A&S #A145 MAR.2018

Page 1


March 2018

Contents

16 Driving

Vertical Market

Production Efficiency With

Data

IoT — Hospitality

52 Making Hotels More Hospitable With IoT With IoT, hotel operators can maximize guest experiences and improve efficiency.

Cover Story

14

Milestone to Redefine Video Technology With Intelligence Milestone Systems is set to transform its platform to offer added value and intelligent solutions in and beyond security.

6

Amid fierce competition in the manufacturing sector, plants and factories are striving to increase productivity and keep downtime to a minimum.

Editor’s Note

10 Application Cases 58 SMAhome 61 Companies in This Issue /Show Calendar 62 New Products

WEBSITE ARTICLES https://www.asmag.com TCO, ROI Key in Large Enterprise Video Surveillance A unified data infrastructure for analytics of machine data is a huge boost for productivity, quality enhancement, condition-based monitoring and asset performance management across the value chain.” Vinay Nathan, Co-Founder and CEO, Altizon Systems Driving Production Efficiency With Data, p. 16

2

www.asmag.com

Providing a video surveillance solution that helps lower total cost of ownership and increase return on investment is key to success in the large enterprise sector.

A Smart Home Solution Catering to Both Homeowners, Developers The smart home and connected home concepts are taking hold across the globe as homeowners look for IoT technologies and devices to enhance the home experience.


EDITOR’S NOTE Southeast Asian Countries Team Up for Anti-Terrorism ASEAN countries have recently started discussions and collaborations in different subject matters. One of the topics that ASEAN countries feel the alliance should team up on is counter-terrorism to pave the way for information sharing and cooperation for further actions such as border control and terrorist investigation. Last month, the joint statement released during the ASEAN Defense Ministers’ Meeting (ADMM) retreat in Singapore pointed out that the rise of terrorism is the most serious security threat to this region. The rise in complexity and deadliness of recent terrorist tactics and weapons have become major concerns. The defense ministers then agreed to strengthen counter-terrorism cooperation to prevent attacks and coordinate information to ensure the quick response of these nations to these attacks. The DIPLOMAT reported that early this January, India have looked for the cooperation of other Southeast Asian countries to address and fight Jihadist terrorism domestically. Southeast Asian nations are not excluded from terrorist attacks. The recent ASEAN meeting and new partnership showed that the group of nations will kick off many political and security discussions. We are eager to see how this will facilitate the development of security and safety industry in this region.

KEEP IN TOUCH WITH...

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal

EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

EDITORIAL TEAM

Global Security News Media Platform FOLLOW US:

www.asmag.com

SENIOR REPORTER WILLIAM PAO

EXECUTIVE EDITOR EMILY LIN

The Industrial Internet of Things (IIoT) is all about using connected devices and the data they generate to increase productivity and efficiency, making the production floor smarter than ever. Now, IIoT is seeing increasing deployment in Western countries, for example Germany and the United States. Being the manufacturing powerhouse of the world, Asia can stand to benefit from IIoT as well.

The concept of artificial intelligence and deep intelligence continues to gain more ground in the security industry. As processing power improves, the potential to derive value from collected data is growing by leaps and bounds. It is exciting to see and observe how industries are harnessing this technology in different ways that would best address their unique needs.

6


Products of the Month

Encrypt Data as Cyberthreats Grow

Shure Network Audio Encryption

Modern technology is continuously evolving. All our data is now transmitted through the internet and the need to protect our data is essential as cyberthreats grow. Data encryption is a technology that has gained popularity due to its ability to convert information to a code, which prevents unauthorized access. The technology is especially helpful with the cyber problems we face today, which addresses the privacy concerns and data protection demands from users.

S

hure has considered the unique security needs of our customers and developed technology to safeguard content without compromising audio quality. Shure Network Audio Encryption uses AES-256 crypto technology to protect confidential content. The AES-256 encryption algorithm has been adopted as one of the safest forms of network protection by leading financial institutions, government bodies and healthcare services. Only Shure devices with the correct pass phrase will permit audio to be heard. With Shure Network Audio Encryption enabled, Dante audio is encrypted before being sent over the network. When it is received by another Shure device that supports this feature, it is decrypted and forwarded for IntelliMix processing or analog conversion. Key Features • Safeguards confidential content without compromising audio quality • AES-256 crypto technology • Utilizes a user-configured passphrase on each device • Can be combined with other network security measures to create multilayered security solution • Available with Microflex Advance Ceiling and Table Array microphones, the IntelliMix P300 Audio Conferencing Processor, and selected Audio Network Interfaces

Supplier: Shure URL: www.shure.com

VdoCipher Secure Video Streaming

V

doCipher provides video streaming solutions for businesses to help them stream content on their site or app in a smooth, secure and affordable manner. The key feature is highest security from online video piracy through DRM encryption, licensing and watermarking technologies. It ensures that no downloader or hack is able to download and pirate online content. This helps portals to earn maximum revenues from their premium videos. VdoCipher serves media and e-learning enterprises from 30+ countries with its offerings. Key Features • Encrypted streaming • Watermarking and DRM • Buffer retention • Customizable player • Analytics • Upload from anywhere

Supplier: VdoCipher URL: www.vdocipher.com

Gemalto SafeNet ProtectApp

G

ematlo’s SafeNet ProtectApp provides an interface for key management operations, as well as application-level encryption of sensitive data. Once deployed, data is kept secure across its entire lifecycle, no matter where it is transferred, backed up or copied. Using Safenet ProtectApp APIs, both structured and unstructured data can be secured in multi-vendor application server infrastructures. SafeNet ProtectApp’s application-level encryption can be deployed across on-premises, virtual, cloud and hybrid environments.

Key Features • Apply transparent and efficient encryption to all types of sensitive application-level data across on-premises, virtual, public cloud and hybrid environments • Works with SafeNet KeySecure to provide centralized administration of all keys and policies • Granular access controls to ensure only authorized users or applications can view protected data • Support for Format Preserving Encryption (FPE), including flexible key management interfaces, as well as multiple interfaces to support the full key management lifecycle • Broad standard and interface support, including web services (SOAP and REST) • Built-in, automated key rotation and data re-keying

Supplier: Gemalto URL: www.gemalto.com

8

www.asmag.com


Mobotix Cactus Concept

T

he objective of the Cactus Concept is to implement a multimedia cybersecurity campaign in order to raise awareness among potential and existing Mobotix customers of the importance of data security in network-based video security systems and how organizations can protect themselves through cost-efficient and intelligent solutions. End-to-end encryption with no blind spots is required, from the image source via the data cables and the data storage through to the video management system on the user’s computer. Like a cactus, whose every limb is covered in thorns, all of the modules (camera, storage, cables, VMS) in the Mobotix system have digital thorns that protect them from unauthorized access.

Key Features • Set of built-in tools and features that allows administrators to configure each device as multi-layered approach to cyberattacks • Uses the services of SySS to examine the security of both n and hardware • Provides end-to-end encryption with no blind spots software

Supplier: Mobotix URL: www.mobotix.com

Thales Vormetric Data Security Platform

T

he Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, the data security protection platform features multiple data security products that can be deployed individually or in combination to deliver advanced encryption, tokenization and centralized key management. This data security solution prepares your organization for the next security challenge and new compliance requirement at the lowest TCO.

