A&S #I238 DEC.2018

Page 1


December 2018

Contents

Middle East Market

Looks Ahead Amidst Challenges Continuing safety concerns, government initiatives and investments are driving the demand for security solutions in the Middle East.

20

Viewpoint

Korean Security Strategizes to Counter Chinese Competition

a&s recently conducted a series of interviews with Korean companies to gain a better understanding of the security manufacturing landscape in Korea.

“The Middle East market has continued to grow, and we expect a further increase in adoption of the latest IP network solutions in the coming years with a great focus on smart and innovative technologies.” Ettiene Van Der Watt, Regional Director, Business Development, Axis Communications Middle East Market Looks Ahead Amidst Challenges, p.20

2

www.asmag.com

60

6 10 64 66 67 68 71

Editor’s Note Application Cases SMAhome New Products Show Calendar Show Preview Companies in This Issue

WEBSITE ARTICLES https://www.asmag.com Highlights of Access Control Market in 2018 Despite being smaller in terms of value compared to video surveillance, consolidation efforts have made the global access control market comparable.

AI Video Analytics: What are Some User Concerns? AI and advanced analytics create certain issues that can be addressed via transparency and clear communications.


Editor’s Note 2019: When it Comes to IoT, Security is Fundamental

It is the Christmas season again. Looking back at the past year, industry topics like AI, IoT and blockchain remained quite popular. However, we still haven’t seen an obvious increase in AI-related solutions being implemented. Most of the discussions regarding AI are still conceptual. What we can’t deny though is that advanced video analytics, along with machine learning, has become prerequisite for environments requiring higher levels of security or business intelligence. In 2019, we predict more and more verticals will start to grow their IoT strategies in order to become more efficient and intelligent. In the meantime, security is fundamental to all kinds of businesses and applications. Neither cybersecurity nor physical security should be compromised or neglected in the pursuit of increasing efficiency or intelligence. Thus, a&s International would like to reposition itself in order to better promote security technologies and concepts to experts across all verticals. In 2019, a&s International will cover more IoT applications and topics in all businesses, particularly when it comes to building and home, mobility and Industrial IoT. Security will always be a focus for all these topics. In addition, in 2019, we would also like to strengthen our website (asmag. com) content in order to engage readers in a more direct and timely manner. On the other hand, a&s International will become a bimonthly magazine from 2019 onwards to respond to reader demand for more in-depth market reports and industry reviews. We hope to receive your feedback to our new changes. Please do follow us on social media and stay tuned to asmag.com.

KEEP IN TOUCH WITH...

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal

EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

Editorial Team

Global Security News Media Platform FOLLOW US:

SENIOR REPORTER WILLIAM PAO

EXECUTIVE EDITOR EMILY LIN

A recent market report by Transparency Market Research cites that the global video conferencing market is expected to expand at a CAGR of 7.9 percent from 2018 to 2026, demonstrating the technology’s huge potential. Indeed, with the help of AI and IoT, video conferencing systems are set to become smarter and more integrated as they evolve with the AIoT trend.

It has been a year of ups and downs. On one hand, technological developments have opened up many new possibilities. Conversely, concerns over cybersecurity and the U.S.-China trade war have led to fervent discussions on how things can play out and their implications for the industry as a whole. As the market continues to evolve and transform, 2019 is shaping to be an interesting year for us all.

6

www.asmag.com


Products of the Month

Securing Access With Smart ID Cards and Printing Systems Modern civil, visitor and membership management and access control rely greatly on smart identity cards and card printing systems. To ensure data accuracy, ID cards are no longer simple plastic pieces with profile images, but rather converged access credentials with biometric authentication and secure encryption. Card printers, on the other hand, are protecting against unauthorized usage through advanced technologies like security watermarks and ID registration.

Evolis Zenius Card Printer

D

esigned for single-sided printing of any type of plastic cards, the Zenius card printer generates color or monochrome cards for diverse applications like employee access control badges, membership cards and more. Aiming to reduce its environmental footprint, the Zenius card printer reduces the power consumption of its printers through an economical hibernation mode. It can process images with 300 dpi resolution and edge-to-edge printing.

Key Features • The Evolis Premium Suite software receives notifications and easily controls the printer from a separate computer • Prints cards individually or in small runs • Prints a color card in 30 seconds and up to 150 color cards per hour • Able to combine magnetic encoding, contact and contactless chips

Supplier: Evolis URL: www.evolis.com

Zebra ZC300 Series Card Printer

F

rom corporate offices to retail stores, the ZC300 series is designed to produce identity and access cards to membership and events, printing both a single and dual-sided magnetic stripe as well as contactless cards. The card printing process is easy for users with graphical drivers. A visual display of the card allows users to see how the card looks and, if the settings are allocated correctly, eliminates the cost of repeatedly printing test cards.

Key Features • Cover lock to prevent theft of card stock and rejected cards • The snug-fit design of the ribbon leaves no question whether it’s installed correctly or not • Flexible deployment and operation with Wi-Fi connection • Secure protection with printer and host authentication and AES data encryption

Supplier: Zebra Technologies URL: www.zebra.com

Magicard Rio Pro 360 With HoloKote Security Watermark

R

io Pro 360 is a desktop ID printer with embedded Linux-based CPU. This LYNK intelligence recognizes USB and Ethernet and can easily be integrated with third-party applications locally or in the cloud. All printed cards are secured by Magicard-patented HoloKote security watermark, which is frosted into the clear protective overcoat layer during the normal print process using standard ribbons and cards. Key Features • Print technology: 300 dpi color dye sublimation, monochrome, thermal rewritable • Feed system: manual and hopper fed • Card capacity: 100 card feeder, 70-card stacker • Applications: school ID, payment, education, access control and more

Supplier: Magicard URL: magicard.com

8

www.asmag.com


AlphaCard PRO 500 ID Card System

A

ble to combine with ID software or webcam for ID photos, the PRO 500 ID card system can print employee badges, student IDs, loyalty cards and more. To increase user friendliness, it features an LED status screen, USB and Ethernet ports, and a Microsoft-certified plug-and-play driver. All cards are protected by AlphaGuard, a hologram-like watermark over a printed card without requiring lamination, specialty cards or any additional supplies, preventing unauthorized ID card duplication.

n

Key Features • Backed by a 4-year warranty, all PRO series printers include free lifetime AlphaCare support and a full year of AlphaCarePlus • Printing capability: single or dual-sided • Print technology: dye sublimation with AlphaGuard watermark • Print speed: full color, singlesided cards in 35 seconds, monochrome in 7 • Input/output hopper: 100/30

Supplier: AlphaCard URL: www.alphacard.com

DERMALOG Biometric ID Cards

T

he multi-purpose biometric ID cards from DERMALOG can be applied in numerous applications like civil servants cards, health cards, drivers’ licenses, biometric foreign workers cards or seafarer’s cards. DERMALOG’s Automated Fingerprint Identification System (AFIS) has the ability to identify fingerprints in large-scale biometric databases. Its security algorithm also prevents identity fraud and individuals from trying multiple registrations at the same institution.

