A&S #A153 DEC.2018

Page 1


December 2018

Contents 22

Industry Report

Country Report Compared to neighboring countries such as Singapore and Malaysia, Indonesia’s security market is relatively young. Yet its growth potential isn’t to be ignored amid rising demands.

Finding the Ideal Framework for Smart City Data Sharing Data sharing is an inevitability in smart cities and for city surveillance.

P.16 The Growth of Cold Chain and the Opportunities It Brings The cold chain industry is growing at a rapid pace.

8 12 60 61 63

“The Indonesia security industry has been growing at a rate of 20 percent every year. We’ll be growing at a rapid pace probably until 2023.” Stefanus Ronald, Chairman of the Association of Indonesian Security Systems Industry Indonesia: Security, ITS Demands Soar on Infrastructure, p. 22

4

www.asmag.com

P.42

Editor’s Note Application Cases New Products Show Calendar Companies in This Issue

WEBSITE ARTICLES https://www.asmag.com Singapore Companies Among Least Exposed to Cyber Threats: Poll Singapore is doing well, with a majority of listed companies having little or no exposure to cyber threats.

How Does the End User See Cybersecurity Threats? With an increasing number of malware attacks, end users are forced to remain anxious about data breaches.


Editor’s Note Why You Shouldn’t Ignore Indonesia Among all the emerging countries in the ASEAN region, Indonesia seems to be the one that has a high potential to maintain healthy growth. According to Trading Economics, Indonesia’s annual GDP growth is 5.2 percent in the third quarter of 2018. From 2000 until 2018, the GDP annual growth rate in Indonesia averaged 5.3 percent. By 2030, the country could be the world’s 7th-largest economy, according to McKinsey & Company. Indonesia has an estimated population of 266.7 million, the largest among the Southeast Asian nations. Half of the population are young and around 87.2 percent are Muslim. Indonesian policymakers mostly adopt a “stability over growth” attitude in their banking system, which has further stabilized their currency and economic growth. In this issue, an a&s reporter talked to several Indonesian security experts to get firsthand market information. Thanks to President Joko Widodo’s policies, the country has significantly increased infrastructure spending in order to improve local business and grow smart cities. With the growth of infrastructure projects, the future perspective of the security industry seems to be rosy too. The Indonesian security market is still in the early stages of development, and is expected to grow even further in the future. Besides infrastructure projects, it is also very important to enhance the qualifications of skilled systems integrators. The IP/IT knowledge that goes along with the new installation projects is a must. We think that Indonesia can be elevated to a prime position in the ASEAN region, as long as the President can achieve his goals for the nation.

KEEP IN TOUCH WITH...

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal

EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

Editorial Team

Global Security News Media Platform FOLLOW US:

SENIOR REPORTER WILLIAM PAO

EXECUTIVE EDITOR EMILY LIN

Infrastructure development is in full swing in Indonesia. In particular, US$358 billion in infrastructure investment has been set aside; some 427 kilometers of toll roads have been built between 2014 and 2018; and a $140.8 million flyover roads project is also under way. These projects put Indonesia in a good position to grow security in the years to come.

For many Asian countries, the lack of technology knowledge and expertise serves as a roadblock to industry growth. The more the installers and integrators learn, the more projects they can win, and the more orders a company can get. This is, of course, an oversimplified generalization of the situation. Nonetheless, the importance of education and training in any company strategy cannot be denied.

8

www.asmag.com


Products of the Month

Securing Access With Smart ID Cards and Printing Systems Modern civil, visitor and membership management and access control rely greatly on smart identity cards and card printing systems. To ensure data accuracy, ID cards are no longer simple plastic pieces with profile images, but rather converged access credentials with biometric authentication and secure encryption. Card printers, on the other hand, are protecting against unauthorized usage through advanced technologies like security watermarks and ID registration.

Evolis Zenius Card Printer

D

esigned for single-sided printing of any type of plastic cards, the Zenius card printer generates color or monochrome cards for diverse applications like employee access control badges, membership cards and more. Aiming to reduce its environmental footprint, the Zenius card printer reduces the power consumption of its printers through an economical hibernation mode. It can process images with 300 dpi resolution and edge-to-edge printing.

Key Features • The Evolis Premium Suite software receives notifications and easily controls the printer from a separate computer • Prints cards individually or in small runs • Prints a color card in 30 seconds and up to 150 color cards per hour • Able to combine magnetic encoding, contact and contactless chips

Supplier: Evolis URL: www.evolis.com

Zebra ZC300 Series Card Printer

F

rom corporate offices to retail stores, the ZC300 series is designed to produce identity and access cards to membership and events, printing both single and dual-sided magnetic stripe as well as contactless cards. The card printing process is easy for users with graphical drivers. A visual display of the card allows users to see how the card looks and, if the settings are allocated correctly, eliminates the cost of repeatedly printed test cards.

Key Features • With cover lock to prevent theft of card stock and rejected cards • The snug-fit design of the ribbon leaves no question whether it’s installed correctly or not • Flexible deployment and operation with Wi-Fi connection • Secure protection with printer and host authentication and AES data encryption

Supplier: Zebra Technologies URL: www.zebra.com

Magicard Rio Pro 360 With Holokote Security Watermark

R

io Pro 360 is a desktop ID printer with embedded Linux-based CPU. This LYNK intelligence recognizes USB and Ethernet and can easily be integrated with third-party applications locally or in the cloud. All printed cards are secured by Magicard-patented HoloKote security watermark, which is frosted into the clear protective overcoat layer during the normal print process using standard ribbons and cards. Key Features • Print technology: 300 dpi color dye sublimation, monochrome, thermal rewritable • Feed system: manual and hopper fed • Card capacity: 100 card feeder, 70-card stacker • Applications: school ID, payment, education, access control and more

Supplier: Magicard URL: magicard.com

10

www.asmag.com


AlphaCard PRO 500 ID Card System

A

ble to combine with ID software or web cam for ID photos, the PRO 500 ID card system can print employee badges, student IDs, loyalty cards and more. To increase user friendliness, it features an LED status screen, USB and Ethernet ports, and a Microsoft-certified plug-and-play driver. All cards are protected by AlphaGuard, a hologram-like watermark over a printed card without requiring lamination, specialty cards or any additional supplies, preventing unauthorized ID card duplication.

