt the user session, from the device to the backend services. • Establish coordinated vulnerability disclosure, including processes and systems, to receive, track and promptly respond to external vulnerabilities reports from third parties including but not limited to customers, consumers, academia and the research community. • Must have a mechanism for automated safe and secure methods to provide software and/or firmware updates, patches and revisions.

Access and Credentials • Include strong authentication by default, including providing unique, system-generated or single using passwords, or alternatively use secure certificate credentials. • Provide generally accepted recovery mechanisms for IoT application(s) and support passwords and/or mechanisms for credential re-set using multifactor verification and authentication (email and phone, etc.) where no user password exists. • Take steps to protect against “brute force” and/or other abusive login attempts by locking or disabling user and device support account(s) after a reasonable number of invalid log in attempts. Privacy, Disclosures and Transparency • Ensure privacy, security and support policies are easily discoverable, clear and readily available for review prior to purchase, activation, download or enrollment. • Conspicuously disclose what personally identifiable and sensitive data types and attributes are collected and how they are used. • Disclose the data retention policy and duration of personally identifiable information stored. • Only share consumers’ personal data with third parties with consumers’ affirmative consent, unless required. Among other best practices listed by OTA are adoptions of authentication protocols for end-user communications, including but not limited to email and SMS, to help prevent spear phishing and spoofing; and enacting a breach and cyber response and consumer notification plan to be reevaluated, tested and updated at least annually.

43


Adoption of facial recognition technology has become widespread, with it now built into consumer products such as cameras, computers and smartphones. When it comes to physical access control solutions (PACS), the addition of facial recognition technology adds an extra layer of security, making it far more difficult to gain access for those that shouldn’t. BY Eifeh Strom, Freelancer

Facial Recognition Helps Airports Tackle Access Control Head On

T

August 2017 ● www.asmag.com

he days of physical access control solutions (PACS) simply consisting of key cards and personal identification numbers (PINs) are long gone. Nowadays, to better secure access to restricted areas, incorporating biometrics such as facial recognition into a PACS is allowing airports to not only increase security, but also efficiency. The overall facial recognition market is estimated to grow from US$3.4 billion in 2016 to $6.8 billion by 2021, at a CAGR of 15.3 percent from 2016 to 2021, according to a report by MarketsandMarkets. The major forces driving the market are the growing surveillance market, increasing government deployment and increasing applications in numerous industry sectors. The number of attacks on airports worldwide has made increasing security measures a priority for many governments.

46

By deploying facial recognition technology in airport PACS, security operators are better able to secure and restrict access to high-security areas, while also making it easier to identify “unwanted” persons.

Main Uses for Facial Recognition in Airport PACS The need to strengthen airport security against unauthorized access is just one reason to deploy facial recognition technology. According to Alexander Khanin, Founder and CEO of Russia-based VisionLabs, the main use cases for face recognition in PACS at airport terminals are as follows: • Identification and real-time tracking of all passengers and personnel entering airport terminals. This includes terrorist and “wanted” list person identification; blacklists of an airport, airline or any other organizations;

and verification of passengers using face and photo ID data; • Passenger quantity control in airport terminal zones; • Passenger database clusterization (frequent flyers data analysis service for the airline companies); • Automated and semi-automated passenger check-in; • Unauthorized access prevention to the security check zone during flight check-in; • Unauthorized access prevention to the passport control zone; • Automated or semi-automated border control based on e-gate with face recognition as one of the identification subsystems; • Identification and tracking of all passengers and personnel in the airport safety zone;

• Gate access control and automated people counting. Airports are also using real-time facial recognition technology for surveillance applications. “The technology compares faces seen by the camera to one or multiple image databases and instantly finds known individuals,” said Elke Oberg, Marketing Manager of Cognitec Systems. “Airports can detect and prevent unwanted behavior in much faster and more efficient ways, as security agents can track individuals in real time, or receive alerts on mobile devices to act within the immediate vicinity of a suspect. Based on the anonymous analysis of faces seen by the camera, security staff can also receive an alarm if too many people gather in a specific area, measure waiting


Alexander Khanin, Founder and CEO, VisionLabs

Elke Oberg, Marketing Manager, Cognitec Systems

times to direct traffic or detect if a person does not pass through a high-security area within a required time frame,” she added.