Key Features • Works with ZF1+ smart card reader to verify identity by fingerprint and MCU-based card • Database with tenprints, palmprints and latent prints • Runs on all hardware platforms, Windows and Linux • Allows integration of digital photos and signatures

Supplier: DERMALOG Identification Systems URL: www.dermalog.com

Identiv uTrust SmartID Secure Access Credentials

D

esigned for converged access, uTrust MD Smart Cards are Microsoft Minidriver-compatible, PKI-based credentials designed for diverse security applications and digital certificates. The Identiv smart cards come equipped with on-card software and compatible drivers, and are preinitialized with the required keys and settings needed to enable plug-and-play converged access.

Key Features • Compatible with Minidriver supports like VPN, Outlook email signing and encryption, secure web access and more • Variants: uTrust V1.0 80K MD contact smart card with 125 KHz proximity and uTrust V1.0 80K MD dual smart card with MIFARE classic 1K and 125 KHz proximity • Supported specifications: Microsoft Smart Card Minidriver, Java Card and Global Platform • Processor: NXP SmartMX with PKI crypto processor

HID Crescendo Smart Cards

C

Supplier: Identiv URL: www.identiv.com

rescendo is a family of credit card-sized smart cards designed to provide secure IT and physical access control with strong authentication and data protection. Crescendo enables access to applications like PKI-based authentication, digital signature and data encryption. Cards are supported by ActivID Applet Suite, offering secure storage for cryptographic keys, associated digital certificates and personal information. Key Features • Available as hybrid or dual interface cards; SIM punch out option also available • Optimized platform design with automatic memory defragmentation and secure memory management • HID Crescendo app simplifies secure issuance of credentials • Common Criteria EAL 5+ or FIPS 140-2 certified smart card chip

Supplier: HID Global URL: www.hidglobal.com

9


News Feature

What to Consider When Integrating Video and Access Control

Video surveillance and access control are migrating toward IP. This results in various benefits, one being easier integration between the two. BY William Pao

C

urrently, there are different ways to integrate both systems, each with pros and cons. That was according to a recent technology note by Kintronics titled “How to Integrate Door Access and IP Camera Systems.” According to the note, the simplest way to integrate IP door and video systems is to use the timestamp provided by the access control software. If a person enters at a specific time, the event leaves a timestamp in the access control system. The operator can then retrieve the video taken at that particular time. Integrated Proprietary Systems Integrated solutions allow the user to control and manage both systems from one screen. “For example, the Pro-Series door access control system includes video integration. When you use the TVIPTirSoft software, the video from an IP camera or an embedded camera inside the door reader can be displayed on the same computer screen as the access control

information. Since the door access system includes a picture of the person assigned to the credential, it is easy to see if the right person entered the door,” the note said. However, there are disadvantages to the above-mentioned example. “The TVIPTirSoft software only supports the proprietary door readers. This is only used to enhance the door access control system. It supports a limited number of manufacturers. It is not a general IP camera recording system,” the note said. Integrated Non-Proprietary System Solution For these types of systems Kintronics uses a thirdparty software solution from Convergence to Pixels (C2P), which works with a variety of VMS and access control system manufacturers, as an example. “The C2P software captures the data from the door access control system and enters it into a very powerful database. The information from the database can then be displayed next to the video

“The simplest way to integrate IP door and video systems is to use the timestamp provided by the access control software.” provided by the video management software system. This convergence of technology allows the user to search a database while displaying the related video,” the note said, adding one of the advantages is that this integrated solution can create complex alerts. “For example, if a person, who has been removed from the access control system, tries to enter a door, a notification is automatically sent to security. We can also create alerts when the door is held open,

APPLICATION CASES Transportation WISENET CAMERAS KEEP RAIL IMPROVEMENTS ON TRACK Network Rail required several site monitoring systems to provide them with live video streams of their Ambergate rail site. Inside Out Group installed 2 MP Hanwha Techwin Wisenet PTZ domes to enable operators to monitor close up details of work being carried out at various locations, attain a better oversight of progress, asses safety on site and reduce site walkouts. Each of the four systems are battery-powered, negating the need for any costly cabling and the cameras have been attached to existing site structures which helped minimize installation time. H.265 compressed live video streams captured by the Wisenet domes are being transmitted over fast 4G mobile network to the control room, with secure logins also enabling remote access of the video via smartphones, tablets and laptops.

10

www.asmag.com

or when a door is forced. In this case, the video from the camera at the door is automatically popped up on the OnSSI Ocularis screen, and an alert sound notifies the security person that action is required,” it said. Yet the solution has disadvantages as well. “This solution is more complicated to install and use. It costs more because there is an additional software license for the C2P integration software,” Kintronics said.

$15.5 trillion

Global logistics market to reach US$15.5 trillion by 2023.

Source: Transparency Market Research


a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.

IoT-Enabled Power Distribution in the Age of Smart Cities With the Internet of Things (IoT) increasingly taking over almost everything, it should come as no surprise that power distribution systems could also be under its influence soon. BY Prasanth Aby Thomas, Freelancer

S

chneider Electric highlighted this subject in a blog as it explained how power distribution is moving more and more into the cloud. The change, according to Markus Hirschbold, Marketing Director for Healthcare Solutions at the company, is mainly driven by consumer interest. Safe, Reliable Power According to Hirschbold, smarter devices connected over various communications options, including wireless, are making it easier and more affordable to locate metering and monitoring in more places. Power operations and management teams can ensure greater control over their systems with data generated from the connected devices spread across an entire power distribution network. “Alarms can be quickly categorized, while the direction and propagation of disturbances are visualized on a timeline to help trace their origins,” Hirschbold said. “And as loads and controls become more digitized, they also become more power sensitive. Fortunately, power quality analysis tools are now able to capture and visualize every type of condition, delivering compliance reports with simple pass/fail indicators that make it easy to stay on top of the health of the electrical system.” Simpler Operations and Lower Costs One of the most significant developments in the field of energy consumption is the technological advancements in meters. Leveraging the power of cloud-based analytic tools, there are several energy meters now that can make processes like identifying billing errors and tenant allocation costs easier. Hirschbold pointed out that the energy performance of different facilities or processes can be accurately compared using benchmarking, normalization and modeling, helping reveal waste or equipment problems. Detailed energy usage analysis using rich dashboards helps find and prioritize opportunities for conservation efforts, set baselines, then validate post-retrofit savings. “Smart IoT-enabled equipment is helping maintenance teams transition from a preventative to a predictive approach,” he added. “Embedded intelligence continuously monitors the condition of circuit breakers, UPS systems, PQ mitigation equipment and batteries. Analytic reporting tracks equipment conditions, predicting remaining lifetime and other indicators. In this way, risk conditions can be caught earlier, and maintenance can be done on an ‘as needed’ basis only, saving time and cost. And for organizations without adequate in-house expertise or resources, cloud-based apps enable remote support from contracted expert services.”

