A&S #I218 FEB.2017

Page 1


CONTENTS VERTICAL SOLUTION

P.20

a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher Editorial

General Press Jill Lai Alf Chang William Pao Lisa Hsu Emily Lin Ryan Liu

Editor-in-Chief Senior Consultant Reporter Reporter Editor Reporter

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com ryan.liu@newera.messefrankfurt.com

Art Design

Gaven Lee Executive Designer gaven.lee@newera.messefrankfurt.com Mao Chang Designer mao.chang@newera.messefrankfurt.com Tzu-Yin Chien Designer tzuyin.chien@newera.messefrankfurt.com Circulation

Michelle Shih Officer

michelle.shih@newera.messefrankfurt.com

Corporate Management

Collins Yuan Group Manager collins.yuan@newera.messefrankfurt.com Thomas Pin Account Manager thomas.pin@newera.messefrankfurt.com

asmag.com

Chihung Lee Manager

chihung.lee@newera.messefrankfurt.com

Secutech

Peggy Wu Veronica Chen Jason Cheng Crystal Chen

Security for universities is increasingly becoming a major topic of discussion in the security industry circles as several incidents have pointed toward issues in this vertical.

Trade Fair Manager Group Manager Project Manager Assisant Project Manager

peggy.wu@newera.messefrankfurt.com veronica.chen@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com crystal.chen@newera.messefrankfurt.com

International Advertising [Headquarters]

Israel Gogol Manager Audrey Fang Officer

israel.gogol@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

INTEGRATED SYSTEM

VMS in the IoT World ....................... 36 The growth of the Internet of Things is creating more and more data for security operators to sift through.

INDUSTRY REPORT

P. 26

Video Surveillance: Top Trends of 2017 FEB 2017 ● www.asmag.com

Last year video surveillance growth was a mere 4.2 percent, due mostly to Chinese vendors’ effort to drive down prices and gain more market share, according to Memoori.

Access Control: Researchers and Vendors' Viewpoint Toward 2016 ...32 8

Carolina Pattuelli Evris Consolos Adis Hodzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Ekaterina Shapovalova Mariusz Kucharski

Europe (Italy) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia Poland

produzione@ethosmedia.it evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn shapovalovey@ru-bezh.ru mariusz.kucharski@aspolska.pl

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.newera.tw.messefrankfurt.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Intelligent System, and a&s Taiwan (above published in Chinese). a&s Adria, a&s India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2017 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices


EDITOR’S NOTE It is Time for Collaboration!

KEEP IN TOUCH WITH...

The Internet of Things (IoT) trend has started to take shape in many different industries. For instance, in smart cities, we can see smart mobility, retail, buildings and factories starting to change the way things are done in these applications. New supply chains, ecosystems and collaboration among different technology suppliers can be more frequently seen in the near future. ICT companies are now trying to continue to stay in the lead along with this IoT trend. The companies that used to only provide hardware are transforming into system and solution providers. However, not many smart solution providers use current security technologies and solutions to optimize their offerings and service, which proves that the ICT industry’s overall understanding toward security technologies is still quite limited. I spoke to different parties like ICT, IT and solution providers at a recent networking event in Taipei and their interest in security technologies is quite high. Various security technologies, such as video analytics (motion detection), video streaming, identity management and RFID, were demonstrated at the event to show how they can benefit solution providers in different verticals. The collaboration among different technology providers can potentially open up a new market for security companies. It is about time for us to move out of our comfort zone and embrace more IoT business.

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal

EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

EDITORIAL TEAM

FEB 2017 ● www.asmag.com

REPORTER WILLIAM PAO

REPORTER LISA HSU

EDITOR EMILY LIN

REPORTER RYAN LIU

The video surveillance landscape looks different now than it did a few years ago. While demand is still there, price has dropped significantly, resulting in a slowdown in revenue growth. No wonder the 2017 trends cited by vendors reflect their desire to offer more value to users, amidst fierce competition.

The cover story reminded me of the days when I spent too much time at the university after hours as a student. I always felt scared leaving the campus by myself due to the lack of security cameras. Glad that awareness of providing students with a secure environment is spreading – no one should feel unsafe at school!

Nobody can argue that IoT and big data hold much promise in advancing security solutions. However, technology can’t be used just for technology’s sake. Evaluating actual customer needs, potential value and application as well as the challenges it may present are all key considerations before implementation.