Facial Recognition as Part of Multifactor Authentication Facial recognition in a PACS works best when it is used in combination with other layers of security. “Airports are using face recognition as one biometric technology for authorized access to high-security areas, usually in combination with another token or biometric,” Oberg said. “Adding a biometric identifier lowers the risk of an unauthorized person gaining access with a stolen token.” Roger Rodriguez, Director of Business Development at Vigilant Solutions, elaborated

on this point, saying, “When a door or gate entry access is monitored and tracked with the use of biometric technology, it offers an even greater level of security by providing any organization the ability to lock and unlock doors with multifactor authentication.” He pointed out how before the introduction of biometric technologies, many organizations relied on traditional identification cards or employee badges for authorized entry and access. “History has shown these cards present vulnerabilities in security as they can easily be fraudulently replicated, intentionally handed off to others, lost or stolen. However, when these cards are combined with a biometric-like facial recognition technology,

the additional layer of video surveillance access control offers extra protection and eliminates the fraudulent access seen with traditional ID card systems. This added technology makes for a reliable integrated security system,” he said.

Machine and Deep Learning Propel Facial Recognition Technology Machine learning has played a big role in improving the accuracy of many different technologies across various spaces in recent years. When it comes to facial recognition technology, machine learning is playing an equally important role. “Accuracy and speed of facial recognition algorithms are benefiting from deep learning

Roger Rodriguez, Director, Business Development, Vigilant Solutions

Gary James, Head of Sales and Marketing, Aurora

47


Hacking Access Control in Enterprise Environments A strong access control system is a vital part of an enterprise environment. Yet for some reason these systems are often easy to hack. At this year’s ISC West, Valerie Thomas, Executive Security Consultant at Securicon addressed how hackers are accessing physical access control systems (PACS) and what enterprises can do to protect their systems from attack. BY the a&s Editorial Team

hysical access control systems (PACS) are an important part of any enterprise environment’s overall security plan. Controlling who accesses what, where and when helps keep a facility secure, while also controlling flow and keeping track of those on the premises. Unfortunately, enterprises often install systems without having them thoroughly tested before deployment, thus leaving vulnerabilities in the system and, therefore, open to attack. Valerie Thomas, Executive Security Consultant at Securicon addressed the different ways PACS are vulnerable in enterprise environments and what security personnel can do to guard against such attacks.

Overlooking the Cyber Component

August 2017 ● www.asmag.com

Cyberattacks are often overlooked during the planning and execution of a PACS. Such a system relies heavily on IT; however, there is a general lack of understanding of IT in the security industry, according to Thomas. Thomas explained a PACS is usually installed by a third-party contractor whose job is done once the system has been installed; however, there is not necessarily a security step that is involved in the installation. Furthermore, although these systems rely on pieces of cyber and network, there are rarely cybersecurity professionals involved in the design, planning, or deployment of such systems. “What ends up happening is different people are made responsible for maintaining these pieces, but usually somebody doesn’t look at this holistically,” Thomas said.

50

Thomas noted that trying to secure against only one type of attack method does not do the end user any good. By only focusing on getting the latest and greatest credentials and card stock because they have yet to be cloned, enterprises are leaving the rest of its infrastructure open to a lot of vulnerabilities that could actually end up being much worse. But why does this happen? According to Thomas, there is a lack of persons in the industry that understand how the system should encompasses everything together. Without a cyber representative involved in the network set up of a PACS to ensure the proper security measures were put in place, the resulting network ends up with system weaknesses, making it easily accessible to hackers.

Attacking a PACS There are many different ways to attack


a PACS, some more sophisticated than other. Many of these methods in fact are quite simple. This is why security operators must do everything possible to keep their network secure and PACS safeguarded.

the motion detector to open the door. Since the device detects motion from these items, the device will not detect it as a forced entry. One way companies can try to prevent this type of attack is by raising the level of the motion detection beam to make it more difficult to access from the other side.

