A&S #I224 AUG.2017

Page 1


CONTENTS

a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

ISSN 1997-6267

VERTICAL SOLUTION

中華郵政北台字第1571號 執照登記為雜誌交寄

John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher

Editorial

General Press as-pr@newera.messefrankfurt.com Jill Lai Editor-in-Chief jill.lai@newera.messefrankfurt.com Alf Chang Senior Consultant alf.chang@newera.messefrankfurt.com Emily Lin Executive Editor emily.lin@newera.messefrankfurt.com William Pao Reporter william.pao@newera.messefrankfurt.com Prasanth Aby Thomas Reporter prasanth.aby@newera.messefrankfurt.com Art Design

Gaven Lee Executive Designer gaven.lee@newera.messefrankfurt.com Mao Chang Senior Designer mao.chang@newera.messefrankfurt.com

Circulation

Michelle Shih Officer michelle.shih@newera.messefrankfurt.com Marketing

Lisa Hsu Sr Media Mktg Coordinator lisa.hsu@newera.messefrankfurt.com Ryan Liu Media Mktg Coordinator ryan.liu@newera.messefrankfurt.com Corporate Management

Thomas Pin Account Manager thomas.pin@newera.messefrankfurt.com Chihung Lee IT Manager chihung.lee@newera.messefrankfurt.com

asmag.com

Jessica Yang Project Manager jessica.yang@newera.messefrankfurt.com

Secutech

P.14 THE GAMING INDUSTRY IS CONSIDERED ONE OF THE PREMIER GROWTH SECTORS FOR SECURITY.

P.30

P.24

INTEGRATED SYSTEM

‘Seeing’ an Alarm With Video Verification The intrusion alarms market has long played an important role in keeping stores and households safe by issuing alarms to monitoring stations or the police after a possible break-in.

Peggy Wu Trade Fair Manager peggy.wu@newera.messefrankfurt.com Veronica Chen Group Manager veronica.chen@newera.messefrankfurt.com Jason Cheng Project Manager jason.cheng@newera.messefrankfurt.com Michelle Chu Event Marketing Manager michelle.chu@newera.messefrankfurt.com

International Advertising [Headquarters]

Israel Gogol Manager israel.gogol@newera.messefrankfurt.com Audrey Fang Officer audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

Carolina Pattuelli Europe (Italy) produzione@ethosmedia.it Evris Consolos Europe (U.K.) evris@kemainternational.com Adis Hodzic Southeast Europe marketing@asadria.com Manish Gandhi India manish@abcindia.biz Iris Lai Taiwan iris.lai@newera.messefrankfurt.com Carol Guan China carol.guan@newera.messefrankfurt.com Y. C. Suh Korea ycsuh517@naver.com Takashi Komori Japan komori@asj-corp.jp Nguyen Thu Ha Vietnam project1@vietfair.vn Ekaterina Shapovalova Russia shapovalovey@ru-bezh.ru Mariusz Kucharski Poland mariusz.kucharski@aspolska.pl

Messe Frankfurt New Era Business Media Ltd.

INDUSTRY REPORT

AUGUST 2017 ● www.asmag.com

Security in the Age of IoT Today, more and more connected devices are online under the IoT framework. While this brings automation and convenience, it has also introduced new risks particularly in the area of security.

Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard, Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.newera.tw.messefrankfurt.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Intelligent System, and a&s Taiwan (above published in Chinese). a&s Adria, a&s India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2017 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

2


EDITOR’S NOTE New Survey Shows Millennials Worry About Physical Safety A recent survey commissioned by ADT studied how Millennials viewed their personal safety. Surprisingly, from this survey, we can see that 76 percent of millennials may choose to opt out of activities due to the lack of personal security. According to this survey, “Millennials love to use their devices to stay connected to friends, but they also see them as essential to their personal protection ... 90 percent say technology like smartphones and smartwatches provide peace of mind when they are alone. Millennials know their smartphones are not enough to protect them under certain circumstances, with 75 percent interested in purchasing a personal security device ... While millennials crave experiences, balancing a sense of adventure with safety can be an ongoing challenge ... 74 percent of millennials have been worried about their physical safety at some point in the past 12 months.” Technology plays an important part to make millennials feel safe when they are alone. As such, ADT provided a panic response app that can be installed in Samsung smartphones to keep people safe. In this sense, “Security as a Service” will become a crucial element, especially to the newer generations. “Video surveillance as a service” or “access control as a service” has become buzzwords in security, this survey further proves that it can provide an extra layer of protection for people. EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

EDITORIAL TEAM

AUGUST 2017 ● www.asmag.com

REPORTER WILLIAM PAO

EXECUTIVE EDITOR EMILY LIN

REPORTER PRASANTH ABY THOMAS

In the intruder alarm industry, there is a growing trend towards video verification which offers many benefits: the user gets greater peace of mind, while police will prioritize a video-verified alarm and respond to it faster. Dealers, meanwhile, can upsell by adding video to traditional alarms. Sensing this trend, vendors are offering related products and solutions to meet user demands.

Security can be, at times, an ongoing struggle between opposites. Clients want the premises to stay open but are unwilling to compromise on security; systems need to be visible but also nondescript. It is only with open communication with clients and knowledge of the latest technologies that systems integrators can tackle these hard decisions and come up with the best solution.

The casino and gaming industry continues to grow as more and more countries realize the potential revenue from this sector and ease regulation. This is good for the security industry as casinos need to protect its people and infrastructure. But what is more interesting is that casino operators are now trying out new technologies to improve their business.

6

KEEP IN TOUCH WITH...

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal


PRODUCTS OF THE MONTH Veridos

Mobile Driver’s License Solution

Accessing With Mobile Devices Editor’s Note: Nowadays, almost every individual has a smartphone they use for talking, texting, searching the web and a variety of other functions. One function that many are adopting is the use of smart devices to act as a key for secure areas. There will not be a need for a physical key or even a smart card as the phone will become the primary device for access. Companies are offering many ways for the smartphone to be used as an access device. Smartphones can be so much more than simple access devices as it can also store valuable information. An example is storing a user’s identification which can be beneficial to quickly verify the individual’s identity or use the device as a single log-in portal for secure access to various services. Mobile devices present virtually endless possibilities for streamlining access control.