The February a&s issue is exciting as it features a variety of articles covering different topics, ranging from VMS to campus security. We also featured some of the latest security products that were shown at this year’s CES. You’ll find a number of unique devices that can enhance home security.

12


PRODUCTS OF THE MONTH Innovative Home Security Devices at CES 2017 Editor’s Note: CES 2017 at Las Vegas, U.S., showcased some of the latest and most advanced products from a variety of suppliers. This year, much of the focus for security devices has been placed on the personal home sector. Some of the products at the show combine different features into one cohesive device such as a camera with facial/object and motion sensors or a light bulb with a hidden camera for discreet surveillance. A range of security products offer users the ability to keep watch on their properties from anywhere with a smartphone. Cybersecurity has also received much attention with hardware and software functionalities that prevent cyberthreats to all connected devices in the house.

Fortress UTM

Fortress has developed a software stack and hardware solution that allows consumers to deploy several enterprise security technologies in the home. The Fortress unified threat management (UTM) appliance provides detection and prevention of intrusions, blocking bad connections, stopping viruses and ransomware, and inspecting everything on the network in one device.

Key Features: • Cybersecurity technology for inside the home • Secures Internet of Things (IoT) devices • Intrusion detection and prevention/firewall/anti-virus • Enterprise-grade security for the home • 4-port gigabit router with dual band Wi-Fi radio • 7” touch screen for easy setup and configuration

Supplier: Fortress Cyber Security URL: http://fortresscs.com/

Yubico YubiKey 4C The YubiKey 4C is the world’s first multi-protocol USB-C authentication device. Based on the existing YubiKey 4, it supports multiple protocols including Yubico OTP, OATH and FIDO Universal 2nd Factor (U2F). The YubiKey 4C provides secure access to a variety of applications including Google and Dropbox. Key Features: • USB Type-C • Secures static passwords • Secures access to multiple applications

• Works on Microsoft Windows, Mac, Linux and other major browsers • Keychain design

Supplier: Yubico URL: https://www.yubico.com/

FEB 2017 ● www.asmag.com

Cognitive Systems Aura

Protect the home and privacy with Aura, a thoughtful security solution. A simple two-piece system that plugs directly into the wall to monitor motion by detecting ripples in wireless signals. Paired with a mobile application, Aura gives users control of their home security — anytime, anywhere.

14

Key Features: • Motion detection • Auto arm and disarm • Manages access to home security systems without providing codes • Views activity in the house and knows who is present and movement patterns within seconds • Notification will be sent to the smart phone if unexpected movement is detected

Supplier: Cognitive Systems URL: https://www.aurahome.com/


Mu Design Ulo Camera

An owl-shaped home surveillance camera from Mu Design, Ulo offers an interactive device to monitor the house. The eyes on the camera will react depending on the action being performed. Live video can be watched through a secure webpage. Ulo only stores a few minutes of video locally and nothing is sent over a distant third party server. Key Features: • Eyes on the camera are customizable though a webpage • Alert Mode is activated once the connected smartphone leaves the Wi-Fi network • Live video streams directly to a secure webpage • Snapshots can be captured and sent to a secure webpage, dropbox account or to the user’s email • Battery lasts for one week on Alert Mode, while with eye expression it needs to be charged every two days • A set of adhesive neodymium magnet allows the camera to be attached on every surface

Symantec Norton Core Router

Core uses advanced machine learning and Symantec’s global intelligence network to defend the home Wi-Fi — and every device connected to it — against malware, viruses, hackers and much more. With a 4 x 4 MU-MIMO foundation and ultrafast 802.11ac Wi-Fi, Core is designed to achieve maximum throughput speeds of 2.5 Gbps. Core monitors data from the entire connected home, identifies security issues, and sums it all up in a single, powerful number. Key Features: • Built-in dual core processor at 1.7 GHz and more memory and flash storage than typical routers, to ensure optimal performance for Wi-Fi and security features • Dual band support for optimal connection. Core simultaneously transmits at 2.4 GHz and 5 GHz

Supplier: Mu Design URL: http://mu-design.lu/

• Twice the throughput of Wave-1 11ac technology which supports speeds up to 2.5 Gbps • Core’s beamforming antenna tower focuses Wi-Fi directly to devices in the distant corners of the home • Smartphone app enables control of the network

