Page 1

Don't Miss Any Detail


100 Challenger Rd. Suite 700 Ridgefield Park, NJ 07660 Toll Free : +1-877-213-1222 Direct : +1-201-325-6920 Fax : +1-201-373-0124


Samsung House, 1000 Hillswood Drive, Hillswood Business Park Chertsey, Surrey, UNITED KINGDOM KT16 OPS Tel : +44-1932-45-5300 Fax : +44-1932-45-5325


No.11 Wei 6 Street. Micro-Electronic Industrial Park Jingang Road, Tianjin, P.R. CHINA 300385 Tel : +86-22-23887788 Fax : +86-22-23887788

SCP-2370RH 37x IR PTZ Dome Camera • 600TV Lines ( Color ), 700TV Lines ( B/W ) • Powerful 37x Zoom (3.5 ~ 129.5mm) • True Day & Night (ICR), SSNRIII • IP66, Coaxial Control (Pelco-C), RS-485

0Lux, 100m IR distance

600 TV Lines, 37x Optical Zoom

37x Optical Zoom Conventional cameras


360˚ Endless PAN/TILT

SAMSUNG TECHWIN CO., LTD. 701, Sampyeong-dong, Bundang-gu, Seongnam-si, Gyeonggi-do Korea 463-400 Tel : +82-70-7147-8741~8749, 8752~8760 Fax : +82-31-8018-3745

Conventional cameras


Mar/Apr 2012

Product Exploration

46 Making

 Megapixel Cameras

Shine in Low Light The migration to IP surveillance is driven by megapixel cameras. However, low-light performance remains an unknown, as smaller and less lightsensitive pixels are crowded onto an image sensor.a&s finds out whether megapixel cameras are ready for nighttime surveillance, compared to analog models, and how components affect performance.

2 S hedding Light on Lux Ratings 5 56 P roduct Showcase

Network Management

Special Feature

32 PSIM Orchestrates a Coordinated

Keep an Eye on Your Fleet for Safety and Efficiency 38


Application Case

90 Security and Safety at Indonesian

As the economic downturn drags on and fuel prices continue to rise, fleet managers are seeking robust solutions to increase efficiency and security while lowering operation costs. Video surveillance for transport applications is expected to increase at a CAGR of 11 percent, to reach US$1.9 billion globally by 2015, according to BCC Research.

Seaport Guaranteed By Bosch 92 Bosch Discussion System Helps Holiday Resort Conference in Style Advertorial

94 Capitalizing on Thailand’s Business

Potential 96 Vietnam Boosted and Secured by Advances in IP-Based Technology

14 22

MAR / APR 2012


Mar/Apr 2012

Vertical Market

68 Education Heightens Security Awareness

Colleges and universities grant the freedom of advanced learning and the pursuit of knowledge. More open spaces and a more dynamic population make campus safety a complex task.

4 C ampus Networks Power IP Uptake 7 78 L earning to Do More With Less: Adapting Campus Security for Lean Times 84 K eeping Schools Safe and Secure

Regional Perspective

Business Talk

98 10 Under 40: Security Unlocks Next

China’s Star Rises in the East The Middle Kingdom commands global attention, with great hopes pegged to its booming economy. While growth is slowing, the nation has a renewed focus on western regions, developing critical infrastructure, and reducing its dependence on exports.

Generation of Excellence


Show Review

108 Intersec

64 T aiwan Advances with Infrastructure and Trade Activities

14 18 20 20


16 22

MAR / APR 2012


Contents Editor’s Note Corporate News Market Observer

30 110 118 124

Products of the Month Show Calendar New Products Companies in This Issue


a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a bimonthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, system integrators and other product purchasers to get updates on product sources and developments in CCTV, Digital Surveillance, Access Control,


Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home Automation and other fields relevant to electronic security.

ISSN 1997-6259 中華郵政台北雜字第1570號 執照登記為雜誌交寄

Is video surveillance ready for “on the go” applications? When mobile surveillance was first talked about, it referred to surveillance technology deployed on transit buses and trains, as well as temporary mobile units at large events, demonstrations or rallies. The central control or monitoring room remained stationary and, in most cases, at one single point. With more mature IP networks and rapid developments in smartphones and tablet computers, mobile surveillance today is much more diverse and dynamic, both in user scenarios and video quality. From building energy/occupancy monitoring and machinery status checks to rescue missions, wildlife conservation and infant/elderly care, a lot of applications and user sites were totally unthought of before, putting extra strains on security systems and wireless networks. One central command is also commonly decentralized now, for better mobility and quicker response. With greater mobility comes greater risk, to the IT or MIS department to say the least. To make systems easier to access on the fly for operators, guards and technicians (and sometimes home users) with different education or training backgrounds, default settings of “admin” and “password” are often left unchanged, leaving backdoor loopholes for unauthorized entries and possible malicious attacks.

Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shih General Manager Regina Tsai General Manager Editorial

General Press Hayden Hsu Editor in Chief Alf Chang Senior Consultant Ling-Mei Wong Reporter Gary Tang Reporter Tevin Wang Reporter Jessica Kao Reporter Sally Tsui Coordinator

Art Design

Gaven Lee Mao Chang Arthur Wu

Executive Designer Designer Designer

Circulation & Subscription

Collins Yuan Michelle Shih

Group Manager Coordinator

Corporate Management

Vivien Hsiu Juihui Lin Annie Yu Chihung Lee

Project Manager Assistant to Managing Director Accounting Manager IT Manager

Jill Lai

Web Editor in Chief

Secutech & Events (Overseas)

Sandra Chen Iris Pan

Project Manager Assistant Manager

Secutech & Events (Domestic)

Security networks are largely closed-circuit to date, but with increasing installations and uses of IP-enabled or wireless edge devices, data leaks and manipulations are becoming a bigger and more realistic threat by the day. Coupled with the fact that the numbers of smartphone/tablet brands and unvetted apps are astronomical, logical and physical security catastrophes are more imminent than many would care to examine and admit. IT checks and balances and defense mechanisms can be deployed, but the real question lies in whether they will be quickly shrugged off in the name of convenience or speed. Online or e-banking is never 100-percent secure, and people know it but still use it; can physical security, where lives and critical infrastructure are at stake, afford similar negligence? This issue’s cover story focuses on the round-the-clock performance of megapixel solutions, dissecting component advances and hands-on price/performance benchmarks for low-light network cameras when pitted against analog alternatives. Vertical Market discusses emerging solution needs and real-life practices for securing and protecting postsecondary institutions in different parts of the world, highlighting added, nonsecurity benefits and usage scenarios. Also in this issue are Special Feature on fleet management, Business Talk on 10 high-ranking managers under 40 years of age, Regional Perspectives on China and Taiwan, and Network Management on practical considerations for PSIM deployment. Enjoy!