Logistics SONY CAMERAS MONITOR AUSTRIAN LOGISTICS CHAIN Gebrüder Weiss, based in Austria, is one of Europe’s oldest transport and logistics companies. To make the entire logistics chain traceable, the service provider relies on comprehensive video surveillance in its logistics centers. Gebrüder Weiss has now expanded its existing monitoring solution at the company’s largest distribution center in Maria Lanzendorf near Vienna that previously featured almost 500 Sony cameras and Milestone System’s video management software. This has been supplemented with the addition of 33 Sony 4K video security cameras. The cameras’ installation ensures that the entire transshipment area is monitored at all times, with no blind spots caused by vehicles or pallets. In addition, the new 4K cameras can track several objects simultaneously with either VGA or Full HD resolution. The 20 MP image sensor also enables capture of high-resolution evidence shots.

Why Edge-Based Solutions are Key to Smart Buildings Technology on the edge is a potential solution to providing as much customization as possible. BY Prasanth Aby Thomas, Freelancer

I

n a recent blog post, Memoori pointed out that creating “healthy, safe and productive environments” is not as straightforward as it sounds. An increasingly popular concept in this regard is the “human-centric Internet of Things (IoT)” that has changed the way building management should be viewed. This calls for a decentralized system with edge-based analytic processors as opposed to them running on the cloud or a centralized server. The major advantage of this is the increased level of control that building managers would be able to have in ensuring that the users are receiving what they prefer. In its recent report, Memoori estimates that this “edge” or “fog” computing provides real-time intelligence and simultaneously reduces the communications traffic load. As technology evolves, we expect the gateways near to the edge of the network to form an increasingly important bridge between edge devices and higher-level networks, making behavioral decisions, ensuring network security and helping to streamline data flows. “Edge devices, with their own intelligence, have less need to send information back to a central server because they can interpret the desires of the user and respond themselves,” the research firm noted. “Just as the traditional user controlled a thermostat to set the ideal temperature, the smart HVAC system will learn the behaviors of its users and sense their comfort level in order to set the ideal temperature — for productivity, comfort or whatever the objective of the space may be.” According to Memoori, two of the most important factors in the development of the IoT in smart buildings are: how systems can better respond and interact with the user, and how we can ensure that connected devices do not make systems more vulnerable. “By moving more intelligence to the edge, those access points can better defend themselves from cyberattack while also better serving the user’s needs,” the firm concluded. “For these reasons, the ‘edge-ification’ of the IoT seems just as inevitable as the rocky road of cyberattacks we will experience trying to secure it.”

11


Technology

How

Enterprise Data Management

has Evolved With IoT, Big Data

In today’s world of big data and the Internet of Things (IoT), enterprise data management has become more important than ever. BY Eifeh Strom, Freelancer

14

W

ith the amount of data being produced today, it is imperative for enterprises to properly store, manage and protect their data. In the first quarter of 2018, the worldwide enterprise storage market grew 34.4 percent to US$13 billion, according to the International Data Corporation (IDC). Demand for public cloud resources and global enterprise infrastructure were named

www.asmag.com

as two important drivers for new enterprise storage investments. Additionally, the increasing volume of digital data; increasing proliferation of smartphones, laptops and tablets; and growth of the Internet of Things (IoT) market are driving growth in the next-generation data storage market, based on a report by MarketsandMarkets. “It’s a fact that big data, security and IT applications generate massive amounts of sensitive data, and capturing,

protecting and mobilizing this data is paramount,” said Brandon Reich, VP of Security and IoT at Pivot3. “Right now, video is the most prominent big data application in the world. With the influx of data being collected at a rapid rate, we as an industry have to help organizations capture, analyze and leverage the data that is most important to them,” Reich explained. “Because video capture is growing at a rapid rate, there is a growing need for solutions that support larger security and IoT deployments of 500 terabytes or more. These platforms provide the performance, resiliency, scalability and ease of use that is required for large-scale environments at a lower cost than any other enterprise solution.” As such, solutions that are designed for data-intensive environments, such as IP video surveillance and enterprise IT applications, are ideal choices to protect and ensure the availability of critical video surveillance data.


“Solutions that are designed for data-intensive environments are ideal choices to protect and ensure the availability of critical video surveillance data.„ Data Storage Options

When it comes to types of storage available in the market, there are several options — from local solutions, including directattached storage (DAS), network-attached storage (NAS) and storage area networks (SANs) to cloud storage. There are also different mediums of storage to choose from: mainly hard disk drives and solid state drives, which are also divided into different

capacities and processing powers depending on the application usage scenarios, explained Bob Yang, Regional VP of APAC Sales for Seagate Technology. “Each of these solutions has their advantages depending on the application need, but the most forwardthinking organizations have realized there is no such thing as a one-size-fitsall solution,” Yang said. “Organizations need to understand their current and future needs based on their

data usage and growth, to build an infrastructure with the best mix of solutions.” When it comes to what type of storage each application should implement, Yang says there is no hard and fast rule especially since we are in a time when the ways data is created and used will continue to shift. “Accordingly, an organization’s data storage needs will evolve, depending on its growth and the type of data it needs to manage.” With wider usage of new technologies such as IoT, artificial intelligence (AI) and edge computing across different industries, the market has witnessed a continuous shift toward

Brandon Reich, VP, Security and IoT, Pivot3

Bob Yang, Regional VP, APAC Sales, Seagate Technology

15


Middle East Special Feature

Middle East Market

Continuing safety concerns, government initiatives and investments are driving the demand for security solutions in the Middle East.

Looks Ahead Amidst Challenges 20

www.asmag.com

s oil prices continue to remain weak, governments in this region are looking to diversify revenue sources and increase investment in different verticals. Initiatives like the 2030 vision from Saudi Arabia is an example of this. Coupled with this, there are several major events like Expo 2020 and 2022 FIFA World Cup that is set to take place here, boosting the need for smart security solutions. In this article, we take a look at the Middle East security market from different angles, from the growth, factors fueling demand to challenges and consumer behavior. For systems integrators (SIs), understanding these aspects is crucial to coming up with the right strategy to target the right customers. BY Prasanth Aby Thomas, Freelancer


Investment and Regulations Boost Growth in the Middle East The Middle East continues to remain one of the most lucrative as well as dynamic markets for the security industry.