Supplier: Symantec URL: https://us.norton.com/

Bell & Wyson Wi-Fi LED Bulb

The low energy (11W) Wi-Fi LED bulb by Bell & Wyson features a built-in Wi-Fi communication module, camera, TF slot and 2-way microphone. A free app for iOS/ Android allows for alerts to be sent to the user’s smartphone when movement is detected. Live images taken by the camera can be viewed directly on the smartphone. Key Features: • Built-in camera and microphone • Night vision camera • Motion detection • Remotely manageable via free iOS/Android app • Allows recordings to be stored on a Micro SD card • Timer functions to program lighting cycles

Supplier: Bell & Wyson

URL: http://www.bell-and-wyson.com/en/

Ring Floodlight Cam

Protect the home with motion-activated security cameras with built-in floodlights, a siren alarm and two-way audio, so users can see, hear and speak to anyone on their properties from anywhere. With object and facial detection, Floodlight Cam has the most advanced motion sensors in home security. Its 270° field of view will let users detect motion around corners and monitor all the blind spots. The camera sends instant alerts to the smartphone, tablet or PC whenever it detects motion. Key Features: • Crystal-clear HD video • Two ultra-bright LED floodlights • 110-decibel siren alarm

Supplier: Ring

• Dual sensors with object and facial detection • Ultra wide-angle motion sensors • Customizable motion zones and scheduling

URL: https://ring.com/ 15


NEWS FEATURE a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.

How Anonymized Data Contributes to Smarter Building Management The Physical-Logical Access Interoperability (PLAI) architecture allows for the integration and controlled access of building management and access control systems for better operations and productivity. BY William Pao

M

ore and more, big d a t a ge n e ra te d by security and non-security devices connected over the internet is used to help users achieve security as well as operational efficiency. In this sense, anonymized location data generated by access control devices can be used to help manage buildings more effectively. That’s the argument raised by Mohammad Soleimani, Chairman of the Physical Security Interoperability Alliance (PSIA), in a whitepaper released by the alliance. The organization is the developer of the PhysicalLogical Access Interoperability

APPLICATION CASES

8.6 million FEB 2017 ● www.asmag.com

Approximately 8.6 million students were enrolled in UK schools in 2016. Source: Department of Education (GOV.UK)

16

(PLAI) specification. According to Soleimani, whi le mode r n b uilding management systems (BMS) provide many facility improvements, without integration with the physical access control system (PACS), the BMS is constrained by pre-defined schedules. “Because schedules are predictive in nature, they cannot react in real time to unforeseen events that may cause schedule disruptions,” he said. “The integration of BMS with PACS … makes it possible to leverage the capabilities of today’s sophisticated HVAC systems and realize higher energy efficiencies by basing settings and controls on a real-time occupancy count.”

Mo r e i m p o r t a n t l y, a m i d increased calls for protecting employee and user data, the BMS and PACS should work together without infringing upon individual privacy. In this regard, PLAI is a solution that can reconcile this, Soleimani said. According to Soleimani, PLAI is implemented in a BMS-PACS environment to support the sharing of anonymized location data over a Representational State Transfer (REST) application program interface (API). This credential read stream identifies the location of a card-read associated with an individual and the zone that the person belongs to. “For example, an event stream for a person entering through a garage would include his/her access at the garage or turnstile entrance, as well as that person’s usual place of work within the building. With both card-read and zone information, an intelligent BMS can keep track of a person going to a particular location even if the PACS at the tenant suite is not providing that data,” Soleimani said. “With this integration solution, a real-time, continuous occupancy count offers greater efficiencies for modern, variable-speed HVAC systems

"Amid increased calls for protecting employee and user data, the BMS and PACS should work together without infringing upon individual privacy."

MILITARY

AIMETIS SYMPHONY MONITORS US BASE The 174th Fighter Wing, an important US Air National Guard Base, was using an antiquated video surveillance system. They needed an intelligent security system that would provide 24-hour perimeter boundary protection while constantly recording and analyzing the high interest pieces in the base. Aimetis Symphony’s open system architecture provided the ability to integrate with the current infrastructure of analog cameras as well as many different camera manufacturers and capabilities. Installation of a fiber optic-based

communications infrastructure, a four-hour uninterruptible backup power system, and PTZ and fixed cameras were done in phase one. Phase two was the installation of three dual thermal imaging/color PTZ cameras, 12 storage area cameras and upgrading the Aimetis Symphony software. The final phase was the addition of a second server in the farm. With correct load balancing of the cameras using various video analytics algorithms, an overall increase in performance, response time and system stability was achieved.


and allows for impromptu, finer control in comparison to current occupancy sensors.” Soleimani cited as a case study Tridium, a global leader i n b u i l d i n g a u to m a t i o n platforms. It is implementing PL AI for the purpose of smart building management, such as regulating HVAC and lighting controls, based on occupancy. “In Tridium’s application, anonymized location data is received over the PLAI event stream and consumed for dynamic building management. PLAI events are converted by Tridium to Building Automation Control network (BACnet) calls,” he said. “These calls in turn readjust the thermostat settings and lighting settings as appropriate. The PLAI approach in this scenario allows temperatures and ventilation to be adjusted as people enter and exit a room, limiting unnecessary exposure of personally identifiable information (PII) since b i o g ra p h i c i n fo r m a t i o n pertaining to individuals is not needed.”