Symantec Information Centric Encryption

S

ymantec’s information centric encryption protects sensitive data, wherever it is, ensuring access only to authenticated users. The solution prevents data loss by revoking user access with central monitoring and controls. Information Centric Encryption delivers strong, simple protection that follows data wherever you store, use or move it. It protects data with enterprise-strength techniques through the integration with Symantec Data Loss Prevention, Symantec CloudSOC (Cloud Access Security Broker) or Symantec Information Centric Tagging technologies. Using highly accurate data discovery engines, sensitive data is detected on premises, in cloud and mobile locations. Alternatively, users can identify and classify files and emails that contain sensitive data. Key Features • Protects sensitive data in the hands of third parties • Finds and deletes rogue copies • Supports application data and a broad set of file formats to meet the needs of the user’s information ecosystem • Keys can be stored in a customermanaged Amazon Web Services account

Supplier: Symantec URL: www.symantec.com

Key Features • FIPS 140-2 compliant virtual appliance or hardware appliance • Supports environments such as physical server, virtual server, public-private-hybrid cloud, big data, container • Encryption techniques: advanced encryption standard (AES), format preserving encryption (FPE), granular database, transparent file-level, cloud gateway • Data pseudonymization techniques: cryptographic tokenization, random tokenization, dynamic data masking, static data masking, batch transformation

Supplier: Thales Security URL: www.thalessecurity.com

Senetas CM7 Network Encryption Management Senetas CM7 Network Encryption Manager (CypherManager) is Senetas’ innovative encryption management platform. Designed as an element manager, it enables the intuitive management of the full range of Senetas CN network encryptors, across all Layer 2 Ethernet and Fibre Channel network protocols and topologies. Encryption management includes real-time status monitoring, configuration changes and certification. CM7 is a Windows or Linux-based application that loads onto a PC and uses SNMPv3 to configure, manage and monitor your encryptors. Featuring a simple, intuitive user interface, CM7 provides users with the ability to view and configure multiple devices on screen at the same time; making the configuration of endpoints quicker and easier. Key Features • Secure in-band and out-of-band remote management using SNMPv3 • Automatic detection and management of Senetas encryptors • Real-time monitoring and display • Integrated certificate authority • Purpose-built graphical management tool

Supplier: Senetas URL: www.senetas.com

9


News Feature

NEC Facial Recognition System Elevates Customer Experience at OCBC Bank OCBC Bank has successfully used NEC’s facial recognition system to streamline services to its customers in Singapore. BY NEC

N

EC Asia Pacific and NEC announced the successful testing and roll-out of a facial recognition system at OCBC Bank’s Holland Village branch to identify premier banking customers. OCBC Bank is one of the first in Singapore’s banking sector to adopt such a system as part of its digital efforts to improve service excellence. Facial recognition is a growing form of biometrics used to identify and authenticate persons in a wide range of industries. With the widespread usage and acceptance in immigration systems and secured identity card systems, biometrics is now expanding into commercial applications. Implemented since December 4, 2017, the system instantly identifies OCBC premier banking customers in real time as they approach the lounge in the branch without needing to stop to look at the camera. This is a very unobtrusive approach for the bank to identify them. Based on the VIP identification, the system allows the premier service manager to promptly identify and greet customers by their preferred name, offer

them their preferred drinks and magazines, and understand their visit records to promptly deliver services, giving the client a more personalized and pleasant customer journey. The bank can record the purpose of a customer’s visit, gather feedback to help improve services and understand customer behavior patterns, such as the frequency of their visits. The system utilizes NeoFace, NEC’s AI engine for face recognition. The NeoFace engine can be used for a variety of applications and scenarios such as access control and attendance tracking for staff and visitors in different areas, seamless online transaction experience using facial recognition for payment authentication, and monitoring for individuals on watch lists or tracking people who loiter on the premises. “OCBC is committed to our service quality and implementing facial recognition to elevate the customer experience is one of the first steps that we are doing in the digital economy. Since introducing it, we received positive feedback from customers who were impressed by the person-

alized hospitality enabled by fast and accurate identification. Going forward, we will evaluate and consider the extension of the capability beyond customer service,” said Pranav Seth, SVP and Head of E-business, Business Transformation and Fintech and Innovation Group at OCBC Bank. “We are pleased to work with OCBC Bank to provide this cutting-edge facial recognition solution to help improve the overall delivery of services to their valued clientele. We hope that through this co-creation we have helped OCBC Bank stay competitive in this fast-paced industry where customer experience is key. Moving ahead, we look forward to exploring more innovative and meaningful ideas to help customers digitally transform their businesses through artificial intelligence that includes biometrics and facial recognition,” said Lim Kok Quee,

APPLICATION CASES Education HIKVISION EMPOWERS KACHCHH UNIVERSITY WITH CUSTOMIZED SOLUTION Prama Hikvision India’s partner Yashvi Infotech worked with Krantiguru Shyamji Krishna Verma Kachchh University (KSKVU), a state university in Gujarat, India, to deliver a centralized and local building monitoring solution customized to its security and management needs. Approximately 400 Hikvision 2-line and 4-line series cameras were deployed in all the classrooms, corridors, outside of buildings, library, computer rooms, staff rooms, main gate with ANPR solution, play area with PTZ, parking and hostel. 24 X 7 monitoring was enabled in the local building, VC’s cabin as well as the security control room. 16 classrooms were equipped with Hikvision’s broadcasting and sharing solution with live data feed on the FTP server, allowing students to download lectures and catch up with missed lessons. With the help of Hikvision’s surveillance solutions, the university has become a more secure center of knowledge and learning.

10

www.asmag.com

“The system instantly identifies OCBC premier banking customers in real time as they approach the lounge in the branch without needing to stop to look at the camera.” MD and Deputy CEO (ASEAN Sub-Region) of NEC Asia Pacific.

10.9 % Vietnam’s retail sales grew 10.9% year-onyear in 2017.

Source: General Statistics Office, Vietnam


a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.

Agent Vi Signs Value-Added Distributor Agreement With Canon Marketing Japan The new agreement will enable Canon Marketing Japan to expand its solutions portfolio and offer end-to-end solutions to customers in the country. BY Agent Vi

A

gent Vi, a global provider of video analytics solutions, announced the signing of a value-added distributor (VAD) agreement with Canon Marketing Japan, the marketer and provider of Canon products and solutions in Japan. Canon Marketing Japan will operate as a VAD throughout Japan for Agent Vi’s savVi on-premise video analytics platform which features real-time event detection, video search and business intelligence applications. Already representing other vendors in the Japanese market, Canon Marketing Japan will be able to offer a best-inclass solution by combining savVi video analytics, Axis Communications IP cameras, and the Milestone Systems XProtect video management system (VMS). savVi allows users to achieve optimal value from their video surveillance networks by automating video analysis to detect and alert for events of interest, expedite search in recorded

video and extract statistical data from the footage captured by surveillance cameras. Ariel Frischoff, VP of Sales for EMEA and APAC at Agent Vi, said, “It’s our honor to be working with an illustrious partner like Canon Marketing Japan. Adding Agent Vi’s comprehensive video analytics capabilities to their current offering will allow Canon Marketing Japan to promote an end-to-end solution that suits a wide range of vertical markets. End users will benefit from automated video analysis tools that really leverage the surveillance system to get the most out of their video.” “Canon Marketing Japan is excited about establishing a partnership with Agent Vi, a global provider of video analysis solutions, and about adding savVi to our portfolio,” said Koichi Mikami, VP and Group Executive for Visual Solutions Headquarters at Canon Marketing Japan. “We believe savVi can be offered to various industries and meet various customers’ needs. Having such a comprehensive portfolio of video analysis capabilities enables us to provide more innovative solutions to end-users.”