HID Mobile Access

With HID Mobile Access, employees can now use their smartphone, tablet or wearable to access doors, gates, networks and more. This new option for access control greatly improves user convenience in today’s mobilefirst world, as well as makes your organization look more modern and professional. The solution can be deployed as best suits the user’s needs. Implement it as a pure mobile solution or integrate it into an existing card-based access control system. Open doors and gates with a short-range tap or from a distance using Twist and Go activation, depending upon the desired application or end-user experience. The solution also supports the widest variety of mobile devices in the industry today, so users can define the mobile experience that is right for the organization. █ KEY FEATURES:

AUGUST 2017 ● www.asmag.com

•Highly intuitive “Tap” and “Twist and Go” gestures eliminate the need for an access card •Administrators can create, manage, issue and revoke credentials overthe-air individually or in batches using HID Global’s online Secure Identity Services portal •HID Mobile Access uses a cloud-based Trusted Service Manager, Seos credential technology, the Secure Identity Object data model and best practices in data integrity to bind each mobile ID to the device and protect the data at rest and in motion Supplier: HID Global URL: www.hidglobal.com

8

The mobile driver’s license can help improve verification of the driver’s credentials very fast and with a 100% degree of certainty. This will give police officers more time to concentrate on procedure and self-protection. Veridos’ solution also benefits the private sector, as digital driver’s licenses can be used on mobile devices to open bank accounts or access age-restricted services. Mobile driver's licenses could speed up a service provider’s internal processes, save time and money, and prevent other problems that accompany weaker means of identification. █ KEY FEATURES:

•Smart combination of mobile devices and communication channel security •Interoperable across population’s smartphone base/BYOD (bring your own device) •On/offline verification capable •Compliant with international driver’s license standard ISO 18013 •Mobile driver’s license holder has control over information released Supplier: Veridos URL: www.veridos.com

Jumio Netverify

Netverify combines ID verification, identity verification and document verification for a complete solution to establish the real-world identity of consumers. Leveraging advanced technology including biometric facial recognition and machine learning, Jumio helps businesses meet regulatory compliance including KYC and AML, reduce fraud, and provide a safe and secure customer experience. █ KEY FEATURES:

•Scans and verifies IDs and other credentials •Confirms the identity of your customers by matching the photo and the person’s actual face •Facial recognition ensures the person is physically who they say they are and have possession of the documentation to prove it. •Saves time and costs associated with KYC/AML requirements Supplier: Jumio URL: www.jumio.com


STid Mobile ID

A secure and user-friendly identification solution, which moves access cards onto Android and iOS smartphones alongside or instead of traditional RFID cards. It includes a free mobile app, latest generation multi-technology Architect Blue readers, and online and offline configuration tools. The virtual credential contributes to the Security Policy acceptance and adhesion in businesses, industries and governments. The STid Mobile ID solution is so ergonomic that identification becomes instinctive for users. The user can now open a door by placing his or her hand close to the access control reader. This action initializes the communication with the smartphone which will grant the access, even if the device is in standby mode or on a phone call. █ KEY FEATURES:

•Five identification methods for a unique user experience •First Level Security Certification (CSPN) delivered by ANSSI (French Network and Information Security Agency) •It uses public algorithms that comply with government requirements and standards (AES-128 / SHA-256) to encrypt and authenticate data in the application using a unique key for each user •Ensures the data authenticity and privacy all along the information chain for a secure exchange •Able to add additional security levels enforcing the smartphone unlocking and/or supplement using two factor Architect Blue reader modules Supplier: STid URL: www.stid.com

Gemalto Mobile ID

Mobile ID enables to revolutionize online activities for billions of people. Using a secure and convenient mobile phone-based second factor authentication, and consent-based digital identity management; consumers can now enjoy an easy and trusted digital journey. Mobile Connect is an initiative from the GSMA that aims to provide a universal login service for everybody worldwide. This new digital authentication standard enables interoperability and ubiquity, to ease the global deployment of federated identity. Available in Software-as-a-Service mode, Mobile ID provides scalable identity management and authentication services for MNOs to easily become a universal digital identity provider and set up all Mobile Connect services. █ KEY FEATURES:

•Identity Federation enabling Single Sign On service •Easy on-boarding portal services •End user permission-based information sharing service •Simple mobile login to access web services with one click experience (level of assurance 2) •Secured authentication and transaction with the use of a unique secret code (level of assurance 3) •Qualified digital signatures with the use of advanced digital certificate and public key signature services (level of assurance 4) Supplier: Gemalto URL: www.gemalto.com

ASSA ABLOY

VingCard Essence Electronic Lock VingCard Essence revolutionizes the electronic lock industry by housing all lock components, including the reader and mobile access board, inside the door and therefore, reaching the maximum minimalistic expression, the true essence of an electronic lock. VingCard Essence is always delivered as Mobile Access ready. With Mobile Access board included inside the reader, your property is ready for using the mobile phone as guest room key whenever required. █ KEY FEATURES:

•Solid stainless steel or brass handles with self-lubricating long life bearings •Mobile Access board included in reader •RF online capability (wireless) •RFID reader with improved reading distance •Futureproof re-programmable FLASH lock memory Supplier: ASSA ABLOY Hospitality URL: www.assaabloyhospitality.com

Kaba

Mobile Access Solutions Kaba Mobile Access Solutions offers a state-of-the-art technology to securely issue, revoke and update digital credentials on mobile devices such as smartphones, tablets and smartwatches. Using best-in-class Legic Connect cloud technology, these credentials can be used across Kaba’s line of RFID and BLE access control products to access hotel rooms, residential units, university accommodations and other protected facilities such as laboratories, server rooms, remote utilities and commercial buildings. █ KEY FEATURES:

•Hosted by Legic Connect •Compatible with Near Field Technology (NFC) and Bluetooth Low Energy (BLE) mobile devices (Android, iOS and Blackberry) •Provides real-time access on demand using over-the-air provisioning •Security system uses full 256-bit bidirectional encryption and key storage, which is one of the most secure in the world •No software to install, maintain or manage; system operates as a service to Kaba customers •Works with and without the use of secure elements (embedded, UICC and SD card) Supplier: dormakaba URL: www.kaba.com

9



Bring On the Self-Driving Cars, Smart Parking is Ready! Cities of the future will be smart, or that’s what governments across the world would like us to believe. Efficient parking management, or smart parking, is an integral part of optimizing the transportation system of a city. BY Prasanth Aby Thomas