InnoVi Edge Enables Cloud-Based Video Analytics on IP Cameras The addition of InnoVi Edge to Agent Vi’s product portfolio is expected to expand the company’s customer base by allowing easy integration of its cloudbased video analytics service. BY Agent Vi

A

gent Video Intelligence (Agent Vi) announced the launch of innoVi Edge — a compact appliance which enables any IP surveillance camera to connect to Agent Vi’s cloud-based video analytics service, innoVi. innoVi performs real-time detection of security and safety events without the need for calibration, tweaking, or setup required by traditional analytics solutions. innoVi is based on Agent Vi’s distributed video analytics architecture that splits the video processing task between an edge component at the remote site network and a cloud-based server. With the introduction of innoVi Edge, installers can extend innoVi’s detection accuracy, minimal false alerts, and ease of use to any ONVIF/RTSP-compliant IP camera. innoVi Edge (Model 200) is purpose-built for innoVi specification by U.S.-based BCDVideo. The appliance enables installers to connect 10 to 40 ONVIF/RTSP IP cameras (depending on frame rate and resolution) to innoVi cloud service. innoVi Edge simplifies the installation process for new or take-over projects by giving installers one device type to work with regardless of number or model of cameras at a given site. Itsik Kattan, CEO of Agent Vi, comments that “The introduction of innoVi Edge dramatically expands the addressable market for innoVi, our advanced video analytics cloud-based service. Via innoVi Edge, any customer with new or existing IP cameras can enjoy the most advanced video analytics service on the market. This offering will be especially attractive to Central Monitoring Stations (CMSs), Alarm Receiving Centres (ARCs) and Remote Video Receiving Centres (RVRC), who seek to grow their monitored customer base by employing innoVi’s first-class offering. Furthermore, we are delighted with our partnership with BCDVideo, a well-known and reputable hardware manufacturer in the surveillance industry offering customized products, who can guarantee our commitments to our customers on product quality and level of service.”

EDUCATION

LILIN SURVEILLANCE SOLUTION USED IN UK SCHOOL The Academy, Selsey, formerly known as the Manhood Community College, required a brand new surveillance system after its existing one was destroyed by a fire. The Academy’s specifications were extremely specific. The system had to be simple to use and provide quality images over a large site where identification would be possible. The project employed Merit LILIN’s 1080P HD IP iMEGAPRO network cameras which were installed in strategic locations to maximize the efficiency of the system and monitor vital areas throughout the four locations. Also selected was LILIN’s 36 channel Navigator server to provide a comprehensive recording and monitoring solution. With the new system in place, the management team is now able to monitor any location and easily share incidents captured on video. Benefiting from HD quality images, the school was also able to leverage the system as a positive measure to help prevent vandalism.

17


FEB 2017 ● www.asmag.com

SECURITY FOR UNIVERSITIES IS INCREASINGLY BECOMING A MAJOR TOPIC OF DISCUSSION IN THE SECURITY INDUSTRY CIRCLES AS SEVERAL INCIDENTS HAVE POINTED TOWARD ISSUES IN THIS VERTICAL. IN THIS ARTICLE, WE TAKE A LOOK AT SOME RELEVANT CASE STUDIES AND ASK EXPERTS FOR THEIR OPINIONS ON THE SUBJECT. BY Prasanth Aby Thomas, Freelancer

20


he higher education sector is one of the key verticals for solution providers and systems integrators alike. In the recent past, the sector has come under scrutiny due to several attacks, especially those like active shooter incidents. According to Transparency Research, such attacks and other various factors are expected to boost the growth of this vertical. The introduction of cost-effective security systems is also propelling the growth of the market. “Moreover, increased investments in infrastructure is also fueling the growth of the school and campus security market,” the research firm said in a report. “Factors such as thefts, vandalism and intrusion are also expected to drive the demand for school and campus security during the forecast period. Government regulations pertaining to enhance the security levels are also impacting the school and campus security market positively.” These factors collectively are expected to impact the growth of the school and campus security market positively from 2015 to 2023. However, managing security in higher education institutions is becoming more and more complex due to several factors. Advancements in technology and the need to maintain open and safe learning environments are contributing to this complexity.