Getting Access Control Codes Proxmark 3 The Proxmark 3 is advertised as a research tool, used to study RFID and near-field communications (NFC) systems. However, one quick search online will pull up dozens of “how to” methods for using the Proxmark 3 to clone RFID cards. This method does not require in-depth knowledge of hacking or technology. The Proxmark 3 simply needs to come into contact with an access control card. However, in order to use the Proxmark 3 the user must carry with it a power source and antenna. This could look conspicuous and is therefore not the most ideal way to steal card data.

BLEKey The BLEKey is a small device designed to attach to an RFID reader by connecting to the lines carrying Wiegand data — the device only needs to connect to three wires and gets its power from the reader. Once attached, the BLEKey stores card information from successful reads by the reader. By making use of Bluetooth Low Energy (BLE) the device can sync with a phone app and allow the phone to replay the last successful card read. This method of attack highlights the unencrypted nature of the Wiegand protocol used by access control readers. To prevent attackers from attaching a BLEKey, users should install a tamper alarm on the reader, which would alert the user in the event the reader is being tampered with.

Request to Exit (REX) Devices Thomas noted that REX devices are not always very intelligent, therefore, hacking them can be quite easy. Many REX devices use motion detection versus something like an exit button. While this makes exiting more hassle free, it makes tricking these devices just as easy. Items such as coat hangers or balloons can be used to trigger

Securing the network on which a PACS runs is a critical part of securing the overall PACS; however, a lack of IT/cyber knowledge during installation often leaves these networks vulnerable. Thomas pointed out that once a hacker gets into the network of an access control controller they can pretty much find out all the information they need to take control of the PACS. Information such as the area the controller controls, IPs for other controllers and servers, card numbers and access logs, and passwords can all be found on a single controller. Thomas also noted that many controllers allow anonymous FTP, which even as a backup leaves the system open to attack.

The Server Corporate IT usually runs the access control server, which to them is just one of many servers. Thomas noted that in a DNS server the PACS server is often labeled “access control,” making it easy to find within the network. From outside the corporate network, Thomas pointed to Shodan, a search engine that allows people to search for vulnerable servers. Calling it a “dark Google,” Shodan allows users to search for routers, servers, etc., that are connected to the internet. While this website is used mostly by cybersecurity professionals to find vulnerabilities, it is also used by hackers to gain access to unsuspecting networks.

Educate and Protect In the end, these types of PACS attacks are very preventable, according to Thomas. “From the cyber side a lot of it is just configuration. There are easy ways to segment this all through the network and then apply some basic security controls to it at the network level that will really shut down these attacks from a lot of different avenues,” she explained. One thing to note is the need for more user education. More education is imperative to ensure PACS are equipped with the proper security measures. This does not just include security personal within the enterprise environment, but employees and security guards as well. In fact, Thomas noted educating the guard staff and the rest of the physical security team to the unique attacks that are pointed at them is often overlooked. Despite these vulnerabilities, by being aware of the types of attacks a PACS is open to, taking the appropriate steps to securing the system on the network side, and educating users, enterprises have all the tools necessary to protect their systems from future attacks.

"ENTERPRISES OFTEN INSTALL SYSTEMS WITHOUT HAVING THEM THOROUGHLY TESTED BEFORE DEPLOYMENT, THUS LEAVING VULNERABILITIES IN THE SYSTEM AND, THEREFORE, OPEN TO ATTACK."

51


SMAhome

Amazon Leads Smart Home Players by a Narrowing Gap Alexa, without a doubt, is the smart home market’s current bellwether. The question is how long it can keep its leader position. Rivals like Microsoft, Apple and Google are all strong players and own resources needed to drive innovation. While Amazon entered the market a couple of years ahead of its competitors, other tech giants are catching up fast.