Key Features • Backed by a 4 year warranty, all PRO series printers include free lifetime AlphaCare support and a full year of AlphaCarePlus • Printing capability: single or dual-sided • Print technology: dye sublimation with AlphaGuard watermark • Print speed: full color, singlesided cards in 35 seconds, monochrome in 7 • Input/output hopper: 100/30

Supplier: AlphaCard URL: www.alphacard.com

DERMALOG Biometric ID Cards

T

he multi-purpose biometric ID cards from DERMALOG can be applied in numerous applications like civil servants cards, health cards, drivers’ licenses, biometric foreign workers cards, or seafarer’s cards. DERMALOG’s Automated Fingerprint Identification System (AFIS) has the ability to identify fingerprints in large-scale biometric databases. Its security algorithm also prevents identity fraud and individuals from trying multiple registrations at the same institution.

Key Features • Works with ZF1+ smart card reader to verify identity by fingerprint and MCU-based card • Database with tenprints, palmprints and latent prints • Runs on all hardware platforms, Windows and Linux • Allows integration of digital photos and signatures

Supplier: DERMALOG Identification Systems URL: www.dermalog.com

Identiv uTrust SmartID Secure Access Credentials

D

esigned for converged access, uTrust MD Smart Cards are Microsoft Minidriver-compatible, PKI-based credentials designed for diverse security applications and digital certificates. The Identiv smart cards come equipped with on-card software and compatible drivers, and are preinitialized with the required keys and settings needed enable plug-and-play converged access.

Key Features • Compatible with Minidriver supports like VPN, Outlook email signing and encryption, secure web access and more • Variants: uTrust V1.0 80K MD contact smart card with 125 KHz proximity and uTrust V1.0 80K MD dual smart card with MIFARE classic 1K and 125 KHz proximity • Supported specifications: Microsoft Smart Card Minidriver, Java Card and Global Platform • Processor: NXP SmartMX with PKI crypto processor

HID Crescendo Smart Cards

C

Supplier: Identiv URL: www.identiv.com

rescendo is a family of credit card-sized smart cards designed to provide secure IT and physical access control with strong authentication and data protection. Crescendo enables access to applications like PKI-based authentication, digital signature and data encryption. Cards are supported by ActivID Applet Suite, offering secure storage for cryptographic keys, associated digital certificates and personal information. Key Features • Available as hybrid or dual interface cards; SIM punch out option also available • Optimized platform design with automatic memory defragmentation and secure memory management • HID Crescendo app simplifies secure issuance of credentials • Common Criteria EAL 5+ or FIPS 140-2 certified smart card chip

Supplier: HID Global www.hidglobal.com

11


News Feature

Singapore Takes the Lead in Smart City Development Singapore was recognized for the city state’s initiatives and projects in urban innovation and industry transformation. BY the a&s Editorial Team

S

ingapore earned the “Smart City of 2018” title at the Smart City Expo World Congress held in Barcelona. The range of solutions developed include dynamic public bus routing algorithms, real-time parentteacher portals and predictive analytics for water pipe leaks, according to the event organizer. “Singapore’s Smart Nation efforts are about the transformation of our country, through technology,” said Janil Puthucheary, Singaporean Senior Minister of State, Ministry of Transport and Ministry of Communications and Information. “We look forward to working with other cities to make all our cities smart together.” Asia now makes up half of the world’s population, and the share is forecast to rise to 64 percent by 2050. According to a United Nations report, two-thirds of the world’s population will live in urban areas by 2050, with Asia being the fastest-growing continent along with Africa. Establishing efficient cities to accommodate the rising population is therefore a critical task for local governments in the region.

Focus on Transportation Sector The Singapore government has partnered with conglomerate ST Engineering on several smart mobility projects, ranging from smart street lighting, rail enterprise asset management and autonomous bus network development. In addition, a new checkpoint scanning system has been installed to detect concealed items in the bus more quickly. It had been a time-consuming task when the check had to be done manually by officers. Now, the officers can carry out more targeted checks on specific parts on the bus, according to local media The Business Times. At the airport, a more advanced security check mechanism will also be installed. A biometrics

“Establishing efficient cities to accommodate the rising population is a critical task for local governments.” system with facial and iris identification capabilities may soon replace fingerprint scanning. The embedded liveness technology is able to verify if the biometrics come from a real person or an image. Singapore is also helping Vietnam in its smart city initiatives. ST Engineering and Keppel Urban Solutions, both Singaporebased, are working on a 64-hectare development called Saigon Sports City, which is envisaged to be Vietnam’s first one-stop sports,

entertainment and lifestyle hub. IoT technologies considered for implementation include smart street lighting, smart security management, autonomous vehicles and mobile robots, drone network solutions, and smart environment monitoring. Microsoft is also participating in the project. The company will provide smart urban applications using sensing and IoT technologies to help manage infrastructure and community services.

APPLICATION CASES Public Infrastructure BOSCH EQUIPS SEA-CROSSING BRIDGE The Hong Kong-Zhuhai-Macao Bridge directly connects Hong Kong to Macao and then to Zhuhai for the first time. Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms, as well as public address and voice evacuation systems. On the island between Zhuhai and Macao, Bosch partner Shanghai SAGA Electronic Technology installed more than 5,700 Bosch loudspeakers and over 260 amplifiers which are all managed via the PRAESIDEO digital public address and emergency sound system. On the island outside of Hong Kong, Bosch partner Pro-United installed 2,200 public address speakers of various models. Experts also adjusted 200 vari-directional array loudspeakers to balance sound variations. Bosch also covered the island with more than 2,000 HD cameras including the FLEXIDOME, DINION and AUTODOME series. The PRAESIDEO systems on both islands enable live voice announcements via security call points, while multiple sets of intrusion alarm systems protect personnel and property.

12

www.asmag.com

62.8 billion

$

Online APAC hotel bookings to reach US$62.8 billion by 2020.

Source: Phocuswright


a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.