Hayden Hsu

Veronica Chen Group Manager

International Advertising [Headquarters]

Echo Lin Joanne Wu Kay Yang Audrey Fang Helen Chen Winnie Ho Jessica Lee

Manager Officer Operation Officer Coordinator Coordinator Coordinator Assistant

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Cemre Ilkan Evris Consolos Muris Hadzic Manish Gandhi Tim Shen Y. C. Suh Takashi Komori Nguyen Thu Ha

USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Web site/ Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s Magazine includes a&s International, a&s International China Best Buys, a&s Asia (above published in English), a&s China, a&s Installer, a&s Taiwan, a&s Solution, Fire & Safety and Info Security (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at Copyright© 2012 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

18 22

MAR / APR 2012


Corporate News Australian Insurance Group Puts Safety First With Honeywell Solution QBE Insurance Group, Australia's largest international general insurance and reinsurance group, plans to upgrade existing security equipment and install an integrated access, video and intruder solution. QBE had considered removing the existing Honeywell access control system which would have incurred considerable cost to the business. However, Direct Security, a select member of the Honeywell Systems integrator program, produced a solution that would allow the access control system to continue to deliver considerable cost savings. Direct Security introduced an upgraded

Honeywell access control system which would allow the three main QBE offices in London to be connected and managed together. The readers and smart cards installed can be programmed for multiple sites which mean that staff travelling between the company's UK sites require only one card to allow them access to all of the sites. The smart card is capable of storing and processing information and so it has multiple uses from cashless vending, personal information storage and control of access to restricted areas — keeping a record of accumulated points for discount purchases and verifying authenticity.

Frost & Sullivan: Biometrics in Border Control Application to Reach Others$8.74 Billion by 2019

SaaS 1.3 Million

For terrorists, travel documents are just as important as weapons, according to a key finding from the 9/11 Commission Report. This is the reason border control systems based on biometric applications have become the solution of choice in identifying potential threats. There is also considerable emphasis on the identification of immigrants using e-Passports and e-Visas by channeling biometric data to destination countries and reducing illegal immigration. New analysis from Frost & Sullivan estimated that the market will earn revenues of US$8.74 billion by 2019, compared to $1.97 billion in 2010. Growing mobility of people necessitates the use of e-passports, e-visas, e-gates and infrastructure to support the systems. The border control market is expected to earn a double-digit CAGR of 17.6 percent from 2011 to 2019. The universal penetration of the e-systems is due to the efforts of biometrics associations, the International Civil Aviation Organization (ICAO) standards, governments and border control application vendors, who have developed international standards for the adoption of biometric technologies. "The mandatory implementation of e-passports for ICAO member countries by 2015 and rising passenger throughput will trigger wider adoption of e-gate systems," said Dominik Kimla, Border Control Market Industry Analyst of Frost & Sullivan. "E-gate system adoption will partially be an outcome of the successful implementation of e-passports and A CAGR of 17.6% 2019 e-Visas and it is vital for efficiently managing passenger flows at border checkpoints." Although the e-passport segment is likely to remain the largest in the total border control market, the e-gate segment will be the fastest growing between 2011 and 2019. Source: Frost & Sullivan

1.8 Million in 2011

20 22

MAR / APR 2012


CEM Systems to Secure World’s Largest Copper $146.4 Billion and Gold Mine in Mongolia $72.5par Billion CEM Systems, t of Tyco Security Products, announced that Oyu Tolgoi copper and gold mine has selected CEM’s management system to secure premises in the South Gobi region of Mongolia. The Oyu Tolgoi site is located approximately 550 kilometers south of the capital, Ulaanbaatar, and 80 kilometers north of the Mongolia-China border. The site is being developed as an open-pit mine with facilities being built on-site to process and support the daily throughput of 100,000 tonnes of ore. Oyu Tolgoi required a system which would be expandable and flexible enough to use on a site where requirements can vary greatly. “With the wide range of requirements and difficult environment, the Oyu Tolgoi copper and gold mine proved how a CEM solution can meet and exceed the access control needs of even the most complex site,” said 1.24%Senior CAGR Andrew Fulton, Director of Global Sales, CEM Systems. Oyu Tolgoi opted to install several powerful applications from CEM’s management solution. These applications will allow customers to seamlessly interface with thirdparty systems of their choice, providing $1.6 Billion by 2017 unparalleled convenience and flexibility.



Corporate News HID Access Control Solutions Protects Major Airport in China HID Global, a secure identity solutions provider, announced that the Nanchang Changbei International Airport has selected the company's networked access control solution, contactless smart cards and readers for its new terminal to enhance overall security. The new system delivers real-time monitoring and data management capabilities, while enabling role-based access control settings to manage staff access at key entry points and restricted areas in the airport. Changbei International Airport deployed HID's network controllers, door/reader interface and contactless smart card readers in six core areas, including boarding gates, its extra-low voltage system area, equipment rooms, management offices and

the entrance to the aircraft operations area. The system enables up-to-the-minute record transmittal to the central server for report generation and real-time monitoring. It also addresses the airport's need to restrict entry to specific areas based on the time of day, limit access to critical zones to authorized personnel only, and define staff access control levels according to job titles. HID Global's smart card solutions and open architecture networked access controllers are designed to meet the airport's evolving requirements and future system expansion. Networked access controllers also enable additional deployments such as alarm configuration and other applications,” said Eric Chiu, Director of Sales for China, Identity and Access Management, HID Global.