T

here are several reasons behind this, from the economy that is persistently strong despite oil price concerns and continuing security concerns across the region to government policies and fresh investment initiatives. Much water has flowed under the bridge since the OPEC/non-OPEC meeting last year that reached an agreement to throttle output and push the prices back up. What was intended to ease the pressure on the economy proved to be a bane when production outside the Middle East took a hit and Saudi Arabia itself resorted to over-compliance. This pushed output to significantly low levels, pushing the prices way over the baseline in October 2016. Now as of the time of writing this piece, analysts are weighing in on the issue, anticipating a potential change of guard from the OPEC nations. According to Goldman Sachs, oil prices could rebound in 2019. Local media reports indicate the region could report an economic growth of 2.9 percent this year from the 0.1 percent reported in 2017. As the output cuts are expected to be phased out, the economic outlook for 2019 looks promising. Speaking on the matter recently, Mohamed Bardastani, ICAEW Economic Advisor and Senior Economist for the Middle East at Oxford Economics, had pointed out that the region as a whole, including those countries that are primarily oil importers and not producers, is set to see a revival. “Middle East economies are recovering from the difficult years of a low oil environment, various austerity measures and geopolitical risks,” Bardastani was quoted by a local daily. “But more reforms are required to address the fundamental problems that have plagued so many countries of the region for so long, including reducing high unemployment rates, promoting fair competition and better regulation, investing in talent and strengthening women’s legal rights.”

Security Concerns and the Security Market

in 2017 as factors such as government initiatives of economic diversification began to bear fruit. In 2016, the UAE Civil Defense had rolled out a revision of its fire and life safety campaign, giving a much-needed shot in the arm for the industry. Demand for passive fire systems in new buildings has grown since then, as have requirements to retrofit systems that comply with new laws in older structures. As part of Messe Frankfurt’s statement, Frank Ackland, MD for Middle East at Eaton, said that such renewed regulations have boosted the standards in the region. “All those involved in the construction process are placing greater importance of meeting, and exceeding, the standards set out,” Ackland said. “That doesn’t mean there isn’t more work to be done, and this is where we see a significant investment in retrofitting also taking place in the UAE, in order to make older buildings safer and in line with current regulations.” Beyond fire and safety, the physical security market, which also includes video surveillance solutions, access control, perimeter security and others, is also expected to see growth in the coming years. The market for commercial and cybersecurity, fire protection, smart home solutions and drones, worth a combined $7 billion

In line with economic development, the Middle East security market is expected to grow at a robust rate in 2019. According to a statement from Messe Frankfurt ahead of the Intersec trade show in Dubai, the region’s fire safety systems and equipment market, which alone is valued at US$1.9 billion, will post solid growth in the next six years as government regulations regarding safety and infrastructure investments kick in. A report from 6Wresearch projects the region’s firefighting systems, fire detection and alarm systems, and emergency exit and lighting, are set to be worth $3 billion by 2024, growing at a compound annual growth rate (CAGR) of 8 percent. After a slowdown between 2014 and 2016, the market had picked up

21


Middle East Special Feature

ME App Case Stats

Retail

IDIS Ensures Standards Compliance for Qatari Jewelry Leader Qatari retail chain Al Sulaiman Jewellers is using IDIS to upgrade its network surveillance system and comply with government security standards.

A

ll the chosen equipment was quickly approved through the SSD-MOI online process. The cameras cover all the critical areas, with facial recognition covering all entrances. More than 40 cameras provide coverage of the showroom, with a combination of 2-MP and 3-MP IR domes, and a 5-MP fisheye camera, the latter being specified by Al Sulaiman as an addition to the mandated system. For other areas, a further 60 IR cameras, including domes and bullet cameras, are deployed. Network connectivity is ensured with an IDIS 28-port and 24-port PoE gigabit

25% GCC retail sector to grow by 25% by 2021.

Source: Alpen Capital

switch and storage is handled by the IDIS NVR together with expansion storage equipment. The system is configured with RAID 5 to record 24/7 for 120 days, as required by

SSD-MOI. 32” IDIS screens and 23” workstation monitors together with the highly scalable and modular IDIS solution Suite VMS allows live viewing and playback.

Airports

$7.6

HUB Parking and Nedap Deployed at Salalah Airport

billion UAE hospitality market to reach US$7.6 billion by 2022.

Source: Alpen Capital

With more than one million passengers every year, Salalah International Aiport is the Sultanate of Oman’s secondary international airport.

W

ith this many visitors every year, a fast traffic flow is of great importance to the

airport. At all entry and exit lanes of the drop-off and pick-up area, taxi and rental car parking, ParkQube stations of HUB Parking were installed, equipped with HUB

Parking Pro barriers. In order to ensure authorized taxi and hotel drivers can easily shuttle through, the Nedap Identification S y s t e m ’s u PA S S s y s t e m w a s integrated in the combined HUB Parking and FAAC solution. Every taxi or hotel bus is equipped with a UHF Windshield Tag that contains

a unique identification number. The uPASS Reach allows consistent reading of up to five meters, so taxi or hotel drivers do not have to stop to present their badge or get a ticket. The installation was realized by HUB Parking in collaboration with Oman Airports Management Company (OAMC).

Retail Siqura Video Security System Protects Kuwait Malls Real estate developer Tamdeen Group has recently opened two mega malls in Kuwait and asked Siqura to outfit them with their innovative video security systems. For the 300,000-square-meter Al Kout mall, the system consists of 900 Siqura cameras, including fixed dome, fixed box and speed domes, a VDG Sense video management system of around 900 channels and 26 high-end recording servers, and a KeyProcessor access control, based on 150 readers for access control and several controllers for alarm monitoring. The 360 mall has an existing video surveillance system in place. Siqura replaced this with a new system consisting of 700 Siqura cameras including fixed dome, fixed box and speed domes, VDG Sense video management system of around 700 channels and 20 high-end recording servers with more than 2.5 petabyte of storage and five workstations. With these new systems in place, Siqura was able to future-proof the mall systems and implement the required hardware and software to make this possible in the future.

32

www.asmag.com


Hospitality

Entertainment AMG Systems Protects Museum of Islamic Art The Museum of Islamic Art in Doha, Qatar, required a security system that can balance security and safety while still being welcoming to visitors. A multi-core fiber backbone infrastructure carried multiple disciplines from local floor control cabinets to the security equipment room where AMG Systems’ receivers convert the images back to coax terminations on a real-time uncompressed video basis. The Synectics modular digital recording system is installed as the front-end integrated control system. The AMG products also provided the network for the ISIS AspectARTS Artwork RFID tagging system using the built-in RS232/485 ports. Specialized and Interactive Systems (SIS) installed the AMG4600 series dual redundant, multichannel point-to-point video, data and Ethernet fiber transmission system, while a total of 420 cameras are installed of which 21 are pan-tilt-zoom (PTZ). A special feature is the four radar pods on the building that are connected into the transmission system. When movement is spotted, the nearest camera is automatically set to trail it for visual verification and threat assessment.

Hyatt Regency Riyadh Olaya to Deploy ASSA ABLOY Solution

ASSA ABLOY Hospitality has completed its implementation of Mobile Entry functionality at Hyatt Regency Riyadh Olaya, a luxury full service property located in Riyadh, Saudi Arabia.