Managing Modern University secUrity The first point to consider while securing universities is understanding what key sites require protection. “As with any large campus environments, the higher education community is concerned with securing the physical assets, intellectual property and

21


Video Surveillance:

Top Trends of 2017 Last year video surveillance growth was a mere 4.2 percent, due mostly to Chinese vendors’ efforts to drive down prices and gain more market share, according to Memoori. Amid this, the more well-established Western vendors are investing in technology and solutions that go beyond traditional security applications and provide further value to users. In terms of trends for 2017, vendors cite cybersecurity as the most pressing issue facing security players, especially after the DDoS attack last year. by William Pao

FEB 2017 ● www.asmag.com

ast year, video surveillance growth registered at a mere 4.2 percent, compared to 10 percent for access control, according to a study released by Memoori. The study pointed out growth in the video surveillance market has fallen for the second consecutive year and now is less than half the CAGR it achieved in the previous three years. However, the study noted that despite the growth decline, volume was well up, as the major Chinese competitors “made very drastic reductions to their prices across world markets.” “Based on their protected home market and copious financial backing from the Chinese government, they have been able to pursue this strategy and have now successfully penetrated North America and parts of

26

Europe, where they are rapidly winning market share … and there is no sign that this strategy will not continue to gain market share,” the study said. Most vendors we spoke with agreed with this notion, saying the growth decline had more to do with a price reduction rather than a slowdown in demand. “As far as our business, 2016 was a phenomenal year for us. We continued to experience record growth and momentum … with 67 percent of revenue coming from new customers,” said Brandon Reich, Senior Director of Surveillance Solutions at Pivot3. “It is possible that the decrease in the video surveillance component is attributable to the recent surge in Chinese competitors at much lower prices, but what we have found is that businesses


and organizations across the world are demanding further integration with unique technology offerings that leverage new kinds of data beyond traditional raw video footage for true situational intelligence,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. According to Yury Akhmetov, Business Development Director at AxxonSoft, business varied in 2016 depending on region. “For instance, we feel that market in Africa is growing, though Middle East is slowing down. There are many financial and political reasons for this situation. We believe that this is normal fluctuation. Overall the importance of security, and CCTV in particular, will grow in next 10 years,” he said. Johan Paulsson, C TO of Axis Communications, mentions that while the growth in the video surveillance market as a whole is slowing down, the network camera market is showing good growth. “The strong growth rate for network video is primarily driven by increased demand in major growth regions, greater penetration in small installations and rapid technological advancements, which are creating new business opportunities,” he said.

How THey Cope Amid Chinese vendors’ aggression, most Western, more well-established security players said that they would not get involved in a race to the bottom — slashing prices and reducing margins to gain more market share. Rather, they are more inclined to investing in new technologies and solutions, combined with sophisticated data analytics software, to help end users achieve better TCO, ROI and business intelligence. “Our strategy for growth is about highlighting those features and technologies which make our products better value for money than other camera manufacturers,” said Karen Sangha, UK Marketing Manager at Panasonic.

Yury Akhmetov, Business Development Director, AxxonSoft

Steve Birkmeier, VP, Sales and Business Development, Arteco

Jumbi Edulbehram, Regional President, Americas, Oncam

Peter Kim, Senior Director, IDIS America

“We are asking end users to take a more holistic approach to appraise any potential security system. This involves different calculations as to the total cost of ownership, including a thorough appraisal of the ongoing maintenance costs as well as the financial benefits of the ancillary features modern surveillance systems are equipped with.” With end users demanding more out of their security equipment, vendors are turning their attention to data analytics and other solutions that go beyond security, helping improve the end user’s business processes. “More and more companies will adopt intelligent analytics and big data analysis, which has the potential to streamline processes and optimize sales operations for organizations to drive new levels of business intelligence,” said Jumbi Edulbehram, Regional President for Americas at Oncam. “Our business model supports numerous integrations with leading video management systems manufacturers, as well as software developers that take the footage gathered from our cameras and turn it into real business intelligence and analysis.” “The video surveillance market can no longer be seen as the security market only. Video surveillance extends to many more application areas than just security,” said Paulsson. “As the market grows and matures, Axis continues to invest in order to strengthen the overall offering and increase respon-

sibility in installations.” Examples of this are numerous, in various vertical markets. “Our age and gender analytics as well as facial recognition technology is finding use in different applications outside of security. For instance, we recently showcased a solution for retail at the ISE tradeshow in Amsterdam which