IMS Research: Chinese Automobile Infotainment Market to Reach $5.3 Billion by 2018 Recent analysis from IMS Research forecasts that total revenues for the Chinese infotainment systems market will increase from US$1.7 billion in 2011 to $5.3 billion in 2018. The large increase in revenues is related to two factors. First, unit shipments for all major head unit types are predicted to almost double by 2018, thanks to the projected increase in light vehicle sales in China. Second, IMS Research projects that the average revenue for in-car infotainment systems per vehicle will increase beyond $200 by 2018. "Although total market revenues till 2018 are forecast to increase quickly, there is a very different scenario for the future of each head unit type, said Michael Liu, Automotive Analyst in IMS Research’s Shanghai office. “The OEM audio head unit market will stay flat over the forecast period, despite a shrinking OEM fitment rate caused by a shift to navigation head units in many mid-level cars.” The future for the OEM audio/video head unit market is grave. It is forecast to shrink and eventually disappear. Safety issues and limited demand for video content in the cars are the two major reasons for this. In contrast, the OEM market for navigation head units is promising. Market revenue is projected to increase fivefold by 2018. This is largely because OEM navigation head units are predicted to be used in increasing volumes of entryand mid-level light vehicles. Furthermore, a falling average selling price will boost sales. Having navigation functionality is becoming a necessity for many in China as the road infrastructure develops.


MAR / APR 2012


Arecont Vision Megapixel Cameras Ensures Safety in New Zealand Retirement Community For an older population, the security and comfort provided by retirement living communities makes them an attractive option. At St. Andrews Village in Auckland, New Zealand, the comfort provided by the residential facility is secured with Arecont Vision megapixel camera technology. Arecont Vision megapixel cameras are used in vulnerable areas such as entrances and parking lots to help ensure a safe environment for residents and staff members. With megapixel technology, fewer cameras are required to cover the facility's expansive grounds. It also enables security personnel to keep a close watch on activities without an imposing “big brother” feeling that can be present when dozens of cameras occupy a site. To oversee the daily and nightly activities of residents, staff and visitors, 13 Arecont Vision megapixel cameras have been strategically positioned to monitor vulnerable areas. All cameras offer simultaneous full field-view and region-of-interest video, as well as on-camera motion detection.

Corporate News Sensor Maker Optex Acquires Lighting Specialist Raytec Sensor manufacturer Optex of Japan has announced a major investment in the 100-percent share capital of UK lighting manufacturer Raytec. This new partnership allows the two companies to capitalize on many common synergies in sales and technology bringing both sensor and lighting technologies together. Raytec's three founding directors, Shaun Cutler, David Lambert and Tony Whiting remain on board and are committed to achieving Raytec's long-term goals. “The investment by Optex is exciting and very much welcomed by everyone at Raytec,” Cutler said. “We will continue to operate independently from our UK facility;

International School in Malaysia Deploys Hikvision Comprehensive Solution The Prince of Wales Island International School in Malaysia provides its pupils with a British-based secondary education and full dormitory accommodations on its large campus. With the many amenities, school administrators were keen to add a comprehensive security solution to the package. IS Solutions and Consultancy, integrator for the project, selected a Hikvision solution for the school. In outdoor areas, Hikvision's speed domes provide eyes in areas that are otherwise difficult to monitor. High-definition and low-light box cameras provide added eyes in the sky. "Placed outside, in the general campus, the cameras offer what we need to secure the common areas,” said Maureen Khoo, Project Manager at IS Solutions and Consultancy. “We are able to use the flexibility of these unit, and the ability to rotate, adjust and immediately zoom in on objects. Regardless of the time of day, this gives us a very detailed picture of who or what we are looking at.” “With more than 150 units on campus, the cameras secure both general and niche areas. With high definition, we are really able to identify who exactly is at a specific location, regardless of area," Khoo said.

24 22

MAR / APR 2012

however, we now have access to more resources to better serve our customers and alliance partners across the globe.” Raytec and Optex technologies are often partner products in the field and are used together in major, high security installations and critical infrastructure projects across the globe. Now part of the same group, both technology teams will aim to work together in developing and integrating sensor and LED technologies. The R ay tec brand wi l l rema in in place, and Raytec's focus will remain on innovation and illumination.

Vietnam's Largest Commercial Bank Deploys Surveon Surveillance Technology Agribank is the largest commercial bank in Vietnam. It has 37,500 staff in 2,300 branches and transaction offices, serving 10 million households and 30,000 enterprises nationwide. Agribank wanted to expand its video surveillance system in order to meet business growth and achieve centralized management for its surveillance networks. Agribank planned to set up a new system at its provincial headquarters, while managing surveillance networks of six other locations in the province, including one branch and five offices. A number of challenges were identified at the beginning of the project. The customer was concerned about the feasibility of setting up a truly end-to-end megapixel solution that went beyond simply installing megapixel cameras. With a strong technological background, Surveon's partner was well aware of the impact of large bandwidth required by megapixel streams on system performance and stability. The system used by Agribank comes with Surveon's active monitoring and smart investigation technology, which supports Agribank by reaching required surveillance monitoring levels. Through the included real-time video analytics engine, important events can be effectively displayed on the solution's alarm board, allowing immediate follow up by security guards.

Sydney Harbor Venue Enhances Security With Vivotek Cameras The Doltone House Jones Bay Wharf is located by one of the busiest entertainment districts in Sydney, Australia, where convention centers, the aquarium, museums and other attractions are within close proximity. The Doltone House is a favorite local venue for meetings and conferences, events and weddings, food and wine emporiums, cooking classes and casual dining and catering. For extensive video surveillance coverage and maximum security on the premises, the Doltone House required new indoor and outdoor camera installations. To make guests feel comfortable, indoor cameras had to be discrete, versatile, elegant in design and easy on the eyes. The outdoor cameras also had to be aesthetically and visually pleasing in order to blend in with the architectural design of the building. A total of 86 Vivotek indoor cameras and 16 outdoor cameras were installed for this project. The extensive surveillance coverage offered by the indoor and outdoor cameras ensure that the Doltone House compound is safely and effectively secured against any threat or danger.