Thailand Launches Smart Grid Pilot Project The Thai government kickstarted the project aimed at making use of renewable energy. BY the a&s Editorial Team

I

U.S. Promises Support At a summit held yesterday with Southeast Asian countries in Singapore, U.S. Vice President Mike Pence announced a new “U.S.-ASEAN Smart Cities Partnership,” pledging America’s support for the region’s digital and urban infrastructure development. With the renewed investment by Trump administration, American companies may have the opportunity to launch products and services relating to payment mechanisms and smart transit systems.

n late October, the stateowned utility provider Electricity Generating Authority of Thailand (EGAT) signed a Memorandum of Understanding with the state enterprise Provincial Electricity Authority (PEA), with the aim of studying technical aspects of the smart grid in Mae Hong Son province. EGAT, which is under Thailand’s Ministry of Energy, is responsible for electric power generation and transmission for the whole country as well as bulk electric energy sales. Based on a feasibility study by Chulalongkorn University, the province is suitable for the application of smart grid technology to enhance generation and distribution systems, since there are no large power plants in the area and cannot be connected by high-voltage transmission lines. Power supply in the province currently relies on PEA’s 115 kV and 22 kV transmission lines, a diesel power plant, a solar power plant and hydropower plants. EGAT and PEA will set a technical working group for studying details in four aspects, namely 1) the battery energy storage system (BESS) linkage to PEA distribution system in Mae Hong Son Province as well as determining the working of BESS in islanding mode status; 2) related preventive and control systems in Mae Hong Son province to support the transition from grid connection to islanding mode; 3) data exchanging including the protocol for communication, connection point and data applying for improving the working process; 4) test and control of the smart grid system, such as islanding mode, BESS connection and proposing guidance for developing the system potential suitable for the local area. The Smart Grid Pilot Project will run on EGAT’s system, which will store and collect data from generation and distribution systems as well as consumer behavior data from PEA. The main grid and renewable energy sources will be integrated to maintain the stability of the system. The Smart Grid Pilot Project was implemented in accordance with Thailand’s Smart Grid Master Plan, a five-year plan signed off in 2016, according to EGAT’s Deputy Governor of Strategy Patana Sangsriroujana.

NEC to Provide Facial Recognition at Narita Airport NEC announced that it has received an order from Japan Customs for an electronic customs procedure gate featuring facial recognition for use at the customs inspection area at Japan’s busiest international airport. BY NEC

D

emonstration trials of the electronic customs procedure gate are scheduled to begin at Terminal 3 of Narita International Airport from April 2019. This will be the first time that facial recognition technology is used for customs procedures at an airport in Japan. The electronic procedure gate will be installed at the customs inspection area where passengers proceed to after being admitted through immigration. Travelers’ identities will be confirmed at a kiosk terminal (electronic declaration terminal) and at an exit gate equipped with NEC’s facial recognition technology. Furthermore, a smartphone application will facilitate electronic baggage declaration by enabling travelers to register baggage contents and passport information. These methods are expected to reduce passenger stress by relieving congestion and shortening waiting time in the customs inspection area. The facial image taken at the electronic procedure gate is only used for identification purposes and is deleted in an appropriate manner after use. “NEC regards its safety business and the ‘NEC Safer Cities’ campaign as keys to expanding and enhancing its global business,” said Ryouji Hayashi, Senior VP at NEC. “NEC has already provided biometric identification systems, including facial recognition, to approximately 50 airports around the world, and we look forward to capitalizing on this experience and know-how to contribute further to the security and safety of social infrastructure everywhere.”

Hospitality HOTEL OPENS DOORS WITH ASSA ABLOY HOSPITALITY mi-pad Queenstown, a newly opened property in New Zealand, has bolstered its reputation as the country’s first smart hotel with the implementation of ASSA ABLOY Hospitality Mobile Access. Installed along with VingCard Allure door locks, the digital key platform allows guests to use personal smart devices as a room key. With ASSA ABLOY Hospitality Mobile Access, guests can also go straight to their guestroom from the moment that the assigned room number and digital key details are transmitted. The lock eliminates the need for external hardware by providing a sleek and interactive LED panel adjacent to the door. The integration of ASSA ABLOY Hospitality Mobile Access into mi-pad’s mia app joins other functionalities that guests can control via their personal mobile device. This includes the ability to control thermostat and lighting settings as well as the option to check in or out without having to first visit the front desk.

13


Industry Report Data sharing is an inevitability in smart cities and for city surveillance. While finding the “ideal� data sharing framework may be a challenge, with cooperation from all parties involved it can be done for the benefit of everyone.

Finding the Ideal Framework for

Smart City Data Sharing BY Eifeh Strom, Freelancer

16

S

mart cities have been made possible because of the Internet of Things. This has resulted in an abundance of data, most of which goes unused. Implementing a strong data sharing framework for smart cities to share data between various entities (e.g., government agencies, businesses, residents, etc.) will allow cities to become smarter, safer and more efficient. When it comes to city surveillance, data sharing

www.asmag.com

has become an important aspect of ensuring that all relevant parties are provided with the necessary information. Privacy concerns and government regulations, however, can pose obstacles. By working with regulations and ensuring accountability, smart cities could implement a data sharing framework that benefits residents, businesses and the city as a whole.


The “Ideal” Framework

In smart cities, the ideal data sharing framework for video surveillance is built to serve both the smart city ecosystem and its stakeholders. These stakeholders range from the various government agencies and the entities operating within to the businesses, communities and residents of the city. The framework should allow each stakeholder to remain in command and control of their group’s data. At the same time, the framework needs to connect the various disparate systems that span these stakeholders. “In a smart city a data sharing framework must have built-in, secure and traceable permissions that allow the owner(s) to share different silos of data, based on the agency or person accessing that data. Access to all shared data must be traceable for audit, with full transparency to all parties that ‘touched’ the data, when, and under what authority,” said Giovanni Gaccione, Justice and Public Safety Practice Lead at Genetec. It is important that every municipal entity has a policy across all departments with input and guidance from all departments (e.g., fire, traffic, police, water, etc.), advised Stuart Rawling, Director of Segment Marketing at Pelco by Schneider Electric. “These departments must have an aligned understanding of data sharing and legal implications both internally and externally. Best practices should start with a white list of data that’s acceptable to share (such as basic physical appearance of crime suspects) rather than a black list of data that’s unacceptable (such as a Social Security number). This way the default is to not share or leak data that might be subjectively deemed not sensitive, but later could prove to be just that,” he said. Ron Grinfeld, Global Marketing Business Development for Enterprise Security at FLIR Systems, suggested an API-centric design that allows data integration not only with newly implemented digital/data-driven systems, but also with legacy systems. Furthermore, an ideal framework must also support large scale, high bandwidth, sensorgenerated data streams, and allow both public and private data sharing. “The framework should be scalable beyond the traditional city-level users and allow support for new

pVideo surveillance data sharing can have a positive impact on city surveillance, enabling multi-system integration and use of complementary technologies such as video analytics. Image Source: CNL Software

classes of value creators and stakeholders,” he added. Intelligent security devices, according to Fan Yang, Vertical Solutions Manager at Hikvision Digital Technology, play an important role in smart cities in capturing key targets and information. These devices send the data to the backend to be analyzed and are stored in a video structured data pool. “This valuable data will be converged on-demand to different application systems of a smart city, such as city traffic, public security, city management, environmental governance, etc.” In terms of video surveillance, since video is converted to data and then further fused with algorithms, which are then applied in different businesses, Yang pointed out that this data could eventually help with intelligent operations, management and service delivery. “Therefore, an indispensable component of an ideal framework should include AI-powered intelligent devices to capture information, and a center for data analysis and storage, and an open application system for data sharing,” he added.