S “Kairos templates are up to 97 percent smaller than other providers on the market.” biometrics are among the factors that are expected to drive demand for face recognition solutions. “Improving public safety is a major motivator in organizations adopting innovative, automated and scalable ways to protect and reassure citizens as they move around the world and interact with their touch point — be it airports, public spaces or the workplace,” Chapman said. “Computer vision is a huge area of investment in the modern enterprise — the market opportunity is positioned to reach US$48.6 billion by 2022.”

mart parking is an important aspect of smart cities and this becomes all-the-more important as the industry is rapidly moving toward autonomous cars. Several companies are experimenting in this vertical and one of them is the New York-based CloudParc. CloudParc is a patented smart city platform that relies on a unique machine vision system, enabled by machine learning and enhanced by artificial intelligence. Its application is a fully automated plate by plate parking system deployed using commercial off-the-shelf IP video cameras and cloud computing. Speaking to asmag.com, Mike Critelli, CEO of the company elaborated on their solution. “Currently, there are many great evolutionary parking solutions and we still have meters and meter readers and consumers working hard to make a payment and then to avoid tickets while municipalities struggle and fight for parking revenues,” Critelli said. “With CloudParc, the consumer can park quickly and go, paying for exactly what they use to the minute. The municipality collects what it deserves. Convenience and cash, total win-win.” “Beyond the company’s patents, the platform has been developed to enable highly reliable vehicle, pedestrian and bicyclists tracking for parking and traffic management use cases,” Critelli said. “The ability to track a vehicle continuously across multiple cameras and processors and to communicate information in real time to any number of recipients is a highly valuable capability that will continue to be enhanced the longer the platform is deployed. While there are many machine vision and machine learning platforms developed for ground-level object recognition and management, CloudParc is the only platform to provide a broader above-the-street visioning and intelligence capability. The ability to extract data and perform automatic management and enforcement functions is unique and, because of our patent portfolio and our proprietary machine learning software, likely to remain unique and sustainable.”

CITY SURVEILLANCE

HIKVISION THERMAL CAMERAS TO IMPROVE SAFETY IN DENMARK Hikvision Digital Technology and Milestone Systems are supporting a project to improve safety and security along the waterfront in Aalborg, Denmark. They teamed up with many local entities like the Aalborg Municipality and Aalborg University, to find a solution that utilizes Hikvision thermal cameras. The system works with a combination of thermal cameras and one controllable camera for use in active searches. Aalborg University is mapping risk areas and developing a program that can “recognize” accidents and raise an alarm. When someone exhibits dangerous behavior along the waterfront, the emergency services will be notified. A camera on Limfjordsbroen will be activated at the same time, acting as an aid if a rescue operation is required. Emergency services will be notified if needed and live footage can be streamed to their control center. Now, with the test phase a success, Aalborg is almost ready to go live with the system. The municipality is also planning an expansion with more cameras.

11


VERTICAL SOLUTION

BY Prasanth Aby Thomas

The gaming industry is considered one of the premier growth sectors for security. Casinos have unique surveillance needs and stringent requirements, necessitating systems that can monitor not only property and people, but the gaming operation too. Casino operators are now looking toward new technology and even artificial intelligence as means to enhance overall security, as well as provide intelligence for business optimization.

AUGUST 2017 â—? www.asmag.com

Olive Chuang, Senior Director, Ganlot

14

Douglas Florence Sr., Business Development Director, Gaming VPL NA, Avigilon

Miki Manjal, Global Vertical Manager, Casinos and Gaming, Pelco by Schneider Electric

Dan Reese, Director, Vertical Market Applications, Video Systems, Bosch Security Systems


T

he casino industry has seen steady growth over the recent years as more and more countries across the globe become increasingly open to the idea of gambling and the revenue made from it. Once limited mostly to countries like the U.S. with destinations like Las Vegas, casinos are now popular in Asia too with places like Macau growing rapidly. According to Research and Markets, the global casino gaming market is expected to grow at a CAGR of 10.2 percent between 2017 and 2021. One of the main factors for this strong growth can be increasingly attributed to taxes and GDP as the casino industry contributes significantly to a country’s economic development. In the U.S. alone, it accounts for 0.5 percent of the GDP.

Casinos pay 25 percent of their revenues as tax, while an average American pays 10 percent. Apart from this, the industry is also attractive for the number of job opportunities it creates, as casinos often need a lot of people. A large casino in the U.S. will need at least 8,000 to 10,000 employees working throughout the year. A market trend that researchers have identified is the shift in consumer gambling habits. Besides traditional gaming locations, the increase in the popularity of gambling apps and social gambling are now propelling growth in this vertical. While this is indeed a threat to the land-based casinos, the latter is embracing technology to keep its audience interested. This includes the use of artificial

15


INDUSTRY REPORT

Security IoT

Today, more and more connected devices are online under the IoT framework. While this brings automation and convenience, it has also introduced new risks particularly in the area of security. This column explores how industry experts and vendors address the security issues facing IoT devices. BY William Pao

Mars Kao, Senior Engineer, Institute for Information Industry

AUGUST 2017 ● www.asmag.com

Adrian Sanabria, Director, Research, Savage Security

24

T

he Internet of Things (IoT) has definitely become a dominant part of our lives. According to Gartner, 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. While these devices have helped made homes, offices, buildings and even cities smarter, more and more people are asking: Are they secure? Some recent examples illustrate why people have become wary of the security of network-connected devices. The rampancy of baby cams and monitors being hacked caused the New York Department of Consumer Affairs to issue an alert in January 2016. Verizon’s latest Data Breach Digest reported that at a certain college campus, connected vending

machines and streetlamps were used as bots to slow down the university’s network. Finally, in October last year, IoT devices including network cameras and NVRs infected with the Mirai malware were also used to launch DDoS attacks against Dyn, an internet performance management company. The result was a shutdown of service across various websites including Netflix and Amazon.com. According to the experts we spoke to, the security of devices found in the market varies. “Today’s IoT devices range from very insecure to very secure, which I don’t find surprising in an unregulated market,” said Adrian Sanabria, Director of Research at Savage Security. “There will always be businesses that, given the choice, will skip the added expense of making a product safe or secure.”