Corporate News Pike Research: Global Revenues for Commercial Building Automation Systems Will Reach $146 Billion by 2021 As commercial buildings consume roughly 23 percent of all electricity globally, the automation systems that ensure efficient performance are a critical part of energy management. Today, the market for commercial building automation (BA) systems is in the midst of revolutionary change in terms of technology and utility. According to a new report from Pike Research, the market for commercial BA systems will double over the next decade, increasing from US$72.5 billion in 2011 to $146.4 billion by 2021. “Automation systems have long provided the core technologies to ensure that buildings are safe and energy-efficient,” said Research Analyst Eric Bloom. “Recent advances in automation technology, particularly relating to their integration with information and

Shanghai Academy of Science Selects Axis Cameras for Campus Monitoring Shanghai Advanced Research Institute, Chinese Academy of Science occupies an area of 105.5 hectares and focuses mainly on application, research and personnel training in advanced technologies. The institute hoped to have high-definition video quality for its surveillance system, while also considering factors such as real-time video, stability, scalability, storage capacity and costs. In addition, due to the high number of channels, an effective way to help the security department manage all of the channels was required. Thus, the institute chose to implement the Axis all-digital network monitoring solution to realize distributed monitoring and centralized management of the entire campus, with approximately 400 channels in total. Focusing on the client's specific requirements at different locations, video resolution, stability and future expandability were also taken into account. The front end mainly used Axis network cameras supporting PoE, which directly transfer digitized video to the monitoring center through the private network of the campus, thus realizing centralized monitoring and management.

26 22

MAR / APR 2012

communication technologies, are dramatically increasing system capabilities and enabling deeper levels of energy management than ever before, thereby generating a surge in demand.” This surge is being driven by two important trends that are transforming the building industry. The first is aggressive energy efficiency goals within the building stock, which is undergoing tremendous growth, particularly in developing APAC nations. Second is the fact that BA controls and field devices, which communicate via a range of protocols such as BACnet and LonWorks, are starting to be fitted with IP capability so as to utilize the same protocols and infrastructure equipment as the IT network.

Webgate HD Video Tracks Traffic Along Korean Expressway The Korea Expressway Corporation (KEP) selected Webgate’s cameras to provide a clear picture of traffic for its intelligent transportation system (ITS). "The old analog system with its black-and-white screens was almost impossible for recognizing details, especially in poorly lit areas at night," said Mr. Park, Traffic Control System Manager. When KEP wanted to improve its traffic control center and monitoring system, it needed a solution which was compatible with the existing coaxial cable infrastructure. Working with KEP, Webgate traffic systems specialist Mr. Min decided to install 27 cameras to cover all important sites. The cameras can be remotely controlled from the control center. "The LPR function can help prevent crime," said Mr. Kim, a police officer. "Recently, there was crime, involving metal theft of subway tracks. The license plate was caught clearly on the monitor, enabling our team to track the criminal." The good image quality enables identification of all individuals in public areas with surveillance. Every moment can be recorded with the date, making it easy to identify the time something occurred. "This system is very easy to use for operations and management. It can handle the existing analog system, and it is very stable," Mr. Park said. Webgate solutions have been used for almost two years without any drawbacks.

Security 50 Annual Summit Honors Elite Manufacturers a&s International identifies top security players in its annual Security 50 ranking. Since the ranking’s inception in 2003, it has become one of the most popular a&s features. In 2012, Messe Frankfurt New Era, the publisher of a&s magazines, will honor the industry’s finest at the first Security 50 Annual Summit. The summit and award ceremony will take place in Taipei on April 18, at Secutech, security’s premier exhibition. The Security 50 Zone at Secutech is a dedicated area with seminars, networking opportunities and helpful materials from the top companies. Security professionals can develop business partnerships with remarkable players and industry heavyweights. At the panel discussion, management-level executives from global brands and Asian manufacturers will share their business strategies for success. Industry giants will offer exclusive insight. For more information, please contact Kay Yang at .


Products of the month

Integrated Biometrics Watson Integrated Biometrics announces Watson, the world’s first non-optical scanner to achieve FBI Appendix F certification. The FBI certified that Watson meets or exceeds all requirements listed in EBTS Appendix F Mobile ID SAP 45 of the Integrated Automated Fingerprint Identification Systems Image Quality Specifications. Watson is the smallest and lightest Appendix F certified two-finger scanner in the world, weighing 115 grams and measuring 70 mm X 63 mm X 33 mm in size. Watson offers unique operational benefits compared to existing certified scanners including IP67 durability rating, high quality imaging in dirty environments, no difficulty operating in direct sunlight, and does not require latent prints to be wiped from the sensor surface. It is capable of performing both enrollment and matching for single or multiple finger applications. Key Features Watson is available in a form suitable for embedding • Lightweight: Designed to have minimal impact on the overall in hardware or externally connecting through USB. weight or structure of biometric devices Watson utilizes Integrated Biometrics’ patented • Compact: Designed to easily integrate into multiple applications, light emitting sensor (LES) technology. LES allowing biometric devices to be smaller and more mobile technology utilizes a highly engineered • Durable: Impact-resistant and able to withstand the toughest charged polymer film interacting conditions with minimal maintenance or damage due to scratching or breakdown from contaminates with the specific properties of • Accurate: Provides accurate high-resolution fingerprint human skin to luminesce fingerscans in virtually any environment: indirect or direct sunlight, print images. Watson a factory, with dirty or clean fingers offers an efficient Supplier integration • Integrated Biometrics SDK.



Precise Biometrics Smart Casing

Key Features

• US government employees with smart cards for network access and identification can use the smart casing to access secure systems and messaging securely and conveniently right from their smart device.