Giovanni Gaccione, Justice and Public Safety Practice Lead, Genetec

Ron Grinfeld, Global Marketing Business Development, Enterprise Security, FLIR Systems

Challenges in Finding the “Ideal”

Regulations at the federal, state and local levels can all pose challenges to

Adlan Hussain, VP, Marketing, CNL Software

17


Country Report

Infrastructure Development in Indonesia US$358 billion in infrastructure investment under medium-term development plan.

When fully operational, the Jakarta MRT can transport about 450,000 passengers per day.

The $140.8 million flyover roads project in Jakarta adds 7 kilometers of roadways above existing infrastructure. Source: Indonesia Investments

Compared to neighboring countries such as Singapore and Malaysia, Indonesia’s security market is relatively young. Yet its growth potential isn’t to be ignored amid rising demands. In particular, the government’s infrastructure development efforts, from metro constructions to the building of highways that better link different parts of Indonesia together, are expected to drive security and intelligent transportation system (ITS) applications in the years to come. BY William Pao

22

www.asmag.com


I

ndonesia’s security industry is still at a relatively early stage but is showing great promise. In the past, security was viewed as a luxury item for the well-to-do, but more and more, end users from all segments of the market are ser iously looking at it. This puts Indonesia’s security industry in a good position to grow. “Before, only wealthy people can afford security equipment for their premises. But nowadays, security equipment is getting cheaper, and such systems have become more affordable,” said Alfred Bisuk, Director of Lamjaya Inovasi Komputindo, a distributor of Geutebruck products. “As far as security is concerned, Indonesia is well below Singapore. The distance between the two countries is not so far, but security is,” said Daniel Eka Saputra, Account Manager at Prima Inovasi Teknology, a distributor of Hikvision Digital Technology. “So, Indonesia security is relatively young, and its growth potential is big.”

“The Indonesia security industry has been growing at a rate of 20 percent every year. We’ll be growing at a rapid pace probably until 2023.” Stefanus Ronald, Chairman, Association of Indonesian Security Systems Industry

23


Product Exploration

Mobile Biometric Devices Provide Authentication on the Go Mobile biometric devices are making it easier for law enforcement and border patrol agents to identify and authenticate persons in the field and on the go. BY Eifeh Strom, Freelancer

M

obile biometrics has become a norm in today’s world. With all major smartphone manufacturers incorporating fingerprint scanners into their phones now, society has gotten used to using biometric data for identification and authentication on a daily basis. Yet, when it comes to law enforcement or border control using biometric data the discussion gets more complicated. Still, the mobile biometrics market is quickly expanding and it is forecast to reach US$49.3 billion by 2022, according to a report by MarketsandMarkets. Growth is attributed to the growing penetration of mobile devices and increase in mobile transactions. Additionally, advances in battery and camera technology are also contributing to the development of better mobile biometric devices. For law enforcement and border control agencies, the use of mobile biometric

30

www.asmag.com

devices is experiencing significant g r ow t h . I t s a b i l i t y t o p r ov i d e a convenient and secure way to identify persons at anytime, anywhere is not only contributing to public safety and security, but is also increasing effectiveness and efficiency.

How It’s Being Used

Today, more and more people are on the move. Mass migrations as a result of geopolitical instability and economic


Multimodal Mobile Biometrics Increase Efficiency in the Field

The use of one biometric identifier to authenticate a person’s identity generally yields a high accuracy. Using multimodal biometrics further improves accuracy as well as security. The use of fingerprints by law enforcement and border control to identify and authenticate persons has become a norm. But for a more accurate and secure method, these agencies are now starting to use multimodal biometrics. “The use of multimodal biometric handheld devices is currently one of the most important trends in the industry,” said Gunther Mull, CEO of Dermalog. “Simultaneous checking of several biometric features increases the accuracy of biometric systems. By now, numerous devices can perform a multimodal identification.” Fingerprint and facial recognition is the common combination for multimodal biometric authentication. This is mostly due to the fact that biometric databases most often collect fingerprint and face data. In terms of mobile devices, “Most of the time, mobile biometric devices offer fingerprint capture and facial recognition using the camera autofocus of the device and specific facial recognition algorithms,” added Jacky Lecuivre, CEO of Coppernic. In the field, the use of multimodal biometric devices greatly benefits both law enforcement and border control agents. “In law enforcement, for example anti-narcotics, it has proven useful to incorporate multiple modalities to facilitate the processing of subjects,” explained John Hinmon, VP for Global Marketing of Crossmatch. “A drug house is raided and 20 individuals are detained, virtually all with no or falsified documentation. Officers can quickly fingerprint and take mugshots of each using a multimodal device, creating a comprehensive digital record for each subject for reference.” Hinmon also explained how multimodal biometric devices can be used for border control. “Rather than taking time to unload a coach or train at the border, a handheld device could be used by border agents as they move through the coach or car,” he said. “If they encounter something suspicious, they may require a fingerprint for exception processing. While the smart device being utilized could contain a camera, it may not be utilized in the workflow. It would be more likely that the device would incorporate or have a peripheral MRZ reader to process the passport.”

hardships, increased tourism, and more globally integrated business models are highlighting the need for more effective and efficient identity management solutions. Identity management is being made easier with the deployment of biometric electronic documents and biometric databases such as automated fingerprint identification systems (AFIS) and automated biometric identification systems (ABIS). “The biometric verification is now accessible in mobility, this is for electronic ID document control and/or to perform biometrics verification to the AFIS/ABIS,” said