Industrial LILIN SECURES STEEL FACTORY TO PROTECT ASSETS Siam Yamato Steel (SYS) is a producer of hot-rolled structural steel in Thailand. Due to the large area and complexity of the factory, SYS needed to find a security system that can protect its assets. Therefore, it chose CMS to help install the system. CMS selected Merit LILIN’s latest products, including day and night 1080p HD IP cameras, 16-CH 5MP standalone network video recorders (NVRs) and H.264 1080p real-time HD video decoders. NVRs were deployed in the engine room to monitor and manage multiple IP cameras on a real-time basis, building gates to safeguard the property. For live video displays, SYS even deployed the video decoders at the entrance of the factory to connect to and display live images from LILIN IP cameras. All of the cameras were installed both inside and outside of the factory to prevent any dangerous incidents.

New Premises for Evolis in Singapore Evolis moved into new headquarters in Singapore that will enable them to further expand its business. BY Evolis

T

o support the expansion of its business in Asia Pacific, Evolis moved into a larger regional headquarters in Singapore. The Evolis APAC headquarters was first opened in 2006 to oversee its regional business development. Evolis currently has four offices in this region: Singapore, Mumbai, Shanghai and Tokyo. In the last twelve months, the offices have upgraded into brand new, larger and modern premises. This represents a substantial investment and the group’s commitment to the continued development of activities in the region. Asia Pacific is a highly strategic region for the group. The APAC region has a strong growth potential not only in terms of channel distribution but also for larger projects within key vertical market segments such as government, banking and retail. Commenting on the relocation to the new office, Eirik Bakke, MD for APAC at Evolis, said, “We are extremely excited to shift into this bigger office space in the new premises. Our new +300 m2 APAC headquarters in Singapore will provide a better working environment for our existing team and potential future expansion. Together with our regional distribution center in Singapore, we will be able to deliver greater efficiencies to better serve our partners. Whether it is for meetings, product demonstrations/trainings or just to drop by for a coffee at our ‘Edikio Café,’ which offers stunning views of Singapore, our new premises have been designed with the spirit of being a ‘second home’ for everyone in the Evolis family, be it for our teams, partners and/or customers.”

11


14

www.asmag.com

I

ntelligence is supercharging video intelligence. The Asia Pacific region has evolved to become a major growth driver in the video technology market. According to IHS Markit, Asia accounted for the greater part of the global professional security market in 2016, with China, Japan and India making up three of the top five countries in terms of market share. Milestone Systems is a global industry leader in open platform IP video management software. The company recognized the opportunities in the region early on, and has already established a strong foothold in Asia. “I think that 2017 was extremely positive. We saw growth in all markets across APAC. We see continued high potential in India, Indochina and Australia,” said Benjamin Low, VP for Asia Pacific (APAC) at Milestone Systems. “Indochina, in particular, has grown exponentially in the last 20 years. Technology has taken us forward enormously over the past years and looking ahead, the next five to 10 years will be crucial in redefining the future of technology.” “The complexity and requirements of the current security landscape and customer expectations are accelerating fast. Milestone is working on lowering the hurdles for adopting its solutions and offering its partners with more solutions in different verticals,” added Low. Over the past year, there was an emerging awareness in the

more value beyond security together with our partners,” said Low. Bjørn Skou Eilertsen, Chief Technology Officer of Milestone Systems, concurred that the video surveillance industry is undergoing a huge transformation. “Devices and sensors are being connected and aggregated. As a community, we will have enormous data sets to work with as a result. All the devices will have embedded information and intelligence, and the data sets will represent everything around us. The industry is headed towards the use of aggregated video and sensor information for automation — leveraging the data and making autonomous systems that reduce human intervention. Further down the road, we will see the autonomous systems provide a new level of augmented intelligence, amplifying the decision making beyond human capabilities,” said Eilertsen. The difficulty now lies not in obtaining the data, but rather in using data to drive business outcomes. “The acceptance of video technology as part of our lives is on the rise. We see a positive inclination to IP surveillance systems spurred by technology innovation, real-time access (getting immediate intelligence from data), video analytics for business productivity, and government initiatives like the Smart Nation in Singapore,” Eilertsen added. In this intelligent world, more and more devices will be Benjamin Low, VP, APAC, Milestone Systems

solutions have to adapt to the way people work. “In order to support this, Milestone will bring to market a mobile SDK enabling community partners and customers to make a mobile application and deliver their intelligent solution directly to the phone or tablet. Finally, to stress the importance of cybersecurity and General Data Protection Regulation (GDPR) in the age of connected devices, Milestone strives to achieve industry certification for the Milestone Video Platform, specifically for data privacy,” Eilertsen said. The intelligence derived from videos can be used by users to tap

BY the a&s Editorial Team

Milestone Systems is set to transform its platform to offer added value and intelligent solutions in and beyond security.

COVER STOR


15 15

Continuous technological advancements in the industry are driving the customers to demand more from their vendors. “We are at an inflection point in the industry. The concept of intelligence is changing. Machines with human-level intelligence are being improved, and the market pressure continues to rise with increasing demand from customers for more intelligent solutions. That is the driver behind our strategy to deliver

Transformation of the Video Industry

channel about the possibilities of delivering value-added solutions beyond security. “From an APAC perspective, the majority of our partners are still doing traditional security projects, but more and more do not want to compete in a saturated area; they want to escape the ‘race to the bottom’ that many others in the industry are seeing. For example, Maruti Suzuki in India is using Milestone software and wants to incorporate facial recognition and CRM integration within the platform,” said Low. “Overall, I feel a growing maturity in the market in terms of what the channel is expecting. We see that the partners are looking at vertical growth and partnering with Milestone allows them to focus on a specific area. The solution partners also mature in the way they go to market as they are looking for both integration and reach to the customer base.” Low added.

connected, generating even larger amounts of data, and this is where machine intelligence come into the picture. It is nearly impossible for a human being to keep track of all this data on various video monitoring screens but by combining machine intelligence with human judgment, it becomes easier to identify specific incidents, thus saving time and resources as well. According to Eilertsen, these advances in intelligent solutions are made possible by the enhancement in hardware features, such as GPUs delivering exponentially more computing capacity and the adoption of machine learning as the preferred way to provide intelligent applications. “In 2018 to 2019, the aim is to enable the community to deliver intelligent solutions. Milestone will expand the device driver frameworks to better include IoT devices and sensors to enable partners to aggregate more video and sensor data,” Eilertsen added. To make use of the aggregated video, Milestone will bring to market a Video Processing Service that will leverage the new GPU and machine learning compute capabilities and enable all community partners to build dedicated AI applications directly on the Milestone platform. These investments in the community will radically simplify the development and rollout of machine learning enabled applications to deliver intelligent solutions. These intelligent The industry is in the midst of change and Milestone is clearly spearheading this. By moving away from a business model of simply pushing out new product features and focusing on strengthening the platform, Milestone has created a growing community of partners that has become the driving force for continuous growth and innovation for the company. This will no doubt push Milestone further in the forefront of a more intelligent future in the industry.