Precise Biometrics has developed a smart casing with a built-in • A banking app may now include the ability to swipe a smart card reader and fingerprint sensor. The product meets finger instead of typing in a PIN code or long password. the increasing requirements on network security and strong • In health care, a hospital worker could use their smart card or swipe a finger to access a patient’s chart from a authentication raised by today’s smart device. government, health care, enterprise • National ID cards with Precise Match-on-Card may also and banking sectors. be enhanced by the smart casing. It enables extended The smart casing will be available use of the national ID for law enforcement, voter identifor the most popular smartphone fication and tax filing through handheld units such as smartphones. and tablet computer brands in 2012 and 2013. Supplier The smart card and fingerprint • Precise Biometrics features of the smart case can be URL integrated with any app on the • market — existing or new. The smart casing fulfills a need for users who want to access sensitive information or cloud-based applications from their smart devices, but are restricted from doing so due to security or convenience issues.

30 22

MAR / APR 2012


Network Management

PSIM Orchestrates a Coordinated Response Integration of subsystems and network configuration take time and effort. Physical security information management (PSIM) will achieve little without detailed policies articulating what to do, whom to notify, and how to communicate for a coordinated response. This policy-making process requires dedication and consensus from all stakeholders. By Tevin Wang


PSIM platform will be used not only by guards but also by administrators. PSIM solution providers have to design customized and flexible solutions for all users. “For most chief executives in this economic climate, the primary consideration is risk mitigation, but the close second and third criteria are ROI and future-proofing technology investments,” said Al Liebl, VP of Professional Services, Proximex (a Tyco International company). “Risk mitigation criteria vary by deployment, but are generally based on how much incident pain is created and how the PSIM solution helps to resolve these situations. For most PSIM platforms, ROI is based on actions that avoid a ‘rip-and-replace’ scenario and custom integration. It also drives down the costs of false alarms, financial loss from incidents and training costs.” Another key factor for management to choose PSIM is lowering the TCO, said Patrick Lim, Director of Sales and Marketing, Ademco Far East (an Ademco Security Group company). “Many procurement decisions are made based on the face value of a system; but when a large PSIM is needed, the considering factor has to include man -hour savings, management cost, cost of support, cost of expansion and technology road map.” Other procurement considerations include the ease of integration with existing and planned systems. “The ability not only to send and receive information from the subsystems but to intelligently present that information and its relation to other current information is critical,”

32 22

MAR / APR 2012

said Jason Troester, IT Manager at Unlimited Technology. Adlan Hussain, Marketing Manager at CNL Software agreed. “There are a large number of reasons cited by the ‘C level’ for the selection of a PSIM solution, if there is one that is most commonly referred to, it would have to be the visibility they have of their whole security operation. Bringing security into line with the rest of an organization, where the use of technology is proactively supporting decision-making and providing measurable results, is a huge advantage.”

The Weakest Link

PSIM functions not only to bring the most important information to the attention of operators, but also to help them make sense of multiple inputs. Setting up a list of response measures requires not just the PSIM technology, but most importantly, the policy management of all stakeholders. “One of the biggest challenges that we have seen is that PSIM systems tend to overlap multiple departments or agencies and getting those parties to agree and


Network Management

▲ Jeremy Brecher, VP of Security ▲ P atrick Lim, Director of Sales ▲ B ob Banerjee, Senior Director ▲ B ob Scott, Executive Director ▲ A dlan Hussain, Marketing

Technology and Integration, Diebold Security

and Marketing, Ademco Far East (Ademco Security Group)

of Training and Development for Security, Nice Systems

commit to cooperating in a PSIM system,” Troester said. PSIM can impact not just security, but also IT, human resources and facilities management. “Multiple parties, or departments, throughout an enterprise can have responsibility for or influence in a PSIM deployment,” said Jeremy Brecher, VP of Security Technology and Integration, Diebold Security. “When connecting the subsystems that are part of PSIM management, for instance, rules of engagement are critical. An overarching agreement should be developed for how PSIM will impact these systems. And processes should be identified for how stakeholders that own subsystems continue to operate and maintain those systems once they are part of PSIM. Each stakeholder should have a role; and those roles should be clearly articulated early in the process.” The PSIM system setup and configuration stage is central to ensuring the system meets the varying needs of all stakeholders. “Allowing permissions requires some legal processes to determine an established permissions hierarchy within the PSIM solution,” Hussain said. “This ensures the system is 100-percent compliant with these legal agreements, which reduces the risk of litigation and accelerates the speed at which visual intelligence can be distributed. Additionally, the solution has been customized so that the user experience is completely tailored to their defined role, such as with access to different areas of functionality based on their job requirement. This provides users from each agency with the right information at the right time.” “From a broad perspective, it’s important to remember that PSIM is a tool. It does not eliminate the need for departments and functional groups within an organization to work together. And it cannot be successful without a measurable goal,” Brecher said. “Determining the rules of engagement, how systems connect and how to assign roles and responsibilities requires a significant investment of

34 22

MAR / APR 2012

of Security Solutions Strategy, Intergraph

Manager at CNL Software

time at the front end. There is no shortcut for that.” Organizational integration between multiple sites can be even more difficult, since it impacts how businesses work and operate. “If one wants to model an entire city, it’s not something that you can do overnight. Once you model it, there has to be a plan to roll it out across different agencies and to set up zones,” said Debjit Das, VP of Marketing, Verint Systems. “What we often see is that some security directors are saying they want PSIM, but they do not have an executive sponsorship to roll it out. Executive sponsorship will affect business processes. For example, in a city environment, if you are changing how you plan to respond to events, it’s not something that one agency can decide independently.” Despite careful planning, each stakeholder needs to define what they need. “We have seen situations between two organizations where they are unable to come to an agreement on whether one department should be able to access the video of another,” Das said. “These kinds of problems cannot be resolved by technology.” In multiple sites and citywide projects, change is hard. “Departments or agencies that used to run autonomously may be forced to share, or even consolidate, resulting in power struggles, transition challenges and, potentially, derailed and failed project implementations,” said Bob Scott, Executive Director of Security Solutions Strategy, Intergraph. “Until an organization really evaluates and changes doctrine, policy and operational concepts, all the technology in the world will not make a deployment successful.” “A best practice for situation management across multiple sites or a city is to obtain buy-in from all stakeholders on the types of situations to monitor for, their associated responses and the role of each stakeholder in the response,” said James Chong, CTO of VidSys. “Once agreed upon, each stakeholder should