Rémi Guidet, Marketing Director for Identification Solutions at Gemalto. The usefulness of being able to identify persons on the spot is even more evident on the border where there are multiple border points of entry covering sea, land and air. “Not all border locations are conducive to disembarkation, have appropriate fix screening infrastructure or are set up for volume surges,” said John Hinmon,

31


Special Feature

Pushing Boundaries With More Advanced

Perimeter Secu The perimeter security market is steadily growing due to the threat of terrorism. As technology for perimeter protection equipment advances, security operators are able to detect more than before. BY Eifeh Strom, Freelancer

P

erimeter security has come a long way from simple fences installed around the outer bounds of a premises. As a market, growth has been steady due to increased terror threats globally. The perimeter security market is expected to reach US$196.6 billion by 2022, up from $110.6 billion in 2017, at a compound annual growth rate (CAGR) of 12.2 percent between 2017 and 2022, according to a report by MarketsandMarkets. Market growth is primarily attributed

36

www.asmag.com

to the rise in terror attacks worldwide. Increasing technological developments in video surveillance are also fueling the demand for perimeter security systems and services, as is the increased usage of the Internet of Things (IoT) and smart technologies.


urity

How Plug-and-Play Systems are Making Perimeter Security More Accessible Obstacles to the adoption of new technologies can often be attributed to price and over complex installation. With plug-and-play solutions, more verticals are deploying perimeter security systems.

F

rom RBtec’s point of view, the change from systems that are custom, expensive, complicated to install and expensive to maintain to plug-and-play, cost effective systems that require no experience, certification or training to use and no maintenance is one of the biggest trends in the global perimeter security market, according to Dori Ribak the company’s VP of Marketing. “For example a self-storage facility or a dealership five years ago who would experience constant break-ins and people cutting the fence did not have the means to deal with the problem. They would have to compromise on IR beams that constantly produced false alarms from vegetation, weather and animals or had to try and solve the problem with cameras that usually showed them a guy in a hoodie with a stolen vehicle (or cheap analytics that false alarms when it rains),” Ribak said. Now, with simple fence alarm sensor cable kits, like ones offered by RBtec, security operators previously unable to afford or lacking technical capability now have access. “These kits can be purchased from standard distributors like ADI and Anixter where most security integrators go to buy their other equipment,” Ribak said. “This helps to simplify the process for premises like the self-storage facility, who can now go to his security guy and ask them to add intrusion detection to its fence and connect it to his existing burglar alarm system. Furthermore, an integrator that has never done perimeter security in his life can easily buy the system and install it without worrying about his ability to deliver a good working system,” he added.

In North America, which is expected to hold the largest share of the global market, an increase in terrorist activities, illegal immigration and criminal activities are the biggest factors dr iving per imeter security market growth, according to

MarketsandMarkets. Dori Ribak, VP of Marketing at RBtec Perimeter Security Systems, also pointed to a rise in crime, theft and vandalism in the commercial and industrial markets in North America. He attributes this to less available police, which forces businesses to protect themselves without relying on the police to help or stop crimes. The fastest growing region for the perimeter security market, however, is APAC. This is a result of economic development in terms of infrastructure (e.g., airports,

37


Industry Report

The Grow

ColdOppo C

The cold chain market was valued at US$147.6 billion in 2017.

42

www.asmag.com


wth of

Chain and the ortunities It Brings The cold chain industry is growing at a rapid pace, thanks to the increased need to transport perishable goods like food and medicine. For solution providers in this sector, opportunities are several. However, they need to have a clear understanding of the pain points to make a real difference. BY Prasanth Aby Thomas, Freelancer

A

s countries worldwide increasingly realize the importance of maintaining robust trade links with each other and the technological developments that can assist them in it, trade volumes are on the rise. According to data from the World Trade Organization (WTO), merchandise trade volume is expected to rise 4.4 percent in 2018, almost as much as the 4.7 percent increase recorded in 2017. Growth could ease a bit to 4 percent in the coming year but will remain firmly above levels recorded during the financial crisis. The cold chain market, one of the major components of global trade, was valued at US$147.6 billion in 2017 and is expected to grow at a CAGR of 15 percent from 2018 to 2025, according to Grand View Research. The increased presence of connected devices and automation of refrigerated warehouses is considered some of the major factors fueling this growth. The growth figures mentioned above include statistics from different sectors, including food and medicine. Speaking specifically on the latter, Mark Sawicki, Chief Commercial Officer of Cryoport, said that

according to recent reports, the total global sales year to date for biologic products and drugs has exceeded $300 billion. “The specialized global logistics solutions for these products are forecast to reach approximately $15 billion by the end of 2018 and grow to $18 billion by 2022,” Sawicki said. “We agree with the estimates and see a growing demand for our products and for the industry.” Not all industry experts are, however, convinced that the growth could rise at the rapid pace that is projected. This is not because of a lack of demand. In fact, the demand is strong but the infrastructural support to meet the demand may still be at a nascent stage in certain parts of the world. For Alvis Lazarus, CEO of Hesol Consulting, who spoke specifically about the Indian market, the outlook shows strong potential, but the reality is slightly different. “With the current outlook, cold chain industry could easily be a winner, but it isn’t yet,” Lazarus said. “Though the demand is so promising, the means to cope up with that demand is still very fragile.” Naturally, the more products that require

Alvis Lazarus, CEO, Hesol Consulting

Till Krenzien, Principal, Competence Field Engineering and Implementation, Miebach Consulting

43


Technology

LoRa (short for Long Range) is regarded as an emerging standard of Low Power, Wide Area Networks (LPWAN) technology in the IoT space due to its long range, extended battery life, network capacity and low cost. The LoRaWAN network protocol is designed for low power applications like wireless battery operated end devices. BY the a&s Editorial Team

A

ccording to Berg Insight, LoRa is gaining momentum as a global connectivity platform for IoT devices. The research firm predicts annual shipments will grow at a compound annual growth rate (CAGR) of 31.6 percent to reach 89.1 million units between 2017 and 2023. According to a research report by IHS Markit, LoRa has been dominating the LPWA private network deployment. The report says LoRa is expected to remain the leader by a significant margin over the next several years mainly due to its early lead, diverse applications and widespread regional deployment. Figures show that the shipment of LoRa nodes reached over 32 million in 2017. This number is expected to surpass 57 million in 2018 and 350 million in 2022. LoRa is considered to be “the Wi-Fi of LPWAN,” a position that would make it the de facto choice

48

www.asmag.com

LoRa

Gaining Traction in

for many LPWAN IoT deployments. The technology has been widely used in industrial applications like smart metering, agriculture, parking, lighting and asset tracking. Building and home applications are considered to be emerging sectors. Adarsh Krishnan, Principal Analyst at tech market-foresight advisory firm ABI Research, said, “We are still witnessing early stages in the development of vertical market solutions


Smart Home and Building especially around smart home and building automation solutions.� He observed that LoRaWAN-based smart home solutions like home monitoring and intelligent building management systems are starting to gain traction in the market. Those applications require lots of sensors to sense the environment and collect data for a long time. Therefore, LoRa can provide an immediate and predictive return on investment (ROI).