Empowering the Platform and the Community

into the massive business potential in the market. If security can be re-envisioned from being a cost center to a business enabler, this will transform it into a return of investment (ROI) generator and make the entire process more intelligent. Hence, Milestone’s focus moving forward will be to empower the whole partner channel to do easier and more intelligent business. To cross this hurdle, Milestone intends to invest even more in its platform to create better and scalable technology for all its partners and stakeholders. “We will continue to make our technology easier to use through better training, improved interaction with partners as well as initiatives like the Milestone Marketplace and the System Builder. These are the two initiatives I find most exciting in the coming year,” Low concluded.


Vertical Market

Driving Production Efficiency With

Data

Amid fierce competition in the manufacturing sector, plants and factories are striving to increase productivity and keep downtime to a minimum. Now, operators can rely on the Industrial Internet of Things (IIoT) and data generated by connected devices to make the production floor smarter than ever. Being the manufacturing powerhouse of the world, Asia is in a good position to deploy IIoT and reap its benefits. BY William Pao

16

www.asmag.com


T

hroughout history, manufacturers have seen several revolutions taking place, each upending the way manufacturing had been done. The Industrial Revolution of the 18th century saw a replacement of human labor with machines. The second revolution came during the early 20th century when the concept of production line was introduced. Then, the rise of computers, networks and robotics further transformed manufacturing. Now, IIoT, also known as Industry 4.0, has sparked another industrial revolution, whereby operators rely on connected devices and sensors to boost productivity and efficiency. “Sensors can be used to generate data related to machine health, process health, cleaning in place (CIP), security and production planning and asset tracking. Consequently, it can help in moving towards a proactive approach in the operations and improving productivity. From a quality perspective, additional sensors are being deployed to enable better process quality control," said Keshab Panda, CEO and Managing Director of L&T Technology Services. “Sensors measure numerous applications in a factory, but their use is dependent on what the business considers to be the most critical applications, for example, environmental (temperature, humidity, pressure). Others are going to look at safety/security, so you may see proximity or optical sensors that will monitor an area. There are also sensors that measure production/machine health such as acceleration and vibration,” said Eric Ehlers, Vertical Marketing Manager at Cisco. “Ultimately, this data provides visibility — driving better operational efficiency, improving automation processes, safety/security and monitoring and optimizing asset utilization. This information can also be used to drive better supply chain utilization and prototyping of new products.”

An Asia Perspective

In Asia, the potential of IIoT is not to be ignored. According to a recent market

17


Smart Technology

Wearables Help to Ensure Lone Worker Safety Lone workers are often working alone in remote places, making them vulnerable to various safety and security issues. Wearables are now making it possible for lone workers to be less alone even in the most secluded locations. BY Eifeh Strom, Freelancer

W

earable technology usually conjures up images of fitness trackers and smartwatches, but nowadays with their enormous popularity they are being used for safety and security as well. Wearables have become so popular that research firm Gartner forecasts that 310.4 million wearable devices will be sold in 2017, generating

26

US$30.5 billion. This is a 16.7-percent increase from 2016. The vast majority of sales will come from smartwatches and wristbands; however, sales of body worn cameras (BWC) are expected to increase rapidly over the next five years — from just over 1 million in 2017 to over 5.6 million in 2021. When it comes to safety and security, the most notable wearable is body

www.asmag.com

worn cameras, commonly used in law enforcement. Companies focused on lone worker solutions, though, are developing different types of wearables to help employers keep lone worker safe. Lone workers operate

in a countless number and variety of industries, from civil enforcement to critical infrastructure to social care. They work in all types of environments from crowded urban areas to remote oil fields. Regardless of who

"Employers and lone workers want smaller, lighter and more discreet devices. However, they also want more features and functionality."


Richie McBride, MD, Edesix

and where, as the name implies, lone workers are on their own, needing to be largely self-sufficient — with wearables they don’t have to be.

Concerns About Safety

Among the most common concerns employers have for its lone workers are injury and violence. There are of course laws and regulations to

Will Murray, Marketing Director, Guardian24

help minimize the possibility of such events, but oftentimes they are vague and difficult to implement. One example is the Occupational Health and Safety Act of 1970 under OSHA (Occupational Safety and Health Administration) in the U.S. The Act includes a “working alone” section, but the language is vague and does not provide any clear guidelines for employers. As such, employers and companies that provide lone worker solutions must be proactive in implementing their own guidelines to protect workers. Among the biggest concern employers have when it comes to safety is violence and aggression toward these workers. “Lone workers must enter various environments where the risk of encountering aggressive members of the public is significantly increased,” said Richie McBride, MD of Edesix. “One survey, conducted by the Royal College of Nursing, found that nearly 40 percent of respondents had been harassed or assaulted while at work in the last year. Without support from colleagues or sufficient emergency

Ron Wright, National Sales Manager, Globalstar

processes, lone workers can quickly find themselves in the middle of a potentially dangerous situation.” Injury is another concern for lone workers. Without help around or nearby, injury of a lone worker on the job could lead to death. Even with lone worker solutions in place, there is no guarantee of safety especially if the solution is not being properly monitored. This was the case in 2013 when a water tank worker drowned in the U.K. Even after activating his lone worker alarm after his fall,

the company did not respond until four hours later, which by then was too late. Events such as this only highlight the importance of having proper procedures in place and the need for conducting thorough risk assessment.

Smaller, Lighter and More Discreet

There are many things to consider when choosing a lone worker device. “The size of the device, cost overrun protection, return on investment (ROI), coverage, ease of use, performance, reliability and

Body worn cameras can aid lone workers to protect themselves and those around them from physical and verbal attacks. Image source: Edesix

27


Smart Technology

Improved Security the Key to Smart Lock Growth The high-tech nature of today’s world means nothing, including the locks on our doors, can be too smart. However, intelligence comes with risks, and companies have worked hard to address end-user concerns. By improving safety and security, user confidence in smart locks is helping to drive market growth. BY Eifeh Strom, Freelancer

Consumers like the convenience of using their smartphones to gain access, but are interested in finding other means to open smart locks. Image source: ASSA ABLOY

T

he evolution of smart technology over the past few years has transcended every industry. A few years ago smart locks were a new idea, an idea that seemed more about hype than true functionality. At the time many of the players consisted of startups like August Smart Lock and

32

www.asmag.com

Danalock. Since then August has been acquired by ASSA ABLOY, while Salto Systems purchased a significant equity share in Danalock. Interest and investments by such key players in the access control community represent the growing popularity and potential of smart lock systems. The convenience of not

needing to worry about a physical key required by traditional locks is one of the many benefits of smart locks. Businesses such as Amazon are taking advantage of this fact. The recently launched Amazon Key system is taking the convenience of smart locks to a new level, allowing for in-home deliveries of goods by


security and safety, as well as enhanced features compared to traditional lock systems.