Some Best Practices for IoT Security: An Alliance’s Perspective With cybersecurity for networked devices becoming more important than ever, the Reston, Virginia-based Online Trust Alliance (OTA) has published its latest version of “The IoT Trust Framework,” a set of guidelines to help vendors design devices that are secure and more effective at countering cyberattacks.

“These updates incorporate key learnings from field testing, the evolving threat landscape and feedback from industry leaders and related efforts. Core to addressing the inherent security risks and privacy issues is the application of the principles to the entire device solution. These include the device or sensor, the supporting applications, and the backend/cloud services,” the paper said. “Serving as a risk assessment guide for developers, purchasers and retailers, the Framework is the foundation for future IoT certification programs. It is the goal of OTA to post and highlight devices which meet these standards to help consumers, as well as the public and private sectors, make informed purchasing decisions.” The guide is divided into four categories — security principles, user access and credentials, privacy, disclosures and transparency, and notifications and related best practices — with must-dos and recommendations for each category. Here are some of the main points that the OTA listed in each category.

Security Principles • All personally identifiable data in transit and in storage must be encrypted using current, generally accepted security standards. • All IoT support web sites must fully encrypt the user session, from the device to the backend services. • Establish coordinated vulnerability disclosure, including processes and systems, to receive, track and promptly respond to external vulnerabilities reports from third parties including but not limited to customers, consumers, academia and the research community. • Must have a mechanism for automated safe and secure methods to provide software and/or firmware updates, patches and revisions. Access and Credentials • Include strong authentication by default, including providing unique, systemgenerated or single using passwords, or alternatively using secure certificate credentials. • Provide generally accepted recovery mechanisms for IoT application(s) and support passwords and/or mechanisms for credential re-set using multifactor verification and authentication (email and phone, etc.) where no user password exists. • Take steps to protect against “brute force” and/or other abusive login attempts by locking or disabling user and device support account(s) after a reasonable number of invalid log in attempts. Privacy, Disclosures and Transparency • Ensure privacy, security and support policies are easily discoverable, clear and readily available for review prior to purchase, activation, download or enrollment. • Conspicuously disclose what personally identifiable and sensitive data types and attributes are collected and how they are used. • Disclose the data retention policy and duration of personally identifiable information stored. • Only share consumers’ personal data with third parties with consumers’ affirmative consent, unless required. Among other best practices listed by OTA are adoptions of authentication protocols for end-user communications, including but not limited to email and SMS, to help prevent spear phishing and spoofing; and enacting a breach and cyber response and consumer notification plan to be reevaluated, tested and updated at least annually.

25


INTEGRATED SYSTEM

‘Seeing’ an Alarm With Video Verification The intrusion alarms market has long played an important role in keeping stores and households safe by issuing alarms to monitoring stations or police after a possible break-in. But inevitably, alarm systems can create false alarms, which cause problems for multiple stakeholders amid budget and manpower constraints. Adding a video component to alarms as a verification method, therefore, has become a trend in the alarms industry. BY William Pao

AUGUST 2017 ● www.asmag.com

30

F

alse alarms are both annoying and costly, and the high false alarm rates in different markets across the globe are making things worse as police spend taxpayers’ money to dispatch officers to alarms triggered by users forgetting their passcodes or sensors detecting moving pets. “Today around 85 percent


Valeri Filianov, International Sales Director, Pyronix

Eran Kovalsky, Product Manager, Wireless and Hybrid Panels, Building Technologies and Solutions, Johnson Controls

of all alarms detected and reported by intrusion systems are false alarms. The vast majority of these false alarms are not caused by a malfunction of a detection device, but by the user,” said Ross Wilks, Product Marketing Manager at Vanderbilt Industries. Just to put things into perspective, according to The Daily Courier, a Prescott, Arizona-based newspaper, the local police department responded to 772 burglar alarms in 2016, and only six were classified as criminal offenses; the remaining 766, or 99.2 percent, were false. Also according to the paper, each time an officer responds to an alarm, it costs the town US$58.12, translating into a total of $44,520 in taxpayers’ money to dispatch officers to false alarms in 2016. Demands to verify alarms to reduce waste, lower cost and improve operational efficiency, therefore, have been rising. “The operational costs involved in attending unverified alarms by monitoring stations or police are enormous. Due to ever-increasing competition, monitoring stations are making all possible efforts to reduce operational costs, hence adding alarm verification capabilities to the alarm monitoring centers,” said Avi Krainer, VP for Product Marketing at RISCO Group. “In countries like Spain, alarm verification became mandatory by regulation, aimed at reducing police response costs.” Alarm verification by way of video, whereby the activation of an alarm is

Avi Krainer, VP, Product Marketing, RISCO Group

accompanied by a video clip from the scene, has therefore become a trend, if not a requirement, in the industry. “There is a new market segment now that video will enhance the verification and reduce false alarms,” Wilks said. “Reducing these figures is becoming critical to the future acceptance and performance of intrusion systems.” “We see that regulations in some countries require it. Video verification for alarms reduces dramatically the events in which a guard or the police are alerted, due to false alarms. It also reduces the operational costs of security services and improves their efficiency,” said Eran Kovalsky, Product Manager for Wireless and Hybrid Panels for Building Technologies and Solutions at Johnson Controls. “Traditionally this concept has been driven by central monitoring stations (CMS) and has been adopted in the residential market where single-direction wireless systems were installed. Video verification has become required because

of the wireless systems adopted did not have a way of confirming alarms in a reliable manner. For example, when there is an alarm in the single-direction wireless detectors, they activate once and then enter the battery-saving mode. This will not give enough information to the CMS to confirm the alarm,” said Valeri Filianov, International Sales Director at Pyronix. “Of course, the CMS had the option to install a separate analog video surveillance system, but the cost of such would have been too high for the purpose of the installation. From here, the wireless PIR-CAM concept was adopted, whereby after an alarm a low-resolution image is sent to the CMS to confirm the alarm.” And benefits of video verified alarms are manifold. According to Sonitrol, a security service provider, a traditional alarm response time of 21 minutes in Boston was shortened to just 7 minutes, 38 seconds when a video alarm was in place, a difference of 13 minutes, 22 seconds. In another report by the Partnership for Priority Verified Alarm Response, verified alarms have resulted in documented arrest rates of over 10 percent, compared to 0.08 percent for traditional alarms.