27


Access Control: Researchers and Vendors’ Viewpoint Last year was certainly a good one for access control. Sales in different regions picked up, while demands from various vertical markets continued to rise. Among the prevailing trends were mobile credentials, cloud service, integration and convergence with IoT, enabling users to secure premises as well as improve business processes. by William Pao

ccess control certainly had a good run in 2016, outpacing other technologies in physical security. According to Memoori, access control grew 10 percent in 2016 compared to 4.2 percent for video surveillance and 3.6 percent for intruder alarms — the second year in a row in which access control registered the highest rate of growth. IHS Markit, meanwhile, gave a more conservative figure, saying the global access control market grew 6.1 percent last year, about 1 percent below its original forecast. “The industry was slower because of underperforming countries such as Brazil, Russia, Latin America (except Mexico) and China, which only grew by 8.5 percent in 2016,” said Blake Kozak, Principal Analyst at IHS Markit. However, Kozak said prospects still look good down the road. “Positive economic conditions and increased investment in innovative access control technology has led to strong growth in access control, which is forecast to outpace both intruder alarms and video surveillance through 2020,” he said. Region-wise, growth was seen pretty much across the globe. “For the first three quarters of 2016, we saw strongest market growth in the Asia Pacific followed by

FEB 2017 ● www.asmag.com

32

the Americas,” said Brad Aikin, Electronics Portfolio Leader for Commercial at Allegion. “Within the U.S., it’s no surprise that most of the growth came from larger population segments which exist in the Northeast, California, Texas and the explosion of retirement communities in Florida,” said Larry Reed, CEO of ZKAccess. EMEA performed well, too. “Outside the U.S., we saw a huge adoption for biometric security technology in the Middle East, in addition to Asian and Latin American countries, as they tend


a heightened concern for protecting students/ patients and employees. Threats come from unauthorized visitors entering the premises, as well as unauthorized employees attempting to gain access to restricted areas, for example computer rooms, financial and records rooms, or dangerous areas, for example radiation and biochemical waste,” said Reed.

ts Toward 2016 to adopt new technology faster than North America and European countries,” Reed said. “The countries/regions that outperformed the rest in 2016 were the Middle East, Poland, Africa, India and Vietnam,” Kozak said. “Moreover, countries such as the United States and United Kingdom, both mature security markets, are projected to have growth exceeding 7 percent in 2017. France and Germany are also expected to perform well, with growth above 5 percent.” Security remains the top driver that led to access control’s growth. “Although much is sensationalized by the media, still no one can argue how prevalent security breaches and violence exist in today’s society. Human population grows. Internet connections grow. And with this growth comes an associated rising vulnerability for attacks upon our business assets and people,” Reed said. “Security officers are now very much aware they have no choice but to invest in necessary protective measures. Thankfully, much of this protective technology is far more affordable today when compared to years past.” As such, vertical markets that are more vulnerable to security threats and breaches, for example education and healthcare, saw the biggest growth in access control. “Vertical markets that experienced growth above 9 percent in 2016 included education, residential and utilities and energy. Healthcare also had a strong year, growing 8 percent in 2016,” Kozak said. “ Po p u l a r ve r t i c a l s c o n s i s te d o f schools and hospitals where there is

Brad Aikin, Electronics Portfolio Leader, Commercial, Allegion

Technology Trends Other than securing lives and assets, access control technologies and solutions were expanded to different areas of business to help users improve operational efficiency. In this regard the following are some of the prevailing trends in access control in 2016.

Mobile Credentials Mobile credentials continued to gain traction in 2016, with 4.5 million shipments seen globally, according to Kozak. However, 2017 is expected to be the year where the technology really takes off. Blake Kozak, Principal Analyst, IHS Markit “Rapid growth is expected to continue into 2017, when mobile credentials will grow by about 200 percent to reach 13.5 million shipments globally,” he said. The technology benefits staff/employees by giving them the option to log into physical or logical assets with their smart devices which they carry all the time. For businesses mobile credentials mean reduced cost and processes through over-the-air provisioning and savings on printing cards or badges. Larry Reed, CEO, ZKAccess “IHS believes this was a top trend due to the versatility and future proofing offered by the solution. More specifically, mobile credentials permit remote provisioning as well as a more seamless security infrastructure across verticals such as enterprise, automotive, residential and hospitability,” said Kozak. However, Reed of ZKAccess cited some of the downsides of mobile credentials and urged biometrics as a more practical solution. “A mobile credential only works when the following exist: batteries are charged, wireless transmitter is working, internet access is available and the user didn’t forget to bring their phone with them. A far more practical alternative to traditional lock and key or card access systems is the use of a biometric credential because you cannot lose your biometric credential. It cannot be stolen, nor does a biometric credential require power,” he said.