R

eferred to as “Mobile Entry” and available for guests to download on their device as an integrated feature within the ”World of Hyatt“ app, the solution enables travellers staying at the Hyatt Regency Riyadh Olaya to bypass check-in procedures by using their personal device as a digital guestroom key. Developed using ASSA ABLOY’s Seos technology, the solution safeguards against the threat of data theft and unauthorized access by encrypting digital key and room number information, which is then transmitted to guest devices using a secure communications channel. By also implementing VingCard Signature RFID with Mobile Entry, Hyatt Regency Riyadh Olaya gains additional security features with the door lock’s use of encryption protocols that protect against keycard cloning attempts. Signature RFID was also selected by hotel leadership due to the platform’s ability to blend in with the property’s elegant style.

Entertainment

Rasilient Systems Provide Storage for Dubai Global Village

Rasilient Systems has been chosen to provide video surveillance storage solutions for Global Village Dubai, billed as the “world’s largest” tourism, leisure, shopping and entertainment project.

R

asilient partnered with Forceis Integrated Security Systems to provide this state-of- the-art security operation. The video surveillance cameras are managed by Milestone’s XProtect corporate video management software (VMS). The solution used at Global Village Dubai includes six Rasilient ApplianceStor 74 Rack VMS storage servers that provide 100TB of storage. The rack mount integrates VMS and storage into a simple-to-use, high performance video

surveillance server solution. With Rasilient’s video surveillance storage solutions, every single camera frame is processed and recorded — what’s referred to as no frame drop. The ApplianceStor 74 is engineered to monitor its own “health” and operations to ensure that the system doesn’t fail when it’s most needed. This proactive technology monitors the health of every disk drive in the system to enable cloning right before an actual drive failure.

33


Middle East Special Feature | Intersec 2019 Product Showcase 2N Indoor Talk

Hikvision Turbo HD PIR Cameras

he design of the 2N Indoor Talk answering unit is suitable for apartments or homes. The appearance of this product was achieved by using a glass surface and striking backlighting of its icons. Besides, 2N Indoor Talk uses HD audio codec and innovative speaker in order to achieve a high-quality sound. This means that user can talk to visitors outside as if they were standing right next to you. Invite them in and press the icon to open the door from the comfort of your home.

ikvision’s Turbo HD Passive Infrared (PIR) Camera uses advanced video surveillance technologies to improve alarm accuracy and prevent intrusions. As a result, perimeter protection jumps to a whole new level for residential areas, around factories, warehouses, schools and other settings. The camera has a built-in PIR detector that captures infrared light given off by human bodies and distinguishes it from other visual “noise.” It can be equipped with Hikvision’s Turbo HD K series DVR’s motion detection to filter false alarms caused by moving targets without human body IR emission.

T

Key Features • Set the required intensity of icon backlighting, choose your favorite ringtone from the 10 available options • The special flush installation box enables you to gently rotate the unit in order to achieve a perfectly horizontal position • Use the 2N Indoor Talk to make calls to not only a 2N IP intercom, but to other corresponding answering units in the building • Activate the “Do not disturb” mode to switch off the ringtone at once or at pre-set time intervals when you need absolute peace and quiet • Doorbell button support: easily connect the doorbell at the entrance to your flat or home directly to the 2N Indoor Talk unit

Supplier: 2N TELEKOMUNIKACE URL: www.2nusa.com/en_US

DynaColor T Series IP Cameras T-B Model

D

ynaColor’s T Series IP Cameras deploy its top-of-the-line SoC, and support up to 4K real-time video in HDR mode. When set to linear mode, the streaming capability of the camera is up to 16-MP resolution. Compared to their previous R Series cameras, T Series IP cameras offer higher throughput, better video analytic capabilities, and superior streaming performance even under low-light condition. T Series IP cameras are now available with selected sensor/lens combination, and more combinations will be gradually rolled out across all form factors.

Key Features • Multiple progressive scan CMOS sensor support up to 8-MP resolution • Low latency streaming • True day/night function (ICR) • IR LED (working distance up to 40 m) • 3D motion compensated noise reduction (MCTF) • Smart Event function — external input/motion detection/network failure detection/ tampering alarm/periodical event/manual trigger/audio detection • ONVIF Profile S/G/Q support

Supplier: DynaColor URL: www.dynacolor.com.tw

34

H

Key Features • Available in three form factors — bullet, dome and cube • Passive Infrared (PIR) sensor has a detection range of 11 meters, senses movement in an area • Equipped with ultra low-light technology • 2 MP high performance CMOS • HD 1080p

Supplier: Hikvision Digital Technology URL: www.hikvision.com/en

dormakaba Electronic Door Lock C-Lever Pro

T

he c-lever pro is designed for exterior doors and doors with increased security requirements. In addition to offering protection against intrusion, fire and inclement weather, it can also be used for emergency exits and escape routes. Examples of potential applications include schools, hospitals, nursing homes, commercial properties or industrial facilities. With the c-lever series, you can control access for an almost unlimited number of users for specific locations and times, while continuing to use the mechanical master key system completely independently.

Key Features • Equipped with TouchGo function which detects when you are carrying an authorized transponder in your pocket so you can enter the room by simply pressing the door handle as normal • Free hands: your hand is your key • Selective access: helps your organization and security • Easy to manage

Supplier: dormakaba URL: www.dormakaba.com/ae-en

www.asmag.com


ASSA ABLOY Aperio Wireless Solutions

Bosch FLEXIDOME IP starlight 8000i

uick and easy to install, Aperio wireless locks can be operated with the same access cards you use for your existing system. With a wide range of high security, certified battery-powered locks for many different applications, Aperio cuts energy costs, reduces maintenance and is the logical choice for businesses of all sizes looking to upgrade their access control systems.

osch is pushing the technological boundaries with the launch of the FLEXIDOME IP starlight 8000i fixed dome cameras. Developed with Bosch’s starlight technology, HDR, plus HD 1080p, 6 megapixel or 4K Ultra HD resolution to provide detail even in extreme low-light situations. The value of this superior clarity is enhanced with the built-in Intelligent Video Analytics, which provides incredible accuracy even in challenging conditions and over expansive areas. It’s also smart enough to interpret data to a level of detail that goes beyond the requirements of security alone and provide tangible benefits to your business.