Video Verification Trend Drives Solutions Increasingly, users, monitoring stations and law enforcement agencies are asking for video verification when an alarm goes off, so they can determine whether an alarm is real or false. As a result, more and more solutions providers are offering their

"Video verification reduces dramatically the events in which a guard or the police are alerted, due to false alarms. It also reduces the operational costs of security services." 31


SMART TECHNOLOGY

Adoption of facial recognition technology has become widespread, with it now built into consumer products such as cameras, computers and smartphones. When it comes to physical access control solutions (PACS), the addition of facial recognition technology adds an extra layer of security, making it far more difficult to gain access for those that shouldn’t. BY Eifeh Strom, Freelancer

Facial Recognition Helps Airports Tackle Access Control Head On

T

AUGUST 2017 ● www.asmag.com

he days of physical access control solutions (PACS) simply consisting of key cards and personal identification numbers (PINs) are long gone. Nowadays, to better secure access to restricted areas, incorporating biometrics such as facial recognition into a PACS is allowing airports to not only increase security, but also efficiency. The overall facial recognition market is estimated to grow from US$3.4 billion in 2016 to $6.8 billion by 2021, at a CAGR of 15.3 percent from 2016 to 2021, according to a report by MarketsandMarkets. The major forces driving the market are the growing surveillance market, increasing government deployment and increasing applications in numerous industry sectors. The number of attacks on airports worldwide has made increasing security measures a priority for many governments.

34

By deploying facial recognition technology in airport PACS, security operators are better able to secure and restrict access to high-security areas, while also making it easier to identify “unwanted” persons.

Main Uses for Facial Recognition in Airport PACS The need to strengthen airport security against unauthorized access is just one reason to deploy facial recognition technology. According to Alexander Khanin, Founder and CEO of Russia-based VisionLabs, the main use cases for face recognition in PACS at airport terminals are as follows: • Identification and real-time tracking of all passengers and personnel entering airport terminals. This includes terrorist and “wanted” list person identification; blacklists of an airport, airline or any other organizations;

Self-boarding aircraft gates have now been deployed in several major UK airports to help ensure accuracy of passenger identification and improve operational efficiency. Image source: Aurora


Alexander Khanin, Founder and CEO, VisionLabs

Elke Oberg, Marketing Manager, Cognitec Systems

and verification of passengers using face and photo ID data; • Passenger quantity control in airport terminal zones; • Passenger database clusterization (frequent flyers data analysis service for the airline companies); • Automated and semi-automated passenger check-in; • Unauthorized access prevention to the security check zone during flight check-in; • Unauthorized access prevention to the passport control zone; • Automated or semi-automated border control based on e-gate with face recognition as one of the

identification subsystems; • Identification and tracking of all passengers and personnel in the airport safety zone; • Gate access control and automated people counting. Airports are also using real-time facial recognition technology for surveillance applications. “The technology compares faces seen by the camera to one or multiple image databases and instantly finds known individuals,” said Elke Oberg, Marketing Manager of Cognitec Systems. “Airports can detect and prevent unwanted behavior in much faster and more efficient ways, as security agents can track individuals in real time, or receive alerts on mobile

devices to act within the immediate vicinity of a suspect. Based on the anonymous analysis of faces seen by the camera, security staff can also receive an alarm if too many people gather in a specific area, measure waiting times to direct traffic or detect if a person does not pass through a high-security area within a required time frame,” she added.

Facial Recognition as Part of Multifactor Authentication Facial recognition in a PACS works best when it is used in combination with other layers of security. “Airports are using face recognition as

Roger Rodriguez, Director, Business Development, Vigilant Solutions

Gary James, Head of Sales and Marketing, Aurora

35


IoT - RETAIL

Analytics Companies Compete to Provide Retailers With Robust Solutions With the entry of e-commerce giants like Amazon into the physical store market, smaller retailers have to make most of the resources available. This means that retail analytic solutions will see strong demand in the coming days.

to a&s , Michael Brand, CEO of the company, explained that retail analytics is not just about established store brands trying to boost their business, but also about new entrants to the market who are keen to take advantage of advanced technologies. “In-store analytics is the most powerful metric that allows a brick-and-mortar retailer to maximize their growth, full

BY Prasanth Aby Thomas

T AUGUST 2017 â—? www.asmag.com

he retail analytics market is expected to grow from US$2.2 billion in 2015 to 5.1 billion by 2020 at an estimated CAGR of 18.9 percent during the period, according to MarketsandMarkets. The brickand-mortar retail industry has been forced to go through significant changes in the recent years mostly due to rising competition from e-commerce and advancements in technology. As store owners try to improve the shopping experience and push their bottom lines, more and more are turning to analytics as the answer. Several companies have come up with various kinds of solutions in this field. One of them is the California-based Dor Technologies. Speaking

40

Smart Retail Shop

10 mins ago

You’re a regular shopper (11 purchases) You can avail of our VIP promo code and get 25% off on dresses!


stop. Plenty of legacy retailers have worked to deploy new technology effectively to bridge the gap between their physical and online stores, and we enjoy supporting them as they evolve,” Brand said. “However, though there’s a lot of negative talk in the industry about retail ‘dying’ or being ‘under attack,’ that’s not our view. At Dor, what we’re seeing is a groundswell of newer retailers who are keyed into providing a truly unique and personal experience for their customers. These retailers aren’t in need of a revolution —

they’re leading it. The so-called retail revolution is only what it’s always been: serving customers excellently. Having store traffic data just helps a brick-and-mortar retailer save money while they do that.” Analytics, in essence, is all about information. Of course, historically, information was power in the retail industry. The more you knew about your customer, the more you could generate growth. But according to Lea El Hage, Product Marketing Manager at SwiftIQ, in today’s hyperconnected world and with

Today’s retailers are leveraging in-store analytics to enrich their customers’ retail experience as a way to compete with the big conglomerates like Walmart and Amazon.

the rise of e-commerce pure-players, information has become a necessity. Those who are not able to identify purchase patterns and offer a compelling shopping experience to their customers have been thrown out into a survival mode: it’s the survival of the fittest. “Analytics is transforming the way businesses operate and are helping companies unlock their data’s full potential to shift from a product-centric approach to a customercentric one,” El Hage said. “The golden ticket in this new retail landscape is connecting data to insights and insights to decisions. Analytics is changing the retail game by providing visibility across all engagement channels to better understand customer buying patterns and behaviors.”