August 2017 ● www.asmag.com

52

T

o some, smart home is considered the next frontier of technological innovation. Today the nascent industry is dominated by Apple, Google, Amazon, etc., and each company has its own proposition on how smart devices should be controlled. For Apple, it is using the Home app via iOS devices, while for Amazon, it is using Alexa voice command via its smart speakers. For early adopters of smart home, some believe voice command is the fastest and most intuitive way to control smart devices. A user may switch the light on simply by clapping hands or saying the word “on.” Amazon is the first company to introduce smart speakers. Before Alexa hit the market, there had been little consensus on how home automation should work, or what wireless protocols (Wi-Fi, Zigbee, Z-Wave, etc.) should be adopted. Amazon has also made its API available to third-party developers. This open-arms policy has led to the creation of more than 10,000 skills, which are apps in the world of Amazon Alexa. This is why Alexa is currently enabled in far more applications than other voice assistants are. “Alexa is popular because it’s very user friendly, it can be applied in everyday life, and

people have not used Siri in such ways,” said Shawn Lin, Senior Product Manager at EQL Technology. EQL makes hubs that relay signals from Amazon’s smart speaker Echo to a variety of home appliances. As such, users can turn on the air conditioner, TV and lighting, etc., through voice commands. The company’s solution integrates exclusively with Alexa, and Lin said EQL chose the Alexa platform because “it has existed the longest, is the most mature, and has the broadest applications.” Another strength of Alexa lies in its voice recognition ability. According to Lin, Amazon’s development team has fed Alexa with voices spoken by people with different accents to improve its ability to distinguish spoken words, and improvements are constantly being made.

Richer Experience Brought by the Echo Show Consumers in general gave positive feedback on using Amazon Echo and the smaller speaker Echo Dot. A larger number of the products


has been shipped, and the number is still climbing. Amazon has launched more devices, the Echo Look and the Echo Show, in April and May, respectively. While the original Echo speaker is like a robot with ears, the Echo Look has both ears and eyes, thanks to the added camera. The visual allows it to provide senior care, intrusion detection and distance education, among other services. “The launch of Echo Show signals the important role that Amazon now views of visual presentation. In many cases, the product aims to provide information that otherwise cannot be easily conveyed through sound,” said Brian Sun, Technical Marketing Manger of China at Ayla Networks, an IoT cloud platform provider that offers solutions compatible with Alexa, HomeKit and Google Home. With the Echo Show, numbers can be presented clearly via pie charts or other graphic representation. For instance, changes in temperature and humidity in the house can be shown visually on a graph generated by the Echo Show. It is true that the same can be done on the screen of a smartphone, tablet or smart watch. But using the Echo Show will be so much easier, compared with taking out a mobile phone to open the app and tapping the right button to view the information. With the Echo Show, users can simply voice the command to have the graphs shown on the screen. The introduction of the Echo Show

enriches the user experience, and Ayla Networks views the new product as a positive development for the Alexa ecosystem, Sun concluded.

Shortcomings of Alexa That is not to say Alexa has no demerits. Voice assistants have different ways of interacting with users. For Alexa, it is a straight “one question and one answer” interaction mode, said B.K. Liu, Manager of Product Management & Strategic Partners Division at Jazz Hipster, which manufacturers smart speakers that work with the Amazon Voice Service. At this stage, Alexa will only respond when being asked a question, and the question that users utter has to be framed in certain ways. In a shopping experience, for example, users have to say their intent to buy something, before saying the exact product, and then,they need to tell Alexa the amount. Google Assistant, on the other hand, can engage with users through a more natural conversation. Different from Alexa, orders can be placed with a onesentence command. “Google Home speaker gives users the sense of having a conversation with a real person,” Liu said, adding that Google appears to own more advanced artificial intelligence, thanks to the knowledge accumulated from its powerful search engine. The other drawback of Alexa is the range of supported languages. Although Alexa entered the market earlier, it is lagging behind in terms of the languages it can speak. The absence of a language means the absence of a localized service. Alexa is now available in English and German, with Japanese expected to get onboard later this year. Google, however, announced it will soon support up to six languages. Professional smart home installers may have different views of the Alexa system. Sun Woo Yoon, Marketing Manager of South Korea-based smart home solution

“Alexa is popular because it’s very userfriendly, it can be applied in everyday life, and people have not used Siri in such ways.” Shawn Lin, Senior Product Manager, n EQL Technology

“The launch of Echo Show signals the important role that Amazon now views of visual presentation. In many cases, the product aims to provide information that otherwise cannot be easily conveyed through sound.” Brian Sun, Technical Marketing n Manager, Ayla Networks

53


The 21st International Exhibition and Conference for Commercial Security, Home Security, Mobility, Info Security and Fire Safety.