Q

Key Features • Connect more doors to your access control • Solve the lost key problem by using existing cards • Install locks in less than 2 minutes • Reduce energy consumption by up to 76% • Cut maintenance costs by up to 67% • Increased battery life with 2-year replacement

Supplier: ASSA ABLOY Security Solutions Middle East URL: www.middleeast.assaabloy.com

B

Key Features • IP66 water resistance • IK10+ vandal resistance • Anti-corrosion coating and operating temperature range of -50 to +60°C • Intelligent dynamic noise reduction • Intelligent streaming combined with H.265 video compression

Supplier: Bosch Security Systems URL: www.boschsecurity.com

Vanderbilt Security Management System (SMS)

V

anderbilt SMS is intelligently designed with collaboration in mind, allowing security officials to leverage a multitude of resources at any given time to mitigate threats. The powerful, single-source solution enables a facility to integrate its access control technologies, digital video and alarm monitoring systems. From a uniform interface, security leaders are able to manage alarms, photo ID badging, visitor management, elevator control, offline and online locks, advanced reporting and more. Key Features • Unlimited cardholders and devices • Reports and auto-scheduling • Manages both networked and standalone openings • Anti-passback capabilities • Programmable flash for downloads and firmware updates • Web application allows for convenient remote access • Full video integration available (video retrieval tied to access control events) • API available

Supplier: Vanderbilt Industries URL: www.vanderbiltindustries.com

AXIS P9106-V White Network Camera

T

he 3-MP AXIS P9106-V Network Camera is specially designed for out-of-the-box optimized corner-to-corner coverage, at up to 130-degrees horizontally and 95-degrees vertically, without blind spots. It is enclosed in a vandal-resistant (IK10) and dust-and-waterproof (IP66) casing. The abrasion- and chemical-resistant front window is easy to clean or replace, for efficient maintenance. AXIS P9106-V White is designed to be ligature-resistant, reducing the risk of vulnerable people using the camera for self-harm (e.g., in mental health care or custody cells). It is ideal for covering waiting rooms and interview rooms, especially when paired with portcast devices for two-way audio.

Key Features • Corner-mounted camera with ligature-resistant (anti-ligature) design • Out-of-the-box optimized field of view in 3-MP resolution — no blind spots • Vandal- and waterproof casing reduces impact of vandalism • Support for portcast devices (e.g., AXIS T61 Series)

Supplier: Axis Communications URL: www.axis.com

35


Vertical Solution

Analyt Surve Airport

Advancements in Enhance 40

www.asmag.com


tics eillance

With so many cameras to monitor, advanced video analytics that can proactively identify potential threats is critical to the success of a security plan.”

A

irports today are more focused on secur ity than ever before. The number of attacks on airports in recent years have only further highlighted the need to better protect passengers and staff, even the reputation of the airports themselves. In terms of video surveillance, in the past it has been used as a source of video verification or observation into what has happened, but it has since become an essential source of data, too.

Developments in Analytics

Due to the strict regulations for safety and air travel, airports require comprehensive security technology. To meet these requirements, the world’s largest airports use some of the most advanced technologies available — some of which are centered around video surveillance. BY Eifeh Strom, Freelancer

Video analytics are in high demand at airports. With so many cameras to monitor, video surveillance that works with advanced video analytics to proactively identify potential threats is critical to the success of a security plan. Furthermore, these technologies can help operators identify the most critical information at any given time. “Powered by sophisticated, computerbased algorithms, these advanced analytics incorporate neural networks and deep learning to imitate a human’s ability to recognize, allowing the technology to adapt to and learn from new situations,” said Alan Stoddard, VP and GM of Situational Intelligence Solutions at Verint. “These innovations open up new doors to airports because they can deliver the accuracy and scalability required to support advanced

41


Vertical Solution

Latest

Surveillance Technologies Keep Seaports More Secur 48

www.asmag.com


re

With two huge targets — people and assets, seaports are a likely mark for attacks. Video surveillance plays an important part of ensuring the safety and security of seaports, and new and improved technologies are helping do so. BY Eifeh Strom, Freelancer

S

eaports are a gateway for people and goods to enter different cities and countries around the world. This, however, also makes them vulnerable to a number of threats. A robust video surveillance system, then, becomes a critical component of the overall safety and security solution at a seaport. The requirements for a video surveillance solution at seaports have evolved over time. Not only does it serve to provide security and surveillance functions, but also for worker safety and operations. These evolving needs are the result of a growing risk landscape and growing threat of terrorist attacks. “As families enter and exit cruise ships, large crowds are often shuffling around, creating a critical component of necessary protection for these spaces. For ships carrying goods and materials, the possibility exists that the inventory may present something suspicious that poses a potential threat, requiring proper scanning and searching techniques,” said Jumbi Edulbehram, Regional President of Americas at Oncam. Video surveillance provides a valuable solution to safeguard these aspects, allowing officials to observe behavior in real time and quickly identify a risk or vulnerability.

Major Challenges

Seaports have many critical surveillance needs such as safeguarding against unlawful entry and terrorist threats, but they must also deal with day-to-day theft and damage issues. All this becomes increasingly difficult to deal with due to the large physical area that encompasses a port’s security responsibility and the fact that ports

49


Product Exploration In today’s world, it’s hard to imagine companies not using video conferencing systems, which have seen an evolution over the years. Today’s video conferencing systems not only allow participants to see and talk to each other — with advanced technologies such as artificial intelligence and the Internet of Things, they have become smarter and more integrated to add to the user experience. BY William Pao

What’s New in

Video Conferencing S

54

www.asmag.com


Systems? N

eedless to say, video conferencing systems have become an indispensable communications tool for companies. Benefits are manifold, including the ability to help save time and costs. The 2018 Corporate Travel Index compiled by Business Travel News suggested that the average daily cost for meals, car rentals and hotels for business travel in the U.S. rose to US$325 per day. Video conferencing, then, becomes a more economical alternative than sending someone on a business trip. More and more, even hiring can be done via video conferencing, whereby the company can evaluate an overseasbased candidate through a video call. Besides the cost factor, video conferencing carries other benefits as well. A post by Vita Enterprise Solutions showed that video conferencing can contribute to optimized attendance, as participants knowing they won’t be constrained by distance will be more willing to attend. With specifically set meeting starting and ending times, participants will be more likely to stay alert and focused on what’s been discussed. Finally, productivity can increase as well. “As a result of improved communications, participants are more in sync, decisions are able to be made faster, and productivity increases,” the post said. “Problems can be resolved faster and services for

clients can be developed more quickly, providing a serious competitive edge for your company.” Given these advantages, video conferencing systems have become more and more mainstream. “Video conferencing technology continues to advance, bringing users easier and more affordable collaboration and new, innovative features. Adoption is growing across market segments, from enterprises to startups and small businesses,” said Loren Shaw, VP of Marketing at InFocus. “Although video conferencing has been around for over two decades, we’re seeing a huge growth in not just video in the large meeting rooms, but in small spaces in the offices, for home and remote workers and via mobile devices, which have all now become viable devices to work from,” said Emily Shimell, Head of Customer Communications at VideoCentric. “Those who have grown up using video as a primary tool of communication at home are now fully integrated into the workplace. It’s not ‘the new generation’ of workers anymore who are coming in and ‘disrupting the workplace,’ but rather the very large numbers of the workforce and many decision makers who are expecting visual communications to be available, and to help them improve their workflow and productivity.” In fact, the growth of the video conferencing market is not to be ignored. According to a recent market report by Transparency Market Research, the global video conferencing market was valued at $5 billion in 2016 and is expected to expand at a compound annual growth rate (CAGR) of 7.9 percent from 2018 to 2026 to reach $10.5 billion. The report further noted that the corporate enterprise sector contributed significantly to the revenue of the global video conferencing market due to a rise in the number of multinational companies around the globe

Lorry Hu, Product Engineer, Dahua Technology

Jerry Hung, GM, BXB Electronics

Bo Preising, SVP, Engineering, Suitable Technologies

55


Viewpoint

Korean Security

Strategizes to Counter Chinese Competition

a&s recently conducted a series of interviews with Korean companies to gain a better understanding of the security manufacturing landscape in Korea.