Network Management then have the ability to monitor and respond to the information relevant to their role.” “It is getting common to have government agencies and private vendors co-running such operations and leveraging each other’s strengths,” Lim said. “We have only encountered a single agency take ownership in the past; and trying to dispatch responses by communicating with other agencies. Gradually, we are seeing more functions being outsourced to a private vendor that has experience running such operations in a more cost-effective way.”


PSIM is the software layer that sits on top of other subsystems. It is designed to connect disparate subsystems for integrated, unified security operation. “Even if the PSIM dies, the subsystems are still alive and self-contained,” said Bob Banerjee, Senior Director of Training and Development for Security, Nice Systems. “Two problems will occur if PSIM solution is down. First, you lost your situational awareness. The other one is that operators do not know what to do when an incident occurs.” The nature of this approach enables subsystems that are connected through PSIM to sustain operation independently. “As such, it enables the native applications to act as their own backup system if there was to be any issues with the intelligent PSIM layer,” Chong said. “Redundancy from the network side should be treated as

any key applications running on the corporate network.” “An organization must understand the risks to its system, if it needs dual pathways and what level of redundancy is required to make its system survivable,” Brecher said. “As with any other IT system, PSIM systems should have backup protocols and disaster recovery infrastructure — the same contingency elements and processes that would apply to any other Tier-one IT system.”

Smarter Responses

PSIM is designed as a converged platform, presenting the most relevant information and advising the best course of action in a crisis. It requires a networked environment for integration between disparate systems. However, subsystems integration is not what PSIM about. It is about the concept of operations and, most importantly, how to manage incidents. PSIM involves ongoing development to ensure it meets user needs. Such processes require customization and time. While system integrators, PSIM vendors and manufacturers can work together to tackle technical challenges, it is the clients’ responsibility to establish their SOPs. PSIM software will not tell an enterprise what it should do until an organization defines its goals and leverage the software to achieve those objectives. Successful implementations of PSIM rely not just on subsystem integration and network configuration, but also on effective communication throughout an organization.

PSIM selection Tips PSIM installation is no easy feat, as it requires constant tweaking and maintenance. Business owners and stakeholders should keep in mind several considerations.

subsystem user experience. Older analog systems may also require customized integration to be used with the PSIM platform, while native IP systems are less troublesome.

1. P r i c e : T h e m o r e f e a t u r e s a n d subsystems are integrated, t h e m o r e c u s t o m e r s p a y. A s PSIM deployments vary greatly, customers, SI and vendors must reach a consensus about actual cost and value for money.

3. I P + S e c u r i t y : W h e t h e r t h e integrator is fully familiar with both electronic security and networking should be asked upfront. It is crucial to have an experienced SI that is able to provide the integration and support needed.

2. P SIM is not plug-and-play and requires training to become familiar with its features. Sitting on top of other subsystems, the interface and how it is operated can be completely different from the

36 22

MAR / APR 2012

Customized Solutions There is no universal definition or standard for PSIM. However, a good PSIM platform should be capable of the following:


• Customized to meet the distinct needs of administrators and operators • Layered authorization levels that differ for sites with several stakeholders • Run smoothly with either a centralized or decentralized surveillance system • O perate stably, even if one of the subsystems goes down • Detect potential threats and respond in a timely manner • Seamlessly retrieve data and translate it in a single, analytical and archival form • I mprove workflow efficiency by decreasing operator response time • Demonstrate ROI

Special Feature

Keep an Eye on Your Fleet for Safety and Efficiency As the economic downturn drags on and fuel prices continue to rise, fleet managers are seeking robust solutions to increase efficiency and security while lowering operation costs. Video surveillance for transport applications is expected to increase at a CAGR of 11 percent, to reach US$1.9 billion globally by 2015, according to BCC Research. By Tevin Wang

38 22

MAR / APR 2012



aced with increasing terrorist and public-safety threats over the past two decades, mobile surveillance technologies have emerged and evolved. Forwardthinking vehicle fleet managers are always looking for comprehensive solutions that reduce liability and enhance safety and fleet performance. While basic principles remain the same among different verticals, there are unique elements and requirements that must be considered for specific fleet types. “It really depends on the vertical the service business covers. For example, landscaping companies often have extremely expensive assets on their trucks, whether they have five or 500 vehicles in their fleet,” said Mark Roberts, CMO of NexTraq. “One single in-vehicle device covering all different needs is replaced by vertical-specific solutions with smarter analysis and more valueadded services. “

Concerns by vertical Taxis and Limousines

“For taxis and limos, the No. 1 risk is reckless driving,” Roberts said. Features such as speed reports, risky driver behavior identification and alerts are used to monitor unsafe driving patterns that might result in

▲Mark Roberts, CMO of NexTraq

accidents or litigation. Police Cruisers

In the U.S., police vehicles are equipped with cameras to record both inside and outside activity. Video quality is the ultimate consideration when choosing an in-car video system, said Adam Rushlow, Marketing Manager of WatchGuard Video. HD is a priority as video footage is required as court evidence. According to IMS Research, the HD camera market for police cars in the U.S. is set to grow more than 20 percent over the next four years. Sound-recording facilities can also be integrated and used in a court of law to prove or disprove witness statements. Most police officers are not technologically oriented. “Make sure police officers can be trained easily and effectively while installation remains as simple as possible,” Rushlow said. “The accountability and reliability of solution providers are also vital, especially when some technical issues arise.” Logistics and Freight