Semtech, the provider who first rolled out LoRa technology and a founding member of LoRa Alliance, has seen the growth of LoRaWAN deployment worldwide. “Good adoptions available with operators in Europe, Australia

49


Viewpoint

Korean Security

Strategizes to Counter Chinese Competition

a&s recently conducted a series of interviews with Korean companies to gain a better understanding of the security manufacturing landscape in Korea.

T

he Chinese manufacturers’ economies of scale and low margins have made competition in mass market products extremely difficult. However, recent trade tensions between the U.S. and China has spurred discussions on whether Taiwanese and Korean manufacturers, both previous powerhouses in surveillance manufacturing, will enjoy a boon in sales. Though some of our interviewees did comment that the ongoing trade war could be an opportunity for Koreans to gain back market share, Most companies we’ve talked to said it will not have any impact on their business. Therefore, Korean companies are moving to differentiate and grow in the market through various strategies, such as strengthening their brand offerings, focusing on relatively niche markets and expanding their reach into other lucrative markets as well. By actively seeking expansion opportunities in overseas markets, Korean companies are positioning themselves as ready alternatives to Chinese products. BY the a&s Editorial Team

54

www.asmag.com

Building a Global Brand

Companies like Commax, IDIS and Suprema are good examples of Korean companies that have continued to expand globally while developing their branded offerings.

IoT and Smart Home

Video door phone manufacturer Commax has been expanding its footprint overseas and developing its smart home product line. Currently, its main overseas market is in the Middle East, followed by Asia, U.S. and European countries, with a strong focus on the residential vertical, specifically single house and multi-tenant communities. The company’s strong presence in the Korean domestic market gives it the backing it needs to continue developing and selling its new smart home IoT products. Looking forward, IoT will remain the company’s future focus. At the moment, the company sells IoT-connected products that use the video door phone as the main control interface and sensors like gas detectors, motion


detectors, alarms and cameras. “We see two main trends: the first is that control of the systems are moving to mobile phones, and the second is the availability of AI. We are now working with companies like Google and IBM to use AI to manage the house for you in a ‘tailored’ and more energy-efficient way,” said Kisang Lee, Marketing Director for Commax. “With the goal of delivering value that users can actually feel, We at Commax use our imagination to develop products for a more convenient and safer home, with a wide range of smart living solutions built around it. Our concept of the smart home goes beyond just the physical space of a house. We want to connect technologies and expand services so that even local-based convenience services and functions can be easily used at home,” said Lee.

Critical Failover Capabilities and Cybersecurity

“A f e w y e a r s a g o , I D I S embarked on a mission to build a global video surveillance brand and this effor t has started bearing fruit. Our branded business has grown over 50 percent per year in the last two years. Most of the growth originated in Europe, and the company’s global footprint has expanded, growing from 15

partners to 58 global partners,” said Joon Jun, Executive VP at IDIS. In Asia, the company has established a good network in Singapore, Indonesia, the Philippines and Japan, and is now looking for partners in Malaysia, Vietnam and Thailand. Although IDIS still maintains its ODM business, this part of the company operates selectively, with a preference for high level ODM projects. Joon sees system reliability and cybersecurity as main key points that are critical to integrators and end users. “I believe IDIS’ critical failover capabilities and cybersecurity give us an advantage over Chinese products.” Looking into the future, IDIS is focused on the development of its own deep learning analytics. “Video analytics will become a strong offering for us in the next five years. This is still a virgin market that is now ‘re-starting.’ Video analytics has already been present for years, but their low accuracy has led to low adoption due to many false alarms. Deep learning can help mitigate this and we are planning on launching the next version during the next ISC West,” added Joon.

Complete Access Control Solution

Joon Jun, Executive VP, IDIS

Korean biometrics company Suprema has been focused on expanding its product offerings beyond biometric readers to offer a complete access control solution. “Growth has been even across the world, ranging between 10 to 15 percent. The Middle East and Europe are very strong in several verticals Andy Ahn, Head of Marketing, like constr uction, time and Suprema attendance, health care and data centers,” explained Andy Ahn, Head of Marketing for Suprema. The growth has also prompted Suprema to expand its partner network, looking for bigger distributors and integrators that can support its growth across the world. “There is a growing demand for facial recognition and mobile credentials. Resistance to biometrics is lower now since people are used to the concept of biometrics to unlock their smartphones and therefore acceptance is growing,” added Ahn.

55


Viewpoint

Guide to the Indian Market:

Know the Major Security SIs Given the large size and complex nature of the Indian market, many foreign manufacturers find it difficult to identify major players in the field. Identifying systems integrators (SIs) who hold the largest market share is critical when considering partnerships.

I

n this article, we spoke to some of the top SIs in the country about their target markets and how they see the market conditions. As physical security increasingly becomes a cybersecurity concern, opinions from a cybersecurity services provider were also found relevant.

Johnson Controls India

Johnson Controls is a global diversified technology and multi-industrial leader serving a wide range of customers in more than 150 countries. With over 120,000 employees, the company creates intelligent buildings, efficient energy solutions, integrated infrastructure and next-generation transportation systems that work seamlessly together to deliver on the promise of smart cities and communities. “Our key focused segments include such as industrial, commercial, data centers, metros, airports, hospitals, hotels, convention centers, retail and infrastructure,” said Shrikant Bapat, GM for Building Technologies and Solutions at Johnson Controls India. “Johnson Controls has products and solutions to cater to the above segments, which is helping us to be preferred choice for our customers. Our products include

58

www.asmag.com

BY Prasanth Aby Thomas, Freelancer

a complete range for air conditioning, fire detection and suppression, building automation, safety and security, adaptive traffic and IoT-based solutions, which meets customer needs.” “In addition to our products and solutions, we also have very strong project management and execution capabilities including operations, engineering, and services,” he continued. “We partner with our customers during the entire life cycle of a project, starting from plan and design to build to operate and monitor to retrofit and replace.” Elaborating further on this with an example, Bapat said that Johnson Controls can provide master system integration large security projects, specifically infrastructure projects that require advanced solutions such as situational awareness.