25-27 April 2018, Taipei, Taiwan

Secutech 2018 will present the latest technologies essential for delivering intelligent solutions to trending vertical markets, including smart retail, smart factory, smart home, intelligent transportation, intelligent healthcare and mobility.

August 2017 â—? www.asmag.com

Enabling Intelligent Surveillance Solutions with IoT, Big Data, AI and Machine Learning

T

he introduction of IoT and big data has enabled surveillance systems to perform logical processing and intelligent

58

video analytics, enhancing the usability of data and reducing response latency. By deploying intelligent surveillance system, not only has the large number

of staff that was once required for monitoring been reduced, the automatic data processing and analysis have also transformed the system from passive


intelligence, deep learning and edge computing technologies have made possbile to turn large amounts of unorganized data into valuable information to help businesses improve operational efficiency. Keeping apace with the current technology trends, Secutech 2018 will highlight four technologies: key components, AI and intelligent video analytics, ICT transmission and LPWAN, and cybersecurity, which are necessary for surveillance systems to collect, store, process, secure and transform the data into actionable insights that are beneficial for different vertical markets such as industrial, retail, transportation, healthcare, etc.

Four Key Technology Trends CompoSec: Key Components

monitoring to proactive reporting of any abnormal events. The improved timeliness and accuracy of data have created great values for different business sectors. Raw images captured by surveillance cameras are considered unstructured data. With surveillance cameras being widely deployed worldwide, the need for advanced technologies and solutions to transfer and process the tremendous amount of unstructured data produced every day cannot be ignored. Thankfully, recent developments in artificial

In the era of IoT and security, staying on top of emerging technologies and selecting the most appropriate components are key to successful product and application development. Designed for manufacturers and integrators to tap into different vertical markets, including intelligent manufacturing, intelligent healthcare, smart home and automotive telematics, CompoSec will showcase the latest chip technologies to introduce the latest product design solutions. • Processors • IoT: VR/AR, DSP/ISP AI, GPU, NPU, MCU • Automotive: V2X, ADAS • Networking and transmissions

AI & Intelligent Video Analytics Software rules the security industry, whether it's in facial recognition, 3D / 4D imaging, gesture analysis or deep learning, offering more solutions in the industrial, agricultural, healthcare and business management sectors. Intelligent video analytics technology will soon become the standard requirement for surveillance systems with the emergence of cloud computing and big data. In light of this situation, the Software Innovation

Zone will be dedicated to sharing innovative technologies and solutions in video analytics, and feature high speed computing, feature selection, spatial segmentation and object identification to turn unstructured data into insightful information. • 2D / 3D image recognition • Facial recognition • License plate recognition • Deep learning and machine vision • Behavior analysis • Hot spot analysis

ICT Transmission & LPWAN Transmission bridges the sensor and application layers in IoT architecture. According to IDC, the global IoT market size is expected to double in the coming years, driving the demand for network communication equipment accordingly. Taking into account the significance of transmission technology, Secutech 2018 will showcase different wireless technologies and equipment for various security and IoT applications for global IT / security distributors, systems integrators, telecom companies and end users, including: • Zigbee, Z-wave, Bluetooth, Wi-Fi, Li-Fi • LoRa, NB-IoT, SigFox • PoE and PLC • 3G / 4G / 5G broadband networks • Enterprise multi-node wireless networks

IoT & Physical Cybersecurity The rise in cyberthreats can be attributed to the growing number of connected devices, raising major security concerns for both manufacturers and users. Therefore, it’s crucial for every connected device to enhance its defense system to reduce vulnerabilities. With that in mind, Secutech 2018 will feature an IoT Cyber Security Pavilion and Forum to provide industry professionals with the latest cybersecurity technology to develop more secured products. • Security requirements for IoT devices • Security requirements for IP-based security systems