T

he Chinese manufacturers’ economies of scale and low margins have made competition in mass market products extremely difficult. However, recent trade tensions between the U.S. and China has spurred discussions on whether Taiwanese and Korean manufacturers, both previous powerhouses in surveillance manufacturing, will enjoy a boon in sales. Though some of our interviewees did comment that the ongoing trade war could be an opportunity for Koreans to gain back market share, Most companies we’ve talked to said it will not have any impact on their business. Therefore, Korean companies are moving to differentiate and grow in the market through various strategies, such as strengthening their brand offerings, focusing on relatively niche markets and expanding their reach into other lucrative markets as well. By actively seeking expansion opportunities in overseas markets, Korean companies are positioning themselves as ready alternatives to Chinese products. BY the a&s Editorial Team

60

www.asmag.com

Building a Global Brand

Companies like Commax, IDIS and Suprema are good examples of Korean companies that have continued to expand globally while developing their branded offerings.

IoT and Smart Home

Video door phone manufacturer Commax has been expanding its footprint overseas and developing its smart home product line. Currently, its main overseas market is in the Middle East, followed by Asia, U.S. and European countries, with a strong focus on the residential vertical, specifically single house and multi-tenant communities. The company’s strong presence in the Korean domestic market gives it the backing it needs to continue developing and selling its new smart home IoT products. Looking forward, IoT will remain the company’s future focus. At the moment, the company sells IoT-connected products that use the video door phone as the main control interface and sensors like gas detectors, motion


detectors, alarms and cameras. “We see two main trends: the first is that control of the systems are moving to mobile phones, and the second is the availability of AI. We are now working with companies like Google and IBM to use AI to manage the house for you in a ‘tailored’ and more energy-efficient way,” said Kisang Lee, Marketing Director for Commax. “With the goal of delivering value that users can actually feel, we at Commax use our imagination to develop products for a more convenient and safer home, with a wide range of smart living solutions built around it. Our concept of the smart home goes beyond just the physical space of a house. We want to connect technologies and expand services so that even local-based convenience services and functions can be easily used at home,” said Lee.

Critical Failover Capabilities and Cybersecurity

“A f e w y e a r s a g o , I D I S embarked on a mission to build a global video surveillance brand and this effor t has started bearing fruit. Our branded business has grown over 50 percent per year in the last two years. Most of the growth originated in Europe, and the company’s global footprint has expanded, growing from 15

partners to 58 global partners,” said Joon Jun, Executive VP at IDIS. In Asia, the company has established a good network in Singapore, Indonesia, the Philippines and Japan, and is now looking for partners in Malaysia, Vietnam and Thailand. Although IDIS still maintains its ODM business, this part of the company operates selectively, with a preference for high level ODM projects. Joon sees system reliability and cybersecurity as main key points that are critical to integrators and end users. “I believe IDIS’ critical failover capabilities and cybersecurity give us an advantage over Chinese products.” Looking into the future, IDIS is focused on the development of its own deep learning analytics. “Video analytics will become a strong offering for us in the next five years. This is still a virgin market that is now ‘re-starting.’ Video analytics has already been present for years, but their low accuracy has led to low adoption due to many false alarms. Deep learning can help mitigate this and we are planning on launching the next version during the next ISC West,” added Joon.

Complete Access Control Solution

Joon Jun, Executive VP, IDIS

Korean biometrics company Suprema has been focused on expanding its product offerings beyond biometric readers to offer a complete access control solution. “Growth has been even across the world, ranging between 10 to 15 percent. The Middle East and Europe are very strong in several verticals Andy Ahn, Head of Marketing, like constr uction, time and Suprema attendance, health care and data centers,” explained Andy Ahn, Head of Marketing for Suprema. The growth has also prompted Suprema to expand its partner network, looking for bigger distributors and integrators that can support its growth across the world. “There is a growing demand for facial recognition and mobile credentials. Resistance to biometrics is lower now since people are used to the concept of biometrics to unlock their smartphones and therefore acceptance is growing,” added Ahn.

61


asmag.com PRODUCT FOCUS To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact as-pr@newera.messefrankfurt.com

New Products Oncam Evolution ExD

Aiphone IX2

Pelco GFC Professional 4K

MACE Smart Slim Mobile Access Control Reader

Oncam/U.K. Key Features • 360-degree explosive environment cameras • Features 12 MP Sony Exmor R sensor and 5 MP CMOS sensor • Supports 7 different models for indoor, outdoor and extreme outdoor applications • Designed for use in potentially explosive atmospheres, harsh and hazardous environmental conditions; suited for applications in offshore and onshore environments • Features IP66, IP67 and IP68 ratings • Adopts stainless steel 316L material, making the housing resistant to harsh environmental conditions Email: sales@oncamgrandeye.com

Pelco by Schneider Electric/U.S. Key Features • Up to 4K/8 MP resolution in 30 fps: up to four times the resolution of 1080p • H.265 video coding and Pelco smart compression • 100dB true wide dynamic range (WDR) • Built-in IR illuminator produces detailed images in zero light; the adaptive IR illuminator avoids overexposure that can hinder detection • Motorized lens with P-Iris • IK10, IP66 rating and metal construction: both indoor and outdoor cameras are rugged, vandal resistant and waterproof Email: sanah@growswyft.com

Hanwha Wisenet P

Hanwha Techwin/Korea Key Features • Features 150dB WDR • IK10 vandal and IP66 weather resistant • With a Gyro sensor to offer accurate stabilization when a camera is disturbed by wind or vibrations • 5 built-in SD card slots • Lens distortion correction (LDC) compensates for the image distortion that can occur with wide angle lenses • Supports H.264, H.265 and MJPEG compression • With 4 exchangeable lens modules • Captures 360-degree images of up to 20 MP resolution Email: customerservice@hanwha.com

FLIR Elara FB-Series ID

FLIR Systems/U.S. Key Features • Thermal security camera with onboard analytics to classify human or vehicular intrusions • Ideal for perimeter intrusion detection and sterile-zone monitoring • Features low false alarm rates in challenging environments, bad weather and complete darkness • Hand-off targets to autonomous PTZ tracking cameras • Offers plug-and-play compatibility with major video management systems using hybrid, IP and analog outputs Email: mv-sales@flir.com