ASG Security India

Part of the Singapore-based Ademco Security Group, ASG Security India ranks itself among the top five security SIs in the country. The company operates PAN India with its offices in various parts in the country, to design, deliver and maintain security, access control and fire safety systems. Speaking to asmag.com, Shantanu Talegaonkar, MD of the company,


said that their major clients include multinational companies from various verticals like manufacturing, IT + ITES and R&D centers, health care, and hospitality; both Indian and international, along with banking sector. However, while these would appear to be verticals that a typical large SI would support, what makes ASG Security India interesting, is the potential it sees in a relatively new sector. “We are focusing on this latest, upcoming vertical, which is coworking spaces,” Talegaonkar said. “This is currently one of the biggest verticals for us, and one of the biggest coworking space companies, WeWork, is being supported by us exclusively across the country.” ASG also has other clients that may be considered non-traditional. Uber for instance, which heavily relies on its technological prowess, is one among them. Talking about these kinds of clients, Talegaonkar indicated that as a leading SI company — ASG is interested and capable of offering newer, integrated technologies based on unified platforms, cloud technologies and not just the conventional clientserver systems. ASG is also working with various partners in IoT and smart city solutions and continues to look at latest technologies in these areas. This is a key point that foreign manufacturers who would like to enter the Indian market at this stage would benefit from. Talegaonkar, who opines that now is a great time for global players to enter the Indian market, suggests targeting upcoming verticals like coworking spaces, IoT and smart city projects and even organizations that would require their legacy systems replaced. Unlike verticals like hospitality, which are highly saturated, these new sectors have more potential.

Intsys Technologies

With almost 15 years of experience in

Ajay Baliga, Director and Co-Founder, Intsys Technologies

Shrikant Bapat, GM, Building Technologies and Solutions, Johnson Controls India

the country, the Mumbai-based Intsys Technologies has had customers from verticals ranging from e-commerce to retail. Speaking on the major focus verticals, Ajay Baliga, Director and Co-Founder of the company, said that given that the Indian government is currently promoting local production with the “Make in India” initiative, manufacturing would be a key vertical to focus on now and in the coming years. “Other verticals include logistics and warehousing,” Baliga said. “E-retail is just picking up in India, and there is quite a while to go before the majority of the people would prefer the likes of Amazon or Flipkart [a local e-retailer, recently bought by Walmart]. But when this happens, there will be a major need for more warehouses and logistics services.” Speaking of products and their availability in India, Baliga is of the opinion that the market is struggling to deal with non-standardized “me too” products. Now, for a new entrant to the Indian market, an already saturated sector would seem overwhelming. This could pave way for more mergers and acquisitions, according to Baliga.

Tech Mahindra

Rajiv Singh, Head of Cybersecurity, Tech Mahindra

Shantanu Talegaonkar, MD, ASG Security India

One of the major success stories in the Indian IT sector, Tech Mahindra has its fingers in a number of pies. Integration of technologies and cybersecurity are key focus areas for the company, which works with various partners when it comes to physical security systems and automation solutions. Rajiv Singh, Head of Cybersecurity at Tech Mahindra, emphasizes on end-to-end security that ensures their customers have peace of mind as far as cybersecurity is concerned. Regardless of the kind of device, from cameras to IoT-enabled solutions, everything needs to be integrated. “We do see people buying a lot of the latest technologies but do not realize the importance of integrating them with legacy systems,” Singh said. “This is a process that could lead to a failed IT ecosystem.” That it is a good time for global manufacturers to enter the Indian market is clear. As we can see, SIs in the country remain optimistic about new entrants as long as they come up with innovative solutions and robust support. However, manufacturers need to understand the nitty-gritty of working in a multi-cultural environment. In India, each region could be as different as a different country. Learning the necessities of each region is crucial to survival.

59


asmag.com PRODUCT FOCUS To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact as-pr@newera.messefrankfurt.com

New Products Oncam Evolution ExD

Aiphone IX2

Pelco GFC Professional 4K

MACE Smart Slim Mobile Access Control Reader

Oncam/U.K. Key Features • 360-degree explosive environment cameras • Features 12 MP Sony Exmor R sensor and 5 MP CMOS sensor • Supports 7 different models for indoor, outdoor and extreme outdoor applications • Designed for use in potentially explosive atmospheres, harsh and hazardous environmental conditions; suited for applications in offshore and onshore environments • Features IP66, IP67 and IP68 ratings • Adopts stainless steel 316L material, making the housing resistant to harsh environmental conditions Email: sales@oncamgrandeye.com

Pelco by Schneider Electric/U.S. Key Features • Up to 4K/8 MP resolution in 30 fps: up to four times the resolution of 1080p • H.265 video coding and Pelco smart compression • 100dB True Wide Dynamic Range (WDR) • Built-in IR illuminator produces detailed images in zero light; the adaptive IR Illuminator avoids overexposure that can hinder detection • Motorized lens with P-Iris • IK10, IP66 rating and metal construction: Both indoor and outdoor cameras are rugged, vandal resistant and waterproof Email: sanah@growswyft.com

Hanwha Wisenet P

Hanwha Techwin/Korea Key Features • Features 150dB WDR • IK10 vandal and IP66 weather resistant • With a Gyro sensor to offer accurate stabilization when a camera is disturbed by wind or vibrations • 5 built-in SD card slots • Lens Distortion Correction (LDC) compensates for the image distortion that can occur with wide angle lenses • Supports H.264, H.265 and MJPEG compression • With 4 exchangeable lens modules • Captures 360-degree images of up to 20 MP resolution Email: customerservice@hanwha.com

FLIR Elara FB-Series ID

FLIR Systems/U.S. Key Features • Thermal security camera with onboard analytics to classify human or vehicular intrusions • Ideal for perimeter intrusion detection and sterile-zone monitoring • Features low false alarm rates in challenging environments, bad weather and complete darkness • Hand-off targets to autonomous PTZ tracking cameras • Offers plug-and-play compatibility with major video management systems using hybrid, IP and analog outputs Email: mv-sales@flir.com