59


Show Calendar

Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

WORLD SECURITY EXHIBITION DIRECTORY SEPTEMBER IFA

• Date: 2017/09/01—09/06 • Venue: Berlin ExpoCenter City Exhibition Ground, Berlin, Germany • Tel: +49-30-3069-6924 • Email: ifa@messe-berlin.de • URL: www.ifa-berlin.de/en/

SHANGHAI INTELLIGENT BUILDING TECHNOLOGY

ADRIA SECURITY SUMMIT

• Date: 2017/09/13—09/15 • Venue: Convention Center, Sibenik, Croatia • Tel: +387-33-788-985 • Email: summit@asadria.com • URL: ww.adriasecruitysummit.com

OCTOBER

EUROPEAN UTILITY WEEK

• Date: 2017/10/03—10/05 • Venue: RAI Amsterdam, Amsterdam, The Netherlands • Tel: +31-346-590-901 • Email: service@european-utility-week.com • URL: www.european-utility-week.com

ISAF ISTANBUL

• Date: 2017/09/14—09/17 • Venue: Istanbul Expo Center (iFM), Istanbul, Turkey • Tel: +90-212-503-32-32 • Email: marmara@marmarafuar.com.tr • URL: www.isaffuari.com/en/

• Date: 2017/09/05—09/07 • Venue: Shanghai New International Expo Centre (SNIEC), Shanghai, China • Tel: +852-2238-9917 • Email: building@china.messefrankfurt. com SMART SUMMIT LONDON • URL: www.building.messefrankfurt.com.cn • Date: 2017/09/19—09/20 • Venue: Business Design Centre, London, U.K. CEDIA • Tel: +44-330-3353900 • Date: 2017/09/05—09/09 • Venue: San Diego Convention Center, • Email: hello@nexusmediacom.com • URL: www.iotsmartsummitlondon.com San Diego, U.S. • Tel: +1-800-669-5329 • Email: info@cedia.org ASIS • Date: 2017/09/25—09/28 • URL: expo.cedia.net • Venue: Kay Bailey Hutchison Convention Center, Dallas, U.S. IFSEC SOUTHEAST ASIA • Date: 2017/09/06—09/08 • Tel: +1-703-519-6200 • Venue: Kuala Lumpur Convention • Email: asis@asisonline.org Centre, Kuala Lumpur, Malaysia • URL: securityexpo.org • Tel: +6-03-2176-8788 • Email: tj.tan@ubm.com • URL: www.ifsec.events/sea

NOVEMBER SICUREZZA

• Date: 2017/11/15—11/17 • Venue: fieramilano, Rho, Milano, Italy • Tel: +39-02-4997-1 • Email: fieramilano@fieramilano.it • URL: www.sicurezza.it/en

SECUTECH THAILAND

• Date: 2017/11/16—11/18 • Venue: Bangkok International Trade and Exhibition Center (BITEC), Bangkok, Thailand • Tel: +886-2-8729-1015 • Email: Jason.Cheng@newera. messefrankfurt.com • URL: secutechthailand. tw.messefrankfurt.com

• Tel: +44-1170-980-9023 • Email: enquiries@iottechexpo.com • URL: www.iottechexpo.com/ northamerica

DECEMBER MEFSEC

• Date: 2017/12/03—12/05 • Venue: Cairo International Convention Centre, Cairo, Egypt • Tel: +971-4-407-2583 • Email: info@mefsec.com • URL: www.mefsec.com

JANUARY CES

• Date: 2018/01/09—01/12 • Venue: Las Vegas Convention Center, Las Vegas, U.S. • Tel: +1-866-233-7968 • Email: CESreg@CTA.tech • URL: www.ces.tech

INTERSEC

• Date: 2018/01/21—01/23 • Venue: Dubai International Convention and Exhibition Centre, Dubai, U.A.E. • Tel: +971-4-389-4500 • Email: andreas.rex@uae. IoT TECH EXPO • Date: 2017/11/29—11/30 messefrankfurt.com • Venue: Santa Clara Convention Center, • URL: www.IntersecExpo.com Santa Clara, U.S.