This is becoming all the more important as companies like Amazon begin to enter the physical store industry. With their recent purchase of Whole Foods, the e-commerce giant will be looking to use its expertise in online analytics in the brick-and-mortar store sphere. Smaller retailers now have to compete not just with the likes of Walmart, but also Amazon that’s powerful enough to combine the strengths of online and offline retail.

What do Retail Analytic Solutions Offer? Although at the core of retail analytics is the power of data, several companies in the market offer varied products to customers for different purposes. The New York-based

"As store owners try to improve the shopping experience and push their bottom lines, more and more are turning to analytics as the answer. " 41


IoT - TRANSPORTATION

Unclogging Urban Streets With Intelligent Transportation Systems No one likes being stuck in traffic; however, with more and more people moving into cities, urban streets are getting increasingly congested. By deploying intelligent transportation systems (ITS), city streets can better manage traffic flow and reduce driver frustration. BY Eifeh Strom, Freelancer

W

AUGUST 2017 â—? www.asmag.com

ith urbanization on the rise globally, urban streets are becoming increasingly congested, causing stress and frustration among drivers. By deploying an intelligent transportation system (ITS) drivers could reduce their time on the road, not only making daily commutes less of a hassle but also decongesting streets and reducing the negative environmental impact. Based on the 2016 INRIX Global Traffic Scorecard, traffic congestion is getting worse every year, with it costing US drivers nearly US$300 billion in 2016, an average of $1,400 per driver. Topping the global list of urban cities with the worst

46

traffic congestion was Los Angeles, California, where the average driver spent 104 hours stuck in traffic jams during peak congestion hours in 2016. “This contributed to congestion costing drivers in Los Angeles $2,408 each

and the city as a whole $9.6 billion from direct and indirect costs. Direct costs relate to the value of fuel and time wasted, and indirect costs refer to freight and business fees from company vehicles idling in traffic, which are passed on to households through higher prices,� stated the report. As a result of increased traffic congestion in urban areas, the demand for ITS is significantly on the rise. In fact, the global ITS market is forecast to grow at a CAGR of 7.9 percent during the period 2017 to 2022, according to a report by BIS


Research. The report also noted that growing demand has also led to the need for more sophisticated infrastructure and advanced systems to manage traffic and space scarcity.

Challenges of Combating Congestion There are several challenges when addressing urban traffic congestion. “Some of them — data collection and processing — can be solved by HERE. Others — resources allocation, prioritization and implemen-

tation — lie in the hands of the public authorities. HERE supports them in the first and last steps of the process,” said Alexandra Teachout, Product Marketing Manager at HERE Technologies. Among some of the more restrictive challenges is cost. “Traditional traffic detection such as inductive loops are expensive to maintain. When vehicles stop and go at an intersection, the wear and tear of the road surface causes loops to break and malfunction starting as soon as only several years after installation,” said

"In order for ITS to be effective in improving traffic flow and congestion, it is important to first understand what is happening on the streets." Michael Deruytter, Director of Innovation at FLIR Intelligent Transportation Systems. “Above ground detection is a more economical alternative and is easier to install. A sensor is installed on existing infrastructure and covers multiple lanes from a single point of view. FLIR’s detection sensors are built to

withstand harsh environmental conditions and have a high mean time between failures (MTBF) resulting in lower maintenance costs.” FLIR has developed a broadband-over-powerline communication technology (BPL), which could help reduce installation costs for cabling of sensors. “Installing a FLIR

Population growth, economic growth and increased urbanization are all major contributors to traffic congestion. The 2016 INRIX Global Traffic Scorecard ranked the top 10 most congested cities of 2016 in the world and just how much time drivers wasted sitting in traffic. Rank

Global City

Country

Continent

2016 Peak Hours Spent in Congestion

Percentage of Total Drive Time in Congestion (peak and non-peak hours)

104

12.7%

1

Los Angeles

U.S.

North America

2

Moscow

Russia

Europe

91

25.2%

3

New York

U.S.

North America

89

12.8%

4

San Francisco U.S.

North America

83

12.8%

5

Bogota

Colombia South America

80

31.8%

6

Sao Paulo

Brazil

South America

77

20.8%

7

London

U.K.

Europe

73

12.7%

8

Atlanta

U.S.

North America

71

10.0%

9

Paris

France

Europe

65

11.4%

10

Miami

U.S.

North America

65

8.7%

Source: 2016 INRIX Global Traffic Scorecard

47


SMART AUTOMATION

Smart Energy Management in the Light of IoT

All over the world, organizations and homeowners alike are looking for ways to save on costs by reducing energy and water consumption, and managing them via more efficient ways. The emergence of the Internet of Things (IoT) is significantly impacting the way this process can be controlled and automated.

E

BY William Pao

AUGUST 2017 â—? www.asmag.com

nergy prices have risen steadily over the years. Amid this, businesses and homeowners are looking for solutions that can help them cut skyrocketing monthly electricity and water bills. Smart energy management solutions, enabled with the Internet of Things (IoT) and the data that connected devices generate, can help in this regard. With energy whole prices at a high, suppliers are under pressure to increase their prices as well. This has resulted in a proportionate rise in electricity and water bills that businesses and homeowners are faced with. To put things into perspective, electricity prices for consumers between the second half of 2014 and the second half of 2015 increased by 26.8 percent in Latvia, 15.1 percent in Belgium and 8.4 percent in the United Kingdom, according to the European Commission. How to manage energy consumption, therefore, has become critical for enterprise and home users. Against this backdrop, the IoT and the various devices associated with it have become an effective tool for analyzing

52


Cedric De Jonghe, Manager, Utility Practice, Actility

Arthur Jouannic, Principal Analyst, Delta-ee

and managing energy usage. As such, they are increasingly embraced by enterprise and home users alike. “What I can say is that the residential market is embracing the digitalization of in home devices, such as smart thermostats, smart plugs, smart lighting, all which can now be controlled by voice,” said Arthur Jouannic, Principal Analyst at Delta-ee. “The US market has been the pioneer in developing solutions, at least for the residential market. Now we see these devices invading Europe as well, and we expect Asia and Australia to follow in the coming years. The reason is partly due to speed of innovation and also the need for demand-side response in some states of the U.S., where companies like Nest started to develop solutions.” “Using IoT technology and big data on energy and water management is no doubt the future trend. It’s happening right now,” said Jason Liao, Senior Product Manager at Billion Electric. According to Liao, the difference that IoT makes is the data and insights generated by the devices. “Without IoT, there’s no data to understand the reason of energy waste. We can only see the result and passively look for solutions, which can’t solve the root problems,” he said, adding that thanks to IoT, people now have more data with which to manage energy usage more effectively. “For instance, all companies or enterprises sign contract