60

www.asmag.com

Aiphone/Japan Key Features • 7-inch handset with a touchscreen and ONVIF compatibility • Hands-free touch screen monitors • Supports picture in picture video to show the door station camera and an overhead camera simultaneously • Video intercom between master monitors • Audio and video SIP integration with Cisco IP phone systems • SD card slots on panels and monitors enable video and audio data to be recorded and backed-up Email: info@aiphone.com

Nedap Identification Systems/Netherlands Key Features • Enables use of smartphones to identify people • Supports NFC, Bluetooth low energy and smartcard technology • Elegant, mullion mountable design • Operates with any access control system • Combines convenience and security • Able to read virtual credentials on smartphones and conventional smartcards Email: identification@nedap.com

Navis Paddle

Yale/U.S. Key Features • Convenient access for high traffic areas, elderly family members, young children • Simple to install with screwdriver and allen wrench • Backset 2-3/8” to 2-3/4” adjustable (round corner) • Push or pull to operate • Fits standard doors • Concealed screws • Reversible handing • ADA compliant • Door thickness: 1-3/8” to 1-3/4” • 2-1/8” face bore • 1” edge bore • Latch face 1” x 2-1/4” Email: amy@praytellagency.com

OPTEX REDSCAN RLS-3060 series

OPTEX/U.K. Key Features • Features long-range, 190 degrees 2D LiDAR series • Shape of the detection area can be customized to the layout of the site • Supports area allocation, area masking function to precisely define a number of independent detection zones • Features indoor/outdoor loitering detection mode • Supports detection range expansion mode to 50 m radius Email: asimmons@gravitylondon.com

Dahua Fortress Series

Dahua Technology/China Key Features • Wired alarm system that features over 8 independent timers for automatic control, more than 11 zone types and 8 onboard zones • Supports event alerts through SMS or voice messaging • Integrates DMSS mobile phone application to send push notifications • Supports menu-driven programming for easy use and setting, keypad shortcuts in case of emergency, and real-time zone alarm display • Granted with EN50131 Grade 2, Class II certification Email: overseas@dahuatech.com

Hikvision Security Radar DS-PR1-60

Hikvision Digital Technology/ China Key Features • Supports 4 PTZ dome camera • Supports 32 target detection • IP67 and IK09 rated all-weather approved • Features wide coverage of 100° detection angle and 60 m detection range • Uses digital beam-forming technology and intelligent analysis algorithms to accurately detect all target movements in all weather conditions • 8 user-defined zones • Pet-immunity: 20 kg • 3 selectable scenario modes • Supports Power over Ethernet (PoE) and plug and play Email: hanfei@hikvision.com

Magal InnoFence

Magal Security Systems/Israel Key Features • Features a concealed fiber optic sensor for intrusion detection • Made from pre-fabricated modules, and can be mounted on a low concrete base (free-standing) or wall-mounted • Decorative, robust and innocent looking • Exceptional Probability of Detection (PD) • Adjustable sensitivity • Minimum number of false alarms • Low maintenance • Low power consumption ~2 W per 1 km • Long life expectancy Email: info@magal-s3.com

Interlogix TruVision Navigator V8

Interlogix/U.S. Key Features • Pop-up live video on event monitor when triggered by an alarm event • Built-in TruVision 360° camera de-warping • Task scheduling and main video stream control help reduce bandwidth needs during peak network traffic periods • Automatic health diagnostic service to maintain system uptime • Supports a separate GPU to provide smoother rendering of live and recorded video Email: Michelle.caldwell@utc.com


Companies Advertiser Index in This Issue *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

COUNTRY REPORT

• Association of Indonesian Security Systems Industry • Association of Technology and Industry Security Indonesia • Building Owners and Managers Association Indonesia • Cold Chain Association of Indonesia • Eyro Digital Teknologi • ISS • ITS Indonesia • Lamjaya Inovasi Komputindo • Prima Inovasi Teknology • Purimet Metropolitan • UNISEM • Vehant Technologies • ZKTeco Security Indonesia

PRODUCTS OF THE MONTH

• AlphaCard • Dermalog Identification Systems • Evolis • HID Global • Magicard • Zebra Technologies

VIEWPOINT

• ASG Security India • CMI Tech • Commax • Daiwon • Huvitech • IDIS • Intsys Technologies • Johnson Controls India • Nextchip • Suprema • Tech Mahindra

Surveillance

• UNINET • VIVAKOREA

Page No.

SPECIAL FEATURE • Bosch Security and Safety Systems • Optex • RBtec Perimeter Security Systems • Senstar

TECHNOLOGY

• ABI Research • Eleven-x • Netvox Technology • Radio Bridge • Semtech

PRODUCT EXPLORATION

• Coppernic • Crossmatch • Dermalog • Fulcrum Biometrics • Gemalto

INDUSTRY REPORT

• CNL Software • Cryoport • FLIR Systems • Genetec • Global Cold Chain Alliance • Hesol Consulting • Hikvision Digital Technology • Miebach Consulting • Pelco by Schneider Electric

Next Issue

Advertiser

Major Item

Country

E-Mail

1 COMMAX CO., LTD.

SURVEILLANCE

KOREA

pcy@commax.co.kr

3, 5 DAHUA TECHNOLOGY

SURVEILLANCE

CHINA

overseas@dahuatech.com

SURVEILLANCE

CHINA

overseasbusiness@ hikvision.com

39 IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

35 SAMSUNG (HANWHA

CAMERA / DVR

KOREA

apriler@samsung.co.kr

7, 20, 21 SEAGATE TECHNOLOGY

STORAGE

SINGAPORE apj.sales.enquiry@seagate. com

INSIDE SHENZHEN WANJIAAN BACK INTERCONNECTED COVER TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

info@wanjiaan.com

INSIDE WESTERN DIGITAL FRONT TAIWAN CO., LTD. COVER

SURVEILLANCE STORAGE

TAIWAN

Jessica.liu@wdc.com

CO., LTD.

BACK HIKVISION DIGITAL COVER TECHNOLOGY CO., LTD.

CO., LTD.)

LLC

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

Country Report | Cambodia and Laos Vertical Market | Shopping Malls Special Feature | Banking

63


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.