Not Without Concerns

giving home access to Amazon delivery personnel via the Amazon Key app and one of several compatible smart locks by Yale and Kwikset. While this concept does not come without challenges and concerns, it is taking full advantage of the potential smart locks have to offer. In fact, a recent report by Research and Markets

shows that the smart lock market is rapidly growing. The market is expected to reach US$2.7 billion by 2023 from $1.3 billion in 2017, at a CAGR of 13.1 percent during the projected period. Market growth is attributed to the rising adoption of smartphones and other connected devices. Additional growth drivers include growing concerns regarding

When smart locks first came out security was a main concern; however, smart lock technology has advanced and so has its security protocols. Users, though, are still weary of security vulnerabilities. Locks, by nature, are meant to keep out unwanted intruders, so if a smart lock were to be hacked, the whole purpose of the lock is moot. Residential consumers in particular have concerns with the ability to use alternative ways to open smart locks, for example, if they do not have their smartphones available, according to Todd Graves, SVP of Engineering and Technology at Allegion. Omer Sagi, Business Development Director at ASSA ABLOY EMEA, noted that the biggest concern users have relate to the security and reliability of a smart door lock. “We often field questions such as: What happens if I forget to replace the batteries? Or how can you be sure both the mechanical side and the electronics in your lock are secure?” he said. “ASSA ABLOY’s smart door lock range is built around our most secure mechanical cylinders — many of which are already deployed in homes and sensitive commercial premises all over the world. Furthermore, we test all our ‘smart’ products internally,

and also hire external experts to perform rigorous independent checks. All our smart devices meet or exceed local and global security standards — and we’re always investing to make them even better,” Sagi said. While security is a key concern, cost, particularly among commercial users, is also a hurdle. “Commercial end users are sometimes initially concerned about the higher acquisition cost of the lock itself compared to a simple mechanical lock,” Graves said. “But once they see the life cycle cost benefits of smart locks, and the operating efficiencies they provide, these concerns usually go away.”

Smart Lock Benefits

Concerns aside, smart locks offer a new type of convenience to both residential and non-residential users. Smart locks allow users to control their access from anywhere in the world. In a residential setting this means the ability to share access with family members, visitors or even service providers. “You can let your kids in if they come home early, or issue a temporary or time-limited key to a petsitter or a carer, just to mention a couple of useful everyday scenarios. Smart door locks are also enabling an exciting range of new domestic services. For example, in-home parcel delivery even while you’re out, or the ability to manage your

33


Special Feature

With safety and security concerns on post-secondary campuses being highlighted in light of world events, adopting the best security system is crucial to keeping students and faculty safe. BY Eifeh Strom, Freelancer

Adop N O I T U CA

36

www.asmag.com

Gr


T

here have already been several shootings at US universities in 2018. Events such as these have become an unfortunate reality on post-secondary campuses around the world. This has only highlighted the need for enhanced security measures. The global school and campus security market is forecast to reach nearly US$2.5 billion by the end of 2023, at a CAGR of 19.7 percent during the forecast period 2017 to 2023, according to a report by Market Research Future. North America continues have the largest market share; however, APAC is expected to grow at a fast pace. While video surveillance and access control are obvious components of any

security system, an increase in adoption of both by university campuses globally has been observed. Alone these systems can only do so much; however, in tandem with the latest technologies and integration capabilities, campus security operators are on their way to making campuses safer than ever.

Increased Awareness Driving Security Needs

The primary mission of higher education institutions is to deliver quality education to students; yet, they face the challenge of balancing between a highly secure facility and one that supports open interaction. “Educational institutions face an increasing and constantly evolving risk environment. Recent high-profile incidents emphasize these risks and magnify the vulnerabilities that educational facilities face. This has led to more public demand for improved security solutions across campuses,” said Brandon Reich, Business Leader for Video Surveillance at Pivot3. Jumbi Edulbehram, Regional President of the Americas at Oncam, explained, “Over the last decade, educational facilities all over the world have evolved into what we call ‘soft targets’ for those who wish to do great harm, such as active shooters or vandals. As a result, more robust and comprehensive security

Universities opt Ivy League of Security Amid

rowing Concerns Steve Birkmeier, VP, Sales and Business Development, Arteco

Jumbi Edulbehram, Regional President, Americas, Oncam

James Marcella, Director, Industry Associations, Axis Communications

Thomas Schulz, Marketing and Communications Director, Digital and Access Solutions, ASSA ABLOY EMEA

Terry Schulenburg, Business Development Manager, Education, Genetec

37


Special Feature

Tech Trends Make Universities Smarter Students nowadays are more tech savvy than ever. As a result, it only seems right that universities are adopting the latest and most advanced in technologies and security. BY Eifeh Strom, Freelancer

42

www.asmag.com

Julie Brown, Institutional Market Leader, North American Building Solutions, Johnson Controls

W

Brandon Reich, Business Leader, Video Surveillance, Pivot3

James Somerville-Smith, EMEA Programs Leader, Security and Fire, Honeywell Home and Building Technologies

hen it comes to adopting new trends and technologies, universities are often up to the challenge; however, budgetary restrictions can get in the way. Nowadays, though, students expect a certain level of tech savvy and convenience from their educational institution. With this in mind, investing in such technologies is all the more worthwhile if it means higher student enrollment. A recent survey conducted by Wakefield Research for Ellucian, a technology solutions and services provider, found that 87-percent of students considered the tech savvy of colleges when picking an institution. This only further highlights the importance of staying up-to-date on current technology trends. From a security standpoint, these trends can often be integrated into security applications. By listening to and adopting popular technology trends, universities can not only keep students happy, but make campuses safer and smarter.


Tech Trends Driving Security

There is no doubt about it, this generation of students expect digital solutions. When it comes to security, this translates into things like smart cards and mobile apps. Mechanical, analog systems are seen as old and even inconvenient: Why use a physical key when one smart card can open your dorm room, be used to buy food and check out books at the library? “The modernization of systems across campuses are resulting in the repurposing of technologies. For example, smart cards, which once might only have been used as an access control solution, can now be used to attain campus services such as the library or dining commons,” said James Marcella, Director of Industry Associations at Axis Communications. Julie Brown, Institutional Market Leader for North American Building Solutions at Johnson Controls, pointed to several trending technologies being adopted by university campuses. “In response to recent tragic active shooter incidents, gunshot detection solutions are being integrated with systems like video and access control to support emergency preparedness response in the event of an active shooter. Drones continue to be an increasing area of technology enabling the ability to provide security to remote areas, provide additional coverage and detect and disarm unauthorized drones.” All of these trends, however, point to the explosion of data generated by surveillance cameras and other security software on a daily basis, said Brandon Reich, Business Leader for Video Surveillance at Pivot3. “Not only are schools collecting massive amounts of information, but the data obtained is more important than ever before. Modern organizations can no longer tolerate video loss, system downtime or the inability to access live or recorded video. Data loss can lead to major liabilities, and therefore more significance is placed on server and storage infrastructure.”