“Delivery vehicles and freight trucks could carry potentially expensive assets that could be targeted for theft or robbery,” said Liu Yang, Technical Support

Engineer, Dahua Technology. While GPS provides location information, asset-tracking devices can be deployed to pinpoint the location of equipment or a specific trailer. Some assets require real-time monitoring with location updates every two minutes. Other mobile assets like containers and rail cars require location updates less frequently and require batterypowered tracking devices. The goal is to allow fleet managers to monitor and maintain real-time control, ultimately minimizing the costs associated with lost, stolen or abandoned trailers, said Todd Lewis, President of GPS North America. A t r a d i t i o n a l w a y t o s e c u re trailers and freight cargo is through d o o r- o n l y o r d o o r- p l u s s e a l s . However, door-only and door-plus seals do not provide protection against unauthorized entry, said Laura Turner, Marketing Assistant at Global Tracking Communication. Smart containers are asset trackers with a container lock feature, reporting opening and closing events. With this additional layer of security, fleet managers may use an online application to view assets and vehicles on maps. Reports and alerts can be triggered, for example, when cargo enters or leaves a specific geographic location.

▲A dam Rushlow, Marketing ▲L iu Yang, Technical Support ▲Chalon Dilber, Marketing Director ▲X in Zhou, Product Manager, Manager of WatchGuard Video Engineer, Dahua Technology for Safety Vision Hikvision Digital Technology


MAR / APR 2012

22 39

Special Feature

This geofencing information improves security and reduces possible theft, helping business owners better manage inventory and human/object assets.

transport routes are located in rural areas, which may not have cellular communications, said Cliff Henley, CEO of Fleet Management Solutions. Mining vehicles are rugged and huge, Mass Transit and accidents involving them In public transportation, key are always serious. “Two-way security concerns for passengers satellite communication and drivers include disputes with GPS tracking is vital for ▲J ason Lai, Director of Fleet ▲Craig Whitney, VP of Marketing at Management Service, Riti Networkfleet from accidents, violence, immediate location awareness Technology vandalism, driver behavior and emergency response.” management and liability mitigation, Driver blind spots include hardware or GPS devices. “For said Chalon Dilber, Marketing the front, sides and back of the example, accelerometers can Director for Safety Vision. “To a vehicle. This fact sometimes leads measure high G-force events such much lesser extent, the concerns to deadly accidents as drivers do as aggressive cornering, brakes and stretch to include hijacking and not even know or sense they ran crashes,” Dilber said. “In addition, homeland security-related concerns.” over a car or a person, Yang said. integration with external hardwired Simple video recording with a Radars, microphones and cameras sensors as well as vehicle diagnostics fixed camera might be adequate a re d e p l o y e d a n d s h o w n o n a allows buses to provide real-time for after-the-fact processing since display inside the cabin to enhance alerts to a central station.” litigation has always been a concern situational awareness. According to Canadian Council for mass-transit operators. Readily Road safety is critical in risk of Motor Transport Administrators available video footage provides mitigation and a key concern for research, driver fatigue contributes to the most legitimate evidence to these fleet managers, said Jason 19 percent of accidents and 4 percent support or dismiss claims from either Lai, Director of Fleet Management of fatal collisions. Fatigue detection passengers or drivers. In recent years, Service, Riti Technology. Improved focuses on the status of eyes. “The remotely accessible and live video safety on the road in remote areas latest development is to combine has become a prerequisite in selecting with harsh environments can be video analytics and passenger mobile DVRs, which provide achieved by creating geofences counting with audio and GPS data decision makers with a real-time around no-go areas or designated to proactively monitor driving habits view as critical events unfold. To routes to notify if the driver has and passenger loading to prevent ensure video quality, features like gone off the grid. “There is no possible accidents,” said Xin Zhou, Wi-Fi, 3-G and bandwidth consisdoubt that driver safety remains Product Manager, Hikvision Digital tency should be taken into account. the most important objective with Technology. Unsafe driving maneuvers should dangerous goods transport fleets, Mining and Dangerous Goods also be monitored. Identifying but monitoring speeding, which Safety is a top priority. Many reckless behavior with sensors is is a major contributor to crash mining sites or dangerous goods generally included with recording incidents, is equally important,” Lai

Fleet-Specific Features to Consider Taxis, Limos

Police Vehicles Logistics

3-G, GPS, 3-G, GPS, Wi-Fi, storage Wi-Fi, voicecapacity driven dispatch systems, multimedia video

40 22

MAR / APR 2012

GPS, dispatch systems

Transit Buses

Freight Trucks

Mining Trucks

Tank Trucks

3-G, GPS, Wi-Fi, dispatch systems, bus stop announcement systems, multimedia video

GPS, engine diagnostics, dispatch systems

GPS, anti-vibration

GPS, explosionproof certifications, speed monitoring


said. Features like driving-behavior monitoring enable managers to know when and where specific events such as hard braking, sharp turns and rapid acceleration occur. “In addition to management awareness, weekly or monthly summaries let drivers know how many events they trigger each day, thus promoting safe driving habits on a daily basis.” “As tires play an important role in handling, maneuvering and braking of these heavy vehicles, tire pressure monitoring is also crucial,” Lai said. “With the aid of tire pressure monitors, tires can be properly maintained, and crashes caused by tire blowouts and other tire-related issues can be minimized.” Higher fuel prices increase the risk

of fuel theft, making tanker trucks easy targets for criminals, Yang said. The opening and closing of valves, hatches and other control points on the truck should be monitored and time-stamped. Approved routes for the tanker and valve/hatch access points should be established to ensure the safety of these assets. Any deviation from pre-established parameters will trigger an alarm in the operations center.