aCCess Control as a serviCe ACaaS has also gained traction in 2016, and the trend is set to continue. A 2016 report by Research and Markets forecast that ACaaS will grow at a CAGR of 24.6 percent during the period 2016-2020.

33


VMS in the IoT World

The growth of the Internet of Things is creating more and more data for security operators to sift through. Video management system manufacturers are working hard to ensure their VMS can not only collect and analyze this data, but also secure it from cyberthreats. BY Eifeh Strom, Freelancer

FEB 2017 ● www.asmag.com

strong video management system is crucial to any video surveillance system. By aggregating data from various sensors, a robust VMS provides businesses and security operators with a more holistic picture of its security setup. The last few years saw a lot of changes in the VMS industry, particularly with the many mergers and acquisitions of major VMS providers. Technologically speaking, though, there have also been a lot of changes, particularly in terms of the Internet of Things (IoT) and big data. “The IoT in particular has created a market within the VMS world for integration between various building sensors, in addition to the traditional security-related sensors that many of today’s VMS platforms already support,” said Mitchell Kane, President of Vanderbilt Industries. However, the many benefits of IoT and big data also come with challenges for VMS. For starters, increased connectivity comes with a lot more data and more security vulnerabilities. In order to adapt

36

to these changes, VMS manufacturers are developing systems with improved data handling capabilities and enhanced data protection.

Improved data ColleCtIon Nowadays, users demand access to more data. Wider acceptance of big data analysis and IoT are facilitating such demands by improving the collection of data. At the same time, the amount of data being generated is significant and constantly growing. “Operators cannot focus on every single trigger and technology can help identify what is critical and what is not,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. “That is where intelligent VMS becomes valuable.” Specifically in terms of big data and IoT, “Big data analysis and IoT-powered devices allow for the collection of myriad data points across systems, services and devices,” said Kevin Wine, VP of Marketing at Verint Systems. He added that there is a growing adoption of software-based

solutions that allow data to be correlated from multiple systems to deliver increased situational awareness. With more data, businesses are able

VMS at a Glance

As security concerns increase globally, an increase in demand for VMS is expected to continue. While demand for high quality video processing is fueling market growth, concerns about privacy and large storage requirements by video surveillance are curbing growth, according to a report by Transparency Market Research. Regionally, the U.S. is expected to hold the market-leading position in the adoption of VMS suites, linked to the presence of large-scale video surveillance systems and high-end security networks. In the coming years, however, APAC is expected to dominate in terms of adoption due to increased government spending and development of large infrastructures.


to investigate risks in a more intelligent manner. Wine explained demand by users for more access to data shows that video management and situational awareness platforms must have the ability to connect with IoT devices and analytics in order to allow users to see a more complete picture of their operations. “This approach will also help users be more proactive when it comes to security because they will have all relevant data at their fingertips.” Birkmeier pointed to the trend of event-driven intelligence (EDI), a streamlined method of collection, analysis and response to incoming security data that allows users to use the same incoming information to their advantage for emergencies and investigations. “EDI platforms, such as video event management software (VEMS) platforms, rely on streaming, notification and management of data from a number of third-party devices, such as video surveillance, access control, building automation, and fire and intrusion alarms,” Birkmeier explained. “These systems shift the burden from hardware to software as they link facility device notifications into a single easy-to-use interface, using high-level configuration for increased customization and, eventually, more efficient tactical responses to prioritized events.”

proteCtIon agaInst CyberattaCks

Effect of RMR on VMS

The recurring-monthly-revenue business model (RMR) has gained popularity within the video surveillance industry. While in the past RMR in security generally led back to the alarm monitoring industry, it is now increasingly being used for cloud storage for video recording and retrieval and system status information, according to Ken LaMarca, VP of Sales and Marketing at OnSSI. “VMS manufacturers have and will continue to adapt to this evolving environment by assuring integrations with cloud storage solution partners to best manage offsite video and data,” he added. Additionally, this new RMR model allows for larger systems to be deployed with lower upfront costs, LaMarca explained. “This new RMR model helps ensure and balance a more consistent stream of revenue for integrators, resellers and manufacturers alike.”