IoT, Big Data and Cloud

The terms IoT, big data and cloud have spread like wildfire over the last few years, and for good reason. “The IoT and big data trends have benefited campus security systems by increasing interconnectivity and interoperability like never before,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. “The more detail and pieces of information available about a certain event, the quicker the resolution, and the ability for devices to connect via the cloud makes the sharing of this relevant data swift and seamless.” Terry Schulenburg, Business Development Manager for Education at Genetec, noted, “IoT will continue to grow over the next 20 years. There are so many applications for college campuses that can provide extra security, and extra freedom.” Schulenburg pointed out how currently many campuses are tracking important equipment and as well as inventory management using IoT technologies. One example is how a specific university hospital delivery research wing is providing matching wristbands to new mothers and their babies. If the bands are separated by too far of a distance, alarms go off, cameras activate and doors quickly lock down, he explained. Despite how widespread IoT is now, James Somerville-Smith, EMEA Programs

Hyperconverged Infrastructure for Surveillance Storage

What is a hyperconverged infrastructure and how can it help with a campus’ surveillance storage? Brandon Reich, Business Leader for Video Surveillance at Pivot3 explains. ” The increase in data generation and the growing importance of video and integrated security solutions has resulted in a technology shift from closed, proprietary systems to more a mission-critical application that is often hosted inside of a data center and managed by an IT department,” Reich explained. “This evolution is important to note because IT departments will often turn to traditional technologies for video and data storage infrastructure.” However, according to Reich, traditional infrastructure, such as standard servers or SAN storage, is not well suited for video surveillance environments and can lead to underperformance. Hyperconverged infrastructure (HCI) is a new entry into the video surveillance storage market. In fact, the HCI market was valued at US$796.1 million in 2015, according to a report by MarketsandMarkets. It is forecast to reach $12.6 billion by 2022, at a CAGR of 43.6 percent during the forecast period 2016 and 2022. The report states: “The ability of hyperconverged infrastructure systems is to unify the server, storage, networking and virtualization resources on a single commodity server rather than deploying over separate

hardware components. This, in turn, reduces the overall or total cost of ownership (TCO) of systems and offers highly scalable solutions, which are some of the key driving factors for the growth of this market.” According to Reich, “HCI solutions can be optimized to meet the unique needs of video surveillance, offering far more functionality to schools than traditional IT infrastructure. As more educational facilities look to adopt advanced technologies, such as panoramic cameras, more traditional IT storage solutions will be challenged by the write-intensive nature of surveillance.” “It eliminates complexity and cost, and brings enterprise-class technology and benefits at a more affordable price point than traditional server-based systems,” he added.

43


Special Feature

Integration Turns PA Systems Into Campus Security Solutions Public address systems are commonplace on university campuses. As a mature technology, advancements may not be groundbreaking; however, integrating it with other security and safety systems could give it new life. BY Eifeh Strom, Freelancer

46

www.asmag.com


O

n a vast university campus, a public address or announcement (PA) system is used to make campuswide announcements. We don’t often think of the safety or security implications of such a system, but integrated with alarm, video surveillance, access control, etc., a PA system has the potential to be much more; it could give campus security operators the ability to turn it into an integral part of a holistic safety and security solution. PA systems are included as part of the public safety and security market, which Research and Markets expects will grow from US$277 billion in 2017 to $532.4 billion by 2022, at a CAGR of 14 percent during the forecast period. Meanwhile, the average price of PA systems has been on a gradual decline in the last three years, according to research by IBISWorld. This a result of heavy market competition and the falling cost of component parts. Even with prices on a slow and steady decline, IBISWorld notes PA systems still only present a moderate total cost of ownership to end users. Regardless of cost, budgets across verticals are getting tighter, and end users want to maximize their return on investment (ROI). This generally requires systems to go beyond just their intended use. By integrating existing and new PA systems with security and safety systems campus security operators may be able to find the ROI they’re looking for.

PA Systems Going IP

In today’s security world, almost every system, if not all, can be connected to a network. A PA system is no different. “The PA over IP solutions have been improved,” said Bob Mesnik, President of Kintronics. “The latest IP amplifiers provide more power and the intercoms include full duplex sound. The software now supports IP cameras, and voice-over-IP (VoIP) phone interfaces as well as special automation that provides if-then responses to certain inputs.” Despite the increased benefits of a

An effective PA system can help efficiently evacuate a building.

Bob Mesnik, President, Kintronics

PA-over-IP system, cost could be an inhibitor — the cost of an IP system can be higher than some standard central analog systems, Mesnik pointed out. However, the ease of installation could help to balance out any cost concerns. “The IP paging solution is easier to install since the wiring is easier. The amplifiers and intercom units all connect to the network. The lower power models use power over Ethernet (PoE), so are very easy to install. In many cases, the ease of installation and the ability to provide many zones provide benefits that justify the increased cost,” he explained.

Integration With Video Surveillance

In general IP paging and intercom systems are used to direct people in emergencies, control doors and control other situations such as crowd control, according to Mesink. However, integrating such systems with others leaves the door open to new uses and can push a technology to its full potential. For example, integrating a campus’ PA system with security systems such as video surveillance could give campus security operators more control over emergency communication. “Paging can be integrated with IP camera systems. There are paging and intercoms that can be attached directly to IP cameras. This can work if the cameras have audio in and out,” Mesnik explained. “Small amplifiers are used to power speakers that can be used with the cameras.” It is also important that the video management software (VMS) supports the audio. “Some VMS will provide an alert if they detect a button activation from the IP camera. The VMS then allows the security person to see what is happening and then talk to the person near the IP camera,” he explained. Alternatively, paging can operate by itself and assist an IP camera security system. “For example, the Digital Acoustic intercom system is independent of the VMS and

47


IoT — Hospitality

The hospitality industry is getting more competitive than ever. Against this backdrop, hotels are seeking to differentiate themselves by offering cutting-edge service to guests. With the arrival of IoT, hotel operators are now able to use connected devices and the data they generate to maximize the guest experience, at the same time achieving further operational efficiency and energy savings.

52

www.asmag.com


Making Hotels More Hospitable With TEMPERATURE

RESTAURANT

IoT

LUGGAGE

LAMP

PERSONNEL

BY William Pao

G

lobally, hospitality is a booming industry on the back of increased business and leisure travelers. And hoteliers have reasons to be optimistic, as the uptick in tourist arrivals is expected to continue. The World Tourism Organization under the United Nations forecast that international tourist arrivals would reach 1.8 billion by 2030 and grow at a steady rate of 3.3 percent every year between 2010 and 2030, translating into an average 43 million additional international tourists joining the tourism marketplace annually. However, while this growth is good news for hoteliers, the industry is seeing increased competition, given more and more new hotels are being built. Travelport Hotelzon, a hotel solutions provider, wrote in a 2017 blog post that Berlin was expected to add about 3,700 hotel rooms within the next two years, and London was set to open 8,000 new rooms by the end of 2017 alone. Budapest, meanwhile, has quickly become a hotspot with an additional 2,600 rooms to open across 2017 and 2018, the post said. In the midst of this trend, retaining old

Steve Dunn, CEO and Founder, LEAPIN Digital Keys

Jack He, VP, HDL Automation

customers and attracting new ones has become more important than ever for hotel operators who seek to sustain growth and ensure profits. To that end, operators are turning to IoT and big data for help. “IoT in hospitality has been steadily growing, where it’s becoming available outside of traditional luxury deployments,” said Bill Lally, President of Mode:Green. “Hotels have been using technology to accomplish a specific goal, such as sustainability, but are now incorporating technology as an addition to their branding to differentiate themselves.” “New, digital customer values are being driven by millennials. They want authenticity, personalization, co-creation, social and emotional connection, seamlessness, convenience, control, speed and precision. In this regard, data is king,” said Shovan Sengupta, VP of Hotel Segment at Schneider Electric. “Data around guest interests and patterns informs service design, drives potential partner relationships and becomes the primary asset of hotel chains.” In fact, IoT deployment in hotels is in keeping with the smart home trend, as

53


SMAhome

Expanding Smart Home Solutions for Better

Business Services & Surroundings Ongoing development of smart solutions are bringing more technologies and devices from home to smart businesses, aiding in removing the obstacles for better living experiences and management. In the following five cases, we can find smart energy solutions in hotel, wireless air monitoring in museums, and home deliveries in America and Northern Europe.