"The Internet of Things and the various devices associated with it have become an effective tool for analyzing and managing energy usage." 53




NEW PRODUCTS Hikvision

iDS-9600NXI-I8/16S DeepInMind Series NVR ● False alarm filtering for up to 16 CH behavior detection ● 320/256 Mbps bit rate input/output (up to 32-CH IP camera input) ● Up to 12-MP resolution recording/live view ● H.265+/ H.265/H.264+/H.264 video formats self-adapt ● 8 CH 1080p decoding capability ● HDMI output at up to 4K resolution Hikvision Digital Technology/China Email: overseasbusiness@hikvision.com

Seagate

Enterprise Performance 10K HDD ● Delivers up to 2.4 TB of high-performance data access for writeintensive applications ● Futureproof the storage infrastructure with a single advanced format interface model ● Latest 12 Gb/s SAS interface for improved scalability ● Seagate Secure features for preventing unauthorized access to data and for compliance with data security standards ● Protection Information (PI) protects against data corruption Seagate Technology/U.S. Email: apj.sales.enquiry@seagate.com

Raytec

VAR2-IPPOE-hy8-1 Long Range Hybrid Network Illuminator ● Dedicated IP lighting for network cameras ● Combined infrared & white-light illumination ● Distances up to 290 m (951 ft) IR & 144 m (472 ft) WL ● Lighting that responds to any event ● Hot-spot reduction technology (HRT) ● VARIO interchangeable lens system Raytec/U.K. Email: sales@rayteccctv.com

EverFocus

2 MP, 30x Optical Zoom, IR Network Speed Dome ● Smart IR function, ranges of up to 150 m/490 ft ● WDR/3DNR/3D PTZ function from super slow [0.1°/sec] to [200°/sec] pan/tilt speed ● 255 preset positions and programmable auto pan/4 tours/4 patterns ● Micro SD/ SDHC card (up to class 10) (64G max.) ● 2 alarm inputs and 1 alarm output ● Easy install and weather proof IP66-rated EverFocus Electronics/Taiwan Email: sales@everfocus.com.tw

Antrica

Portable H.265 & H.264 1080P60 HDMI Encoder (ANT-2210) ● HDMI input 1920 x 1080 at P60 or 60 Hz (PC input) ● Internal lithium cell battery for 3 hours use ● H.265 and H.264 encoding up to 12 MB/s 2 streams max ● RTSP RTMP HTTP and MPEG-TS streaming ● AAC and MP3 audio encoding ● SDK API available Antrica/U.K. Email: sales@antrica.com

Digital Barriers SmartVis Face

● Processes streams of video in real-time to find faces ● Ability to detect, track and recognize faces from a list of known individuals in dynamic and uncontrolled environments ● Generates alerts when it detects a match from live streams and forensic footages ● Machine learning insures continuous improvement as more data are gathered ● Users can upload photos or videos to the system to find matches and send information to the user’s mobile device Digital Barriers/U.K. Email: info@digitalbarriers.com

IndigoVision

GX420 HD Pan/Tilt Minidome Camera ● Video standards include 720p and 1080p ● Captures images in high-contrast light conditions with WDR ● Stream at a rate of 30 fps at maximum resolution ● Draws power from a single Ethernet cable with PoE ● Distributed network architecture does not rely on a central server and provides resilience and redundancy ● IK08 rating IndigoVision/U.K. Email: IR@indigovision.com

AUGUST 2017 ● www.asmag.com

Merit LILIN

32 CH 4K 2U 19” Rackmount Standalone Network Video Recorder NVR5832 ● 32 channel H.264 network camera input ● Up to 4K H.264 network camera supported with HDMI 2.0 ( 4K 60P ) & VGA 1080p output ● Up to 1080p 120 fps network camera supported ● Up to 8 TB HDD supported ● External e-SATA storage supported ● Network input through up to 300 Mbps Merit LILIN/Taiwan Email: sales@meritlilin.com.tw

62


Pongee

Hundure

● With 1,000 card capacity to be added, deleted and cleared all by master card programming ● Adjustable releasing timer by rotation variable resistor (VR) ● No PC or other terminal is needed for parameters programming (optional: PC programming version) ● Supports 125 KHz ASK/FSK, 13.56 MHz ● Waterproof for flush mounting Pongee Industries/Taiwan Email: pongee@pongee.com.tw

● Supports to connect maximum of 4 output expansion panels to control up to 64 floors ● Control panel and reader separate design, maximum connects 2 RS-485/RS-485 L Type or Wiegand readers ● Provides 256 time zones and 128 time schedules ● Provides 100 holiday schedules per year ● Real-time clock (RTC) and watchdog function ensures accurate date/time and system free from halting ● Provides RS-232/RS-485 communication interface to PC Hundure Technology/Taiwan Email: overseas@hundure.com

Mini Flush-Mount Standalone Access Controller

HDE-100WS Elevator Control Panel

Dahua

6 MP WDR IR Bullet Network Camera ● 1/2.9” 6 MP progressive scan STARVIS CMOS ● H.265 and H.264 dual-stream encoding ● 20 fps at 6 M (3072 × 2048), 25/30 fps at 4 M (2688 × 1520) ● Day/night (ICR), 3DNR, AWB, AGC, BLC ● 2.7 mm - 13.5 mm motorized lens ● Max. IR LEDs length 50 m Dahua Technology/China Email: overseas@dahutech.com

asmag.com

PRODUCT FOCUS

Klacci

iF Series Facial Recognition Smart Lock ● Use the smartphone as digital key and biometric recognition device ● Online cloud server allows the user to manage the premises anywhere at anytime ● Passcode input and facial recognition dual verification for additional security ● Passcode input can be replaced by fingerprint for smartphones with such feature ● Smartphone can serve as a connection hub between lock and cloud server Klacci/Taiwan Email: sd@iteklock.com.tw

ADVERTISER INDEX

To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact as-pr@newera.messefrankfurt.com

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

INSIDE FRONT COVER, 1

DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

27

DALLMEIER ELECTRONIC GMBH & CO.KG

SURVEILLANCE

GERMANY

info@dallmeier.com

49

FUJIAN FRAN OPTICS CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

7

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

29

NEXTCHIP CO., LTD.