Toward Greater Efficiency

“The rising price of fuel has made telematics for fleet management systems even more critical to all types of fleets,” said Craig Whitney, VP of Marketing at Networkfleet. Seeking ways to ensure fleets remain


MAR / APR 2012

profitable is the main reason fleet managers use telematics. In the U.K., for instance, diesel prices rose 36 percent from 2010 to 2011. “Our clients use telematics to reduce operation costs, including lower fuel consumption and vehicle maintenance.” According to a study from the University of Michigan Transportation Research Institute, ignoring fuel-saving strategies such as vehicle maintenance, driver training and route selection can reduce a vehicle’s cumulative fuel efficiency by about 45 percent. Aggressive driving and vehicle idling are major sources of fuel waste, as is excessive speeding. Features like safety belt status, idling, speed violation alerts and

22 41

Special Feature

reports, and kilometers-per-liter/ miles-per-gallon monitoring can not only reduce fuel consumption by 8 to 10 percent, but also reduce overall operating costs by 10 to 20 percent, Whitney said. Unauthorized vehicle use is another source of fuel waste. “GPS tracking provides vehicle movement 24/7, which allows our customers to be alerted if there is movement after hours or at any irregular time of day,” Roberts said. Improved routing is another way to reduce fuel costs so that managers can dispatch drivers more efficiently and reduce overall driving distances. A c c o rd i n g t o a 2 0 11 U S Environment Protection Agency study, failing to properly maintain the engine or check the tires can hurt fuel efficiency. The study indicated that “fixing a car that is out of tune or failed an emission test can improve its gas mileage by an average of 4 percent, while fixing a faulty oxygen sensor can improve mileage by as much as 40 percent.” Engine diagnostics monitoring, including fuel usage and emissions, helps with anticipating and fixing critical vehicle or equipment issues, thus avoiding costly failures or maintenance costs, while keeping engines and fuel performance in optimal conditions, Whitney said. “In the future, these systems will

▲Failing to maintain the engine properly can hurt fuel efficiency.

gather more data from engines through sensors, and then combine that data with predictive statistics to help identify and diagnose potential sources of problems.”

Reduced Labor Cost

Payroll fraud and inefficient use of labor and resources are concerns for fleet managers. “With GPS, telematics reports can be used to track authentic work hours, reducing timesheet and payroll errors,” Lai said. “The system can also indicate

Four Keys to Safety Management 1. Identify high-risk drivers: Those who regularly exceed speed limits, drive aggressively, accumulate complaints and are involved in the most accidents. 2. D rivers need to be coached with safer and more defensive driving techniques; incentives can be offered. 3. Driving patterns and behavior need to be continuously monitored to reinforce behavior on a daily basis. 4. Systems and processes need to be put in place to deal effectively with any accidents that do occur. Source: Fleetmind Solutions

42 22

MAR / APR 2012


if drivers aggregate in a location other than the service yard to take an unauthorized break together. It allows company executives and fleet managers to track vehicles, employees, driving routes and actual hours spent on the job.” When drivers know their behavior and workday profiles are monitored, they behave. “One of our clients’ payroll expenses have decreased by 12 percent with more accurate labor costs,” Roberts said.

Property Loss = Productivity Loss

Landscaping, construction and mining vehicles often transport expensive assets. “When heavy machinery is lost, stolen or missing, it can lead to significant losses for your business,” said Todd Lewis, President of GPS North America. “You face not only the cost of replacing those assets, but also the

Special Feature

lost productivity and customer satisfaction when employees can’t perform as planned.” For instance, a minor scrape in a mine could cost a company millions in revenue. “One of our landscaping customers recovered more than $400,000 worth of vehicles and equipment with our solution,” Roberts said.

Efficient Dispatch

For taxi and limo fleet managers, detailed location and best time-saving route information offer the most value for dispatching vehicles, Whitney said. “Customer satisfaction is also improved due to the ability to track vehicle location and dispatch the nearest vehicle.” For mass-transit buses, it is also important for these vehicles to arrive on time. Through the integration of mobile DVR, GPS, dispatch software, stop announcement system and other onboard electronics, estimated arrival times can be provided to maximize driver efficiency and passenger satisfaction, Zhou said. Fleet managers can see where their vehicles are, and they can automate

processes such as routing, tracking or reporting, Roberts said. Drivers may spend too much time on the road because they do not know the quickest way to their destination. “One customer was able to increase fleet productivity by 35 percent.”

All-in-One Solutions

Rising fuel prices may be a driving force for the adoption of fleet management solutions. “It took years for one of our clients to finally deploy our solution. What made the customer hesitant was that they were not sure if the ROI was positive and how fast the ROI would be gained,” Lai said. Payback periods vary greatly with the execution skill of the fleet manager and the scale of fleets. “In a traditional setting, the functions of DVRs and telematics devices are mutually exclusive; mobile DVRs record while telematics devices track through GPS,” Zhou said. “With increasingly available 3-G networks, telematics devices are gradually replaced by more powerful mobile DVRs since customers no longer invest in two devices with

▲User requirements must be considered for specific fleet types.

44 22

MAR / APR 2012


similar capabilities.” Having a visual recording/transmitting component included with a reliable telematics service provides a layered and comprehensive mobile solution. “Many DVR providers are offering cellular-based tracking services, while numerous GPS providers are working with DVR providers that have adopted an open-system approach with published APIs,” Dilber said. “Due to the extremely fragmented nature of both markets, combined with a relatively closed approach taken by providers, collaboration remains an exception rather than industry norm.” Integration takes time to schedule and develop, Zhou said, since coordination among hardware manufacturers, software developers and clients is required. “The whole process could easily take a couple of months, if not more.” Once integrated, all user-designated events with associated video, audio and metadata are downloaded to a central management system, which allows users to view, grade and respond to events at their convenience. Dilber said. “The central management software can also archive event videos based on user-defined priorities or severity of events, thereby ensuring that visual evidence of critical events is always available.” Amid this economic uncertainty, mobile surveillance and telematics solution providers are advised to look at new service models and solution offerings to stay in business. Safety and efficiency are the core of fleet management and operations. It is financially and operationally sound to think outside the box to better cater to the needs of different fleet types.

a&s Asia MarApr 2012 (Trial Version)  

The No. 1 Security Magazine for Professional Buyers in Asia.