â–˛ Haiku Ceiling fans improve indoor airflow in a smart and intuitive way.

W

hen it comes to saving energy, air conditioners and lights first come to mind. But how can we apply and enjoy the functions of these products without paying expensive bills? U.S.-based fan and lighting company Big Ass Fan has a solution. Olas Verdes Resort in Costa Rica wanted a LEED Platinum certification. The LEED Platinum certification is designed for the hospitality industry and

buildings to lessen carbon footprints and make a positive impact on environment. Hotels can be certified only if they implement eco-friendly practices that improve energy and water efficiency. Olas Verdes Resort used Haiku fans by Big Ass Fan to achieve this certification. To take advantage of the strong winds and minimize the heat generated by the sun, the resort installed 70 Haiku fans to create an energyefficient space. Every suite features two fans, one in the bedroom and one in the living room. According to the resort operators, the fans made it possible to eliminate air conditioning in the living room entirely. Fans are also installed in the resort’s offices, entertainment venue and restaurant. Also, the fans come with built-in LED lights, minimizing the number of lights needed in each suite. The tourists gave positive reviews on the Haiku fans, as it created comfortable airflow in the room, kept mosquitoes away and stayed silent while in operation.

Strict Art Protection Meets FilesThruTheAir Environmental Wi-Fi Sensors Plenty of smart homes include an environmental sensor in the appliances, either for precise monitoring of the indoor air status or connecting with smart thermostats for environment adjustments. In larger environments, such as business and public areas, remote monitoring becomes even more important.

58

www.asmag.com


F

ilesThruTheAir, a brand from U.K.-based Corintech, manufactures its Wi-Fi connected environmental monitoring and data logging products with Telit Wi-Fi modules. The full range of FilesThruTheAir Wi-Fi data logging sensors measure temperature and humidity as part of a low-cost environmental monitoring system used to observe, manage and record data. These Wi-Fi data loggers connect directly to an existing Wi-Fi network, transferring data wirelessly to either a PC on the same network, or straight to the FilesThruTheAir cloud platform for management. The platform can also analyze remote monitoring data of multiple devices from different locations. The monitoring technology is applied in many historic heritages in Antwerp, Belgium. The Museums and Heritage Association of Antwerp manages over 800,000 artifacts, 1.5 million books and around 9,500 archives in multiple sites across the city, including Rubens House (Rubenshuis), the former home and studio of the brilliant and versatile artist Peter Paul Rubens. 50 FilesThruTheAir environmental Wi-Fi sensors and cloud platform replaced the original sensors and loggers, cautiously taking care of the air conditions around all precious art pieces. FilesThruTheAir sensors not only maintain stable temperature and

▲ FilesThruTheAir environmental Wi-Fi sensors.

humidity status but also report the data timely into the cloud platform for comprehensive analysis. The Museums and Heritage Association of Antwerp now enjoys FilesThruTheAir environmental Wi-Fi sensors that constantly monitors temperature and humidity of multiple sites. This enables the staff to deal with artifact preservation in a more efficient way. FilesThruTheAir remote monitoring system also provides automated alerts whenever it detects the temperature is going out of range. These alerts can be sent to multiple people so that they can be dealt with

Yale Locks Release One-time Code for PostNord Deliveries Into Homes Smart home technologies are also greatly assisting business services nowadays, bringing value to service providers and retail consumers. According to international service provider Accenture, US$343 billion growth is predicted in parcel delivery services by 2020. Delivery services are now already available with smart homes, targeting busy homeowners, who barely have time to shop in malls or stay home waiting for deliveries.

P

ostNord, a supplier of logistics solutions within the Nordic region, has worked with ASSA ABLOY smart locks to develop an in-home delivery project in Gothenburg, Sweden. The pilot project was tested in 100 households, in conjunction with some of Scandinavia’s major e-retailers. PostNord customers can choose to have packages delivered inside their front door, if it is equipped with a Yale smart lock from ASSA ABLOY. The Yale lock works via a one-time-use PIN code issued automatically to an authorized PostNord delivery driver. The code becomes invalid instantly after delivery, with a notification sent to the homeowners’ phone confirming that the parcel has been delivered and the door has been re-locked. Seeing the added benefits of boosting convenience while maintaining home security, the Head of eCommerce at PostNord, Johan Hellman, said, “We’ll

▲ PostNord has worked with ASSA ABLOY smart lock to develop an in-home delivery project in Gothenburg, Sweden.

now be able to deliver items inside the front door in a secure way. The recipient doesn’t need to be at home or be available at a particular time, which makes it both simple and convenient.”

59


asmag.com PRODUCT FOCUS To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact as-pr@newera.messefrankfurt.com

New Products

Hikvision MV-PD-030001-02 Fixed Under Vehicle Inspection System

Hikvision Digital Technology/China Key Features • 2048 x 12000 resolution, supports tiled display • Matching high speed/non-uniform movement, with no motion blur • Automatic trigger, optional photoelectric or sense coil • Waterproof, anti-fog, anti-corrosion • Supports heavy vehicles • Illumination optimized for vehicle undercarriage Email: overseasbusiness@hikvision.com

Dahua A26 H.265 Wi-Fi Camera

Dahua Technology/China Key Features • 1080p FHD video • Alarm notification • H.265 codec • Two-way communication • Easy4ip cloud • Smart tracking Email: overseas@dahuatech.com

DTK-RM24POES Surge Protector

Ocularis 5.5 VMS

FUJINON HF50XA-5M

AXIS Q6155-E PTZ Network Camera

DITEK Surge Protection/U.S. Key Features • Uses SAD and GDT technologies for optimal protection • Data speeds up to 10 GbE without signal degradation • Individual field replaceable protection modules with shielded RJ45 connections • Provides surge protection grounding to remote devices when using STP cabling • PoE Plus, HiPoE ready for high-wattage applications Email: media@ditekcorp.com

Fujifilm/Japan Key Features • 4D high resolution performance • Telephoto lens with compact body measuring 33 mm in external diameter and the minimum object distance of 200 mm • Anti-vibration and shock-resistant performance with the optical axis displacement of no more than 10 µm • Advanced installation convenience • Achieves the minimum object distance of 200 mm Email: cctv_eu@fujifilm.com

FB-Series ID Thermal Fixed Bullet Camera Matrix COSEC Elevator-Based Access Control Matrix Comsec/India Key Features • Controlled access for 32 floors in one elevator • Multiple credential-based identification • Time, user and floor-based access control • Seamless third-party hardware integration • QR code-based identification • Secured end-to-end communication Email: more@matrixcomsec.com

FLIR Systems/U.S. Key Features • High-performance onboard analytics • Video analytics capable of classifying human or vehicular intrusions • Automatic gain control (AGC) • Digital detail enhancement (DDE) • Certified for integration with major third-party video management systems Email: visiblesales@flir.com

450 Lbs Magnetic Door Holder – REL80-200D

ALGATEC/Malaysia Key Features • Suitable for most types of doors, particularly fire and smoke barrier doors • Widely used in boom gate application • Dual voltage – 12Vdc/24Vdc selectable • Zero residual magnetism • For swing door types • Ease of installation with low maintenance makes it a cost-saving product Email: info@algateclocks.com