66

www.asmag.com

Aiphone/Japan Key Features • 7-inch handset with a touchscreen and ONVIF compatibility • Hands-free touchscreen monitors • Supports picture in picture video to show the door station camera and an overhead camera simultaneously • Video intercom between master monitors • Audio and video SIP integration with Cisco IP phone systems • SD card slots on panels and monitors enable video and audio data to be recorded and backed-up Email: info@aiphone.com

Nedap Identification Systems/Netherlands Key Features • Enables use of smartphones to identify people • Supports NFC, Bluetooth low energy and smartcard technology • Elegant, mullion mountable design • Operates with any access control system • Combines convenience and security • Able to read virtual credentials on smartphones and conventional smartcards Email: identification@nedap.com

Navis Paddle

Yale/U.S. Key Features • Convenient access for high traffic areas, elderly family members, young children • Simple to install with screwdriver and allen wrench • Backset 2-3/8” to 2-3/4” adjustable (round corner) • Push or pull to operate • Fits standard doors • Concealed screws • Reversible handing • ADA compliant • Door thickness: 1-3/8” to 1-3/4” • 2-1/8” face bore • 1” edge bore • Latch face 1” x 2-1/4” Email: amy@praytellagency.com

OPTEX REDSCAN RLS-3060 Series

OPTEX/U.K. Key Features • Features long-range, 190 degrees 2D LiDAR series • Shape of the detection area can be customized to the layout of the site • Supports area allocation, area masking function to precisely define a number of independent detection zones • Features indoor/outdoor loitering detection mode • Supports detection range expansion mode to 50 m radius Email: asimmons@gravitylondon.com

Dahua Fortress Series

Dahua Technology/China Key Features • Wired alarm system that features over 8 independent timers for automatic control, more than 11 zone types and 8 onboard zones • Supports event alerts through SMS or voice messaging • Integrates DMSS mobile phone application to send push notifications • Supports menu-driven programming for easy use and setting, keypad shortcuts in case of emergency, and real-time zone alarm display • Granted with EN50131 Grade 2, Class II certification Email: overseas@dahuatech.com

Hikvision Security Radar DS-PR1-60

Hikvision Digital Technology/ China Key Features • Supports 4 PTZ dome camera • Supports 32 target detection • IP67 and IK09 rated all-weather approved • Features wide coverage of 100° detection angle and 60 m detection range • Uses digital beam-forming technology and intelligent analysis algorithms to accurately detect all target movements in all weather conditions • 8 user-defined zones • Pet-immunity: 20 kg • 3 selectable scenario modes • Supports Power over Ethernet (PoE) and plug and play Email: hanfei@hikvision.com

Magal InnoFence

Magal Security Systems/Israel Key Features • Features a concealed fiber optic sensor for intrusion detection • Made from pre-fabricated modules, and can be mounted on a low concrete base (free-standing) or wall-mounted • Decorative, robust and innocent looking • Exceptional probability of detection (PD) • Adjustable sensitivity • Minimum number of false alarms • Low maintenance • Low power consumption ~2 W per 1 km • Long life expectancy Email: info@magal-s3.com

Interlogix TruVision Navigator V8

Interlogix/U.S. Key Features • Pop-up live video on event monitor when triggered by an alarm event • Built-in TruVision 360° camera de-warping • Task scheduling and main video stream control help reduce bandwidth needs during peak network traffic periods • Automatic health diagnostic service to maintain system uptime • Supports a separate GPU to provide smoother rendering of live and recorded video Email: Michelle.caldwell@utc.com


Companies Advertiser Index in This Issue *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

Surveillance

PRODUCTS OF THE MONTH • AlphaCard • Dermalog Identification Systems • Evolis • HID Global • Magicard • Zebra Technologies PRODUCT EXPLORATION • BXB Electronics • Dahua Technology • InFocus • Suitable Technologies • VideoCentric VERTICAL SOLUTION • Bosch Security and Safety Systems • FLIR Systems • Genetec • Merit LILIN • Milestone Systems • Oncam • PureTech Systems • Qognify • Verint SPECIAL FEATURE • Axis Communications • CP Plus • Dar Al Arkan • Hikvision MENA • Honeywell Commercial Security • IDIS • Pelco by Schneider Electric TECHNOLOGY • Pivot3 • Seagate Technology VIEWPOINT • CMI-TECH • Commax • Daiwon • Huvitech • IDIS • Nextchip • Suprema • UNINET • VIVAKOREA

Next Issue

Page No.

Advertiser

Major Item

Country

Email

CCTV

GERMANY

apr.securitysystems@ bosch.com

SURVEILLANCE

KOREA

pcy@commax.co.kr

SURVEILLANCE

CHINA

overseas@dahuatech.com

DOME COVER

CHINA

sales@franoptics.com

BACK HIKVISION DIGITAL COVER TECHNOLOGY CO., LTD. 31, 39 IDIS CO., LTD. 13 SAMSUNG (HANWHA

SURVEILLANCE

CHINA

overseasbusiness@ hikvision.com

SURVEILLANCE

KOREA

sales@idisglobal.com

CAMERA / DVR

KOREA

apriler@samsung.co.kr

7 SECU-VISION CO., LTD. 72 SHENZHEN WANJIAAN

DVR / CAMERA

KOREA

tyga@secu-vision.com

SURVEILLANCE

CHINA

info@wanjiaan.com

CHIPSET

USA

dma@techpointinc.com

CAMERA

CHINA

sales@tiandy.com

IP CAMERA / SOFTWARE / VIDEOSERVER

ITALY

info@videotec.com

SURVEILLANCE

ISRAEL

-

Major Item

Country

Email

15 BOSCH SECURITY SYSTEMS

37 COMMAX CO., LTD. INSIDE DAHUA TECHNOLOGY FRONT CO., LTD. COVER, 1 57 FUJIAN FRAN OPTICS CO., LTD.

CO., LTD.)

INTERCONNECTED TECHNOLOGY CO., LTD.

3 TECHPOINT INC. 64, 65 TIANDY TECHNOLOGIES CO., LTD.

5 VIDEOTEC S.P.A. INSIDE VISONIC BACK COVER Access Control Page No.

Advertiser

51 GIGA-TMS INC.

RFID MODULE / LOCK / TAIWAN READER

promag@gigatms.com.tw

43 UWC ELECTRIC (M) SDN.

ACCESS CONTROL

MALAYSIA

sales@uwcelectric.com

Major Item

Country

Email

ALARM

ITALY

info@tecnoalarm.com

BHD.

Intrusion Alarm Page No.

Advertiser

18, 19 TECNOALARM S.R.L.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

Hot Topic | Converged Trend: Access Control Smart and Safe City | High Street Retail Security and Business Efficiency Smart Building and Home | Smart Display and Control for Homes

71


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.