Companies in This Issue COVER STORY

MARKET DYNAMICS

• ICP DAS

• AES Group • Fit IT and Solution • Securitas • Risk Protection Security Solutions • TSolutions

PRODUCTS OF THE MONTH

August 2017 ● www.asmag.com

• ASSA ABLOY Hospitality • dormakaba • Gemalto • HID Global • Jumio • STiD • Veridos

SMART AUTOMATION • Actility • Billion Electric • Delta-ee • Schneider Electric

INTEGRATED SYSTEM • Arctic Robotics • Elistair • Iris Automation • NEC • OTSAW Digital 60

VERTICAL SOLUTION • AMAG Technology • Avery Dennison Retail Branding and Information Solutions • Kaspersky Lab

• Milestone Systems • Vanderbilt Industries • Vizinex RFID

SMART TECHNOLOGY

INDUSTRY REPORT • Institute for Information Industry • Online Trust Alliance • Panasonic • Savage Security

• Aurora • Cognitec Systems • Vigilant Solutions • VisionLabs

Next Issue

Market Dynamics | Australia Vertical Solution | Casino Product Exploration | Intrusion Detection


VIVOTEK

Hundure

● Manually extending the retention time of recorded videos with evidence-lock function ● 2 types of search options: smart search and thumbnail search ● Equipped with failover protection ● Track and display vehicles’ real-time location from GPS receivers and play back videos with recorded paths ● Supports retail markets by showing any transaction on both live and playback video

● Supports to connect maximum of 4 output expansion panels to control up to 64 floors ● Control panel and reader separate design, maximum connects 2 RS-485/RS-485 L Type or Wiegand readers ● Provides 256 time zones and 128 time schedules ● Provides 100 holiday schedules per year ● Real-time clock (RTC) and watchdog function ensures accurate date/ time and system free from halting ● Provides RS-232/RS-485 communication interface to PC Hundure Technology/Taiwan Email: overseas@hundure.com

VAST 2 Video Management Software

VIVOTEK/Taiwan Email: sales@vivotek.com

Dahua

HDE-100WS Elevator Control Panel

6 MP WDR IR Bullet Network Camera ● 1/2.9” 6 MP progressive scan STARVIS CMOS ● H.265 and H.264 dual-stream encoding ● 20 fps at 6 M (3072 × 2048), 25/30 fps at 4 M (2688 × 1520) ● Day/night (ICR), 3DNR, AWB, AGC, BLC ● 2.7 mm - 13.5 mm motorized lens ● Max. IR LEDs length 50 m Dahua Technology/China Email: overseas@dahutech.com

asmag.com

PRODUCT FOCUS

Avigilon

H4 Thermal Camera Line ● Provides exceptional detection and performance with the combination of thermal imaging and Avigilon’s patented self-learning video analytics ● Designed to detect the movement of people and vehicles even in areas with poor visibility, challenging lighting conditions, absolute darkness, and partly camouflaged objects ● Through Avigilon self-learning video analytics, operator receives notifications of detected activity that may require further investigations, helping them take decisive action when needed Avigilon/Asia Pacific Email: asksales@avigilon.com

ADVERTISER INDEX

To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact as-pr@newera.messefrankfurt.com

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

3, 5

DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

INSIDE FRONT COVER

GENETEC

SOFTWARE

CANADA

info@genetec.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

7

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

INSIDE BACK COVER

SEAGATE TECHNOLOGY LLC

STORAGE

SINGAPORE

apj.sales.enquiry@seagate.com

1

WESTERN DIGITAL TAIWAN CO., LTD.

SURVEILLANCE STORAGE

TAIWAN

Jessica.liu@wdc.com

PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

33

EVVA SICHERHEITSTECHNOLOGIE GMBH

CARD, CARD READER, LOCK

AUSTRIA

office-wien@evva.com

FRONTCOVER, 10, 11

ICP DAS CO., LTD.

ACCESS CONTROL, INTERCOM, INDUSTRIAL CONTROL & AUTOMATION

TAIWAN

service@icpdas.com

ACCESS CONTROL

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

63


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.