62

www.asmag.com

On-Net Surveillance Systems/U.S. Key Features • Recorder configuration changes are now made automatically inside Ocularis Base • Added bookmarking feature in Ocularis Web for faster access • New playback mode of alarm recordings only to reduce bandwidth • New smart camera drivers for Dahua and Panasonic cameras • Available in Professional, Enterprise and Ultimate Email: info@onssi.com

Axis Communications/ Sweden Key Features • Laser focus • Axis Sharpdome technology with Speed Dry • Lightfinder and WDR — Forensic Capture • Zipstream • HDTV 1080p and 30x optical zoom Email: axis-sap@axis.com

EECF1-LN1-R-MN-B 1-CH Ethernet Over Coax Receiver

KBC Networks/U.S. Key Features • One coax ports with PoC • One 10/100 Base-T port • Connect to one unit EECF1-LS1-T-IN-B or one unit EECF1-LS1-T-MN-B • Coax data rate >50 Mbps (300m) • PoE+ is supported up to 300 m based on coax quality and applied voltage to coax (48~57VDC) • Over current and short circuit protection Email: sales@kbcnetwork.com

MxBell Door Station App G450 Home Control Gateway

Bosch Security Systems/Germany Key Features • Support for multiple wireless communications protocols • Visual scene-creation wizard • Intuitive app for iOS and Android mobile devices • Cloud storage service • Single, integrated system for security and automation Email: onlinehelp@us.bosch.com

Mobotix/Germany Key Features • Displays doorbell messages from Mobotix IP Video Door Stations • Live views from Mobotix IP cameras with gesture-controlled PTZ function • Open the door from anywhere, hands-free talking • Automatic camera search, live view and camera connection using SSL • Displays the connection status • Supports remote connections and mobile data Email: sales@mobotix.com


Show Calendar PACOM 8707 Display Card Reader

Pacom/Australia Key Features • Card reader with OLED display • User-friendly interface with clear text and symbols, LED indication • Support MIFARE, MIFARE Plus, DESFire EV1 + EV2 • Tamper protection • RS485/ODSP/Wiegand • IP54 rated Email: info@pacom.com

AMG9000 10Gb Managed Ethernet Switches

AMG Systems/U.K. Key Features • 10/100/1000 Mbps Ethernet RJ45 or SFP ports • 1/10 Gb SFP uplink ports • IPv4/IPv6 L3 static route • PoE and PoE+ support • IGMP Snooping v1/v2/v3 • Compliant with all IEEE 802.3 variants Email: sales@amgsystems.com

VCG Video Compression Gateway

Great Lite International/Taiwan Key Features • GSM/DCS full dual band operation (SGD-5055) • 2G/3G/HSPA/HSPA+ full dual band operation (SGU-5055) • DIY kit, all accessories included • Loop oscillation alarm indication • Coverage: 3000 ft2 (300 m2), 5000 ft2 (500 m2) (by using optional antenna) Email: sales@great-lite.com.tw

49CH H.264+ Smart NVR

Hunt Electronic/Taiwan Key Features • Up to 49 channels of H.264/H.264+/MJPEG IP cameras, each up to 4K2K • Dual Ethernet for bridge, isolation, plug and play • Dual monitor output • RAID 0/1/5 • 9 x SATA and 2 x eSATA • IEC 61000-4 Surge and ESD levels higher than commercial Email: marketing@hunt.com.tw

VTC1910-S IoT Mobile Gateway and Telematics Computer

Nexcom International/Taiwan Key Features • Super slim and ruggedized design • Intel Atom processor Bay Trail E3815 (1.46GHz) • Built-in 1 x CAN 2.0B, optional SAE J1939/J1708 module • Smart power management with ignition on/off delay via software control and low voltage protection • Built-in U-blox M8N GPS • Dual SIM cards for WWAN modules Email: leochang@nexcom.com.tw

GuardPro2 Plus 2MP Outdoor/Indoor WVS Tranwo Technology/Taiwan Key Features • Large 10.1-inch capacitive touch screen LCD monitor • 1080p full high definition and HDMI output • Long recording hours, 256GB MicroSD and 2TB HDD supported • 1000 ft (300 m) long transmission range • Clear night vision and motion detection Email: sales@tranwo.com.tw

WORLD SECURITY EXHIBITION DIRECTORY

Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_ events.aspx.

3

INTERNATIONAL HARDWARE FAIR COLOGNE

• Date: 2018/03/04—03/07 • Venue: Koelnmesse, Cologne, Germany • Tel: +49-221-821-0 • Email: info@koelnmesse.de • URL: www.eisenwarenmesse.com

SECON • Date: 2018/03/14—03/16 • Venue: Hall 4-5, KINTEX, Seoul, South Korea • Tel: +82-2-6715-5406 • Email: global@seconexpo.com • URL: seconexpo.com/2018/eng/ main.asp

LIGHT + BUILDING • Date: 2018/03/18—03/23 • Venue: Messe Frankfurt, Frankfurt Am Main, Germany • Tel: +49-69-75-75-0 • Email: lightbuilding@messefrankfurt.com • URL: www.light-building.com

INTERTRAFFIC AMSTERDAM • Date: 2018/03/20—03/23 • Venue: RAI Amsterdam, The Netherlands • Tel: +31 (0) 20-549-12-12 • Email: registration@rai.nl • URL: www.intertraffic.com/ amsterdam

4

SECUTECH INDIA

SECUTECH INTERNATIONAL • Date: 2018/04/25—04/27 • Venue: Nangang Exhibition Hall, Taipei, Taiwan • Tel: +886-2-8729-1017 • Email: Kirstin.Wu@newera. messefrankfurt.com • URL: www.secutech.com

5

INTERNET OF THINGS WORLD

• Date: 2018/05/14—05/17 • Venue: Santa Clara Convention Center, Santa Clara, CA, U.S. • Tel: +1-646-616-7610 • Email: desiree.mitcham@knect365.com • URL: tmt.knect365.com/iot-world

IFSEC PHILIPPINES • Date: 2018/05/30—06/01 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-03-2176-8788 • Email: Syamsul.Razak@ubm.com • URL: www.ifsec.events/philippines

6

IFSEC INTERNATIONAL

• Date: 2018/06/19—06/21 • Venue: Excel, London, U.K. • Tel: +44 (0) 20-7921-5000 • Email: ifseccustomerservice@ubm.com • URL: www.ifsec.events/international

COMMUNICASIA

• Date: 2018/04/05—04/07 • Venue: Bombay Exhibition Centre, Mumbai, India • Tel: +886-2-8729-1099 Ext. 531 • Email: israel.gogol@newera. messefrankfurt.com • URL: www.secutechindia.co.in

• Date: 2018/06/26—06/28 • Venue: Marina Bay Sands, Singapore • Tel: +65-6233-6688 • Email: enquiry@communicasia.com • URL: www.communicasia.com

ISC WEST

SECUTECH VIETNAM

• Date: 2018/04/11—04/13 • Venue: Sands Expo Center, Las Vegas, U.S. • Tel: +1-203-840-5602 • Email: inquiry@isc.reedexpo.com • URL: www.iscwest.com

8

• Date: 2018/08/16—08/18 • Venue: Saigon Exhibition & Convention Center, Ho Chi Minh City, Vietnam • Tel: +886-2-8729-1099 ext. 768 • Email: stvn@newera. messefrankfurt.com • URL: www.secutechvietnam.com

63


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.