CHIP

KOREA

sales@nextchip.com

INSIDE BACK COVER

TAMRON CO., LTD.

CAMERA

JAPAN

newbiz@tamron.co.jp

3

TECHPOINT INC.

CHIPSET

USA

dma@techpointinc.com

PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

53

EVVA SICHERHEITSTECHNOLOGIE GMBH

CARD, CARD READER, LOCK

AUSTRIA

office-wien@evva.com

43

GIGA-TMS INC.

ACCESS CONTROL

TAIWAN

promag@gigatms.com.tw

37

UWC ELECTRIC (M) SDN. BHD.

ACCESS CONTROL

MALAYSIA

sales@uwcelectric.com

ACCESS CONTROL

INTRUSION ALARM PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

5

LINCE ITALIA S.P.A.

INTRUSION ALARM

ITALY

info@lince.net

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

63


Show Calendar

Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

WORLD SECURITY EXHIBITION DIRECTORY SEPTEMBER IFA

• Date: 2017/09/01—09/06 • Venue: Berlin ExpoCenter City Exhibition Ground, Berlin, Germany • Tel: +49-30-3069-6924 • Email: ifa@messe-berlin.de • URL: www.ifa-berlin.de/en/

SHANGHAI INTELLIGENT BUILDING TECHNOLOGY

ADRIA SECURITY SUMMIT

• Date: 2017/09/13—09/15 • Venue: Convention Center, Sibenik, Croatia • Tel: +387-33-788-985 • Email: summit@asadria.com • URL: ww.adriasecruitysummit.com

ISAF ISTANBUL

• Date: 2017/09/14—09/17 • Venue: Istanbul Expo Center (iFM), Istanbul, Turkey • Tel: +90-212-503-32-32 • Email: marmara@marmarafuar.com.tr • URL: www.isaffuari.com/en/

• Date: 2017/09/05—09/07 • Venue: Shanghai New International Expo Centre (SNIEC), Shanghai, China • Tel: +852-2238-9917 • Email: building@china.messefrankfurt. com SMART SUMMIT LONDON • URL: www.building.messefrankfurt.com.cn • Date: 2017/09/19—09/20 • Venue: Business Design Centre, London, U.K. CEDIA • Tel: +44-330-3353900 • Date: 2017/09/05—09/09 • Venue: San Diego Convention Center, • Email: hello@nexusmediacom.com • URL: www.iotsmartsummitlondon.com San Diego, U.S. • Tel: +1-800-669-5329 • Email: info@cedia.org ASIS • Date: 2017/09/25—09/28 • URL: expo.cedia.net • Venue: Kay Bailey Hutchison Convention Center, Dallas, U.S. IFSEC SOUTHEAST ASIA • Date: 2017/09/06—09/08 • Tel: +1-703-519-6200 • Venue: Kuala Lumpur Convention • Email: asis@asisonline.org Centre, Kuala Lumpur, Malaysia • URL: securityexpo.org • Tel: +6-03-2176-8788 • Email: tj.tan@ubm.com • URL: www.ifsec.events/sea

OCTOBER

EUROPEAN UTILITY WEEK

• Date: 2017/10/03—10/05 • Venue: RAI Amsterdam, Amsterdam, The Netherlands • Tel: +31-346-590-901 • Email: service@european-utility-week.com • URL: www.european-utility-week.com

NOVEMBER SICUREZZA

• Date: 2017/11/15—11/17 • Venue: fieramilano, Rho, Milano, Italy • Tel: +39-02-4997-1 • Email: fieramilano@fieramilano.it • URL: www.sicurezza.it/en

SECUTECH THAILAND

• Date: 2017/11/16—11/18 • Venue: Bangkok International Trade and Exhibition Center (BITEC), Bangkok, Thailand • Tel: +886-2-8729-1015 • Email: Jason.Cheng@newera. messefrankfurt.com • URL: secutechthailand. tw.messefrankfurt.com

• Tel: +44-1170-980-9023 • Email: enquiries@iottechexpo.com • URL: www.iottechexpo.com/ northamerica

DECEMBER MEFSEC

• Date: 2017/12/03—12/05 • Venue: Cairo International Convention Centre, Cairo, Egypt • Tel: +971-4-407-2583 • Email: info@mefsec.com • URL: www.mefsec.com

JANUARY CES

• Date: 2018/01/09—01/12 • Venue: Las Vegas Convention Center, Las Vegas, U.S. • Tel: +1-866-233-7968 • Email: CESreg@CTA.tech • URL: www.ces.tech

INTERSEC

• Date: 2018/01/21—01/23 • Venue: Dubai International Convention and Exhibition Centre, Dubai, U.A.E. • Tel: +971-4-389-4500 • Email: andreas.rex@uae. IoT TECH EXPO • Date: 2017/11/29—11/30 messefrankfurt.com • Venue: Santa Clara Convention Center, • URL: www.IntersecExpo.com Santa Clara, U.S.

Companies in This Issue PRODUCTS OF THE MONTH

VERTICAL SOLUTION

• ASSA ABLOY Hospitality • dormakaba • Gemalto • HID Global • Jumio • STiD • Veridos

• Avigilon • Bosch Security Systems • CymbIoT • Ganlot • Kount • Pelco by Schneider Electric • Traka • VizExplorer

INTEGRATED SYSTEM • Honeywell Home and Building Technologies • MivaTek • Pyronix • RISCO Group • Sonitrol • Johnson Controls • Vanderbilt Industries

SMART AUTOMATION • Actility • Billion Electric • Delta-ee • Schneider Electric

SMART TECHNOLOGY • Aurora • Cognitec Systems

• Vigilant Solutions • VisionLabs

IoT - TRANSPORTATION • FLIR ITS • HERE Technologies • KiwiSecurity

• Online Trust Alliance • Panasonic • Savage Security

IoT - RETAIL • Dor Technologies • Leantegra • SwiftIQ

INDUSTRY REPORT • Institute for Information Industry

Next Issue

Vertical Solution | Oil and Gas Integrated Systems | Access Control as a Service Smart Technology | Thermal Beyond Security Industrial IoT | Industry 4.0 59


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.