big data, have pushed VMS manufacturers to incorporate more security protocols in an effort to protect critical data from cyberthreats, according to Kane. “Cybersecurity for these networkenabled devices is quickly becoming a large differentiator as more and more organizations call on the expertise of in-house IT departments to identify and address potential vulnerabilities on the networks in an effort to protect data and close back door access to domains via hidden developer admin passwords in IP cameras,” Kane explained. Ken LaMarca, VP of Sales and Marketing

When talking about security systems, it almost feels like protection against DDoS attacks should be a given; however, cyberattacks on security systems have gotten increasingly sophisticated, particularly since almost all security systems nowadays are networked. Manufacturers are well aware of the increasing need to better secure data. In fact, trending Mitchell Kane, President, Vanderbilt Industries topics, such as IoT and

at OnSSI, pointed out that mitigating DDoS attacks as they relate to VMS requires a commitment to better data and network protection against cyberattacks. “Encrypting all data used by the VMS, assuring the video is sent in a proprietary format, and exercising diligence regarding changing default camera passwords and utilizing HTTPS are all important security issues that demand continued attention,” he said. “VMS technology related to DDoS attacks must continue to improve as hackers continue to develop new and more complex ways to attach networks,” LaMarca added. For example, he noted VMS products that incorporate end-to-end encryption are a good first line of defense against such attacks.

vms beyond seCurIty

Ken LaMarca, VP, Sales and Marketing, OnSSI

Many point out that open architecture VMS integrations with IoT and big data broaden the scope of opportunities beyond traditional security. And this is exactly what many clients are looking for in their security investments.

37


VCA Evolves With Latest Trends Video content analytics has often been met with challenges; however, its development alongside today’s latest technological trends is making VCA an indispensable tool for applications in and out of security. by Eifeh Strom, Freelancer

ideo content analytics (VCA) has been touted as the next big thing in video surveillance for over a decade. And while VCA has now undoubtedly become a major part of video surveillance, for a long time it was met with disappointment in the form of inaccuracy and false alarms. Despite this, particularly over the last few years, accuracy has dramatically improved and VCA has become an integral part of a comprehensive video surveillance system, with many cameras nowadays boasting analytics on the edge. In fact, research shows that the reliance on VCA technology is growing along with its adoption. As a result, the

video analytics market size is forecast to grow from US$1.7 billion in 2016 to $4.2 billion by 2021, at a CAGR of 20.2 percent from 2016 to 2021, according to a June 2016 report by MarketsandMarkets. With the market expected to double over the next five years, current user demands for crowd management beyond security applications and collaboration with IoT are helping to drive growth.

Trends in VCA Trends are constantly coming and going; however, their influence on technology is lasting. Since the introduction of VCA to security, there have been many trends whose technologies are now integrated into what we know as VCA today. Staying on top of new technologies is crucial for VMS developers, as end-user demands follow the latest technological trends. When asked what is currently pushing VCA development, developers pointed to mobile platforms and crowd management, to name a few. “Intelligent mobile platforms, such as drones and driverless cars, are a major trend influencing VCA development,� said Eric Olson, VP of Marketing at PureTech Systems.

39


Bill Flind, CEO, Ipsotek

Rustom Kanga, CEO, iOmniscient

Eric Olson, VP, Marketing, PureTech Systems

“These markets are looking for new types of video targets (i.e., street signs, safety scenarios, etc.) and they desire the results of video analysis to aid in navigation and collision avoidance.” Olson explained that video analytics has evolved to address these new markets with the ability to compensate for the movement of the platform itself (i.e., car, drone, boat, etc.), learn new types of targets, integrate with control systems, and evaluate larger video streams with smaller, more affordable software and hardware solutions. Crowd management is another major trend influencing VCA development, according to Rustom Kanga, CEO of iOmnicient. “Customers are finally realizing that their highest risk is in very crowded environments, and they are now asking for systems that work in such environments,” he said.

Using VCA for Roadwork Monitoring

Bill Flind, CEO of Ipsotek, described how the Transport for London (TfL) used its video analytics as part of a solution to monitor roadworks and ensure they are carried out in an optimal way.

FEB 2017 ● www.asmag.com

TfL was looking for a way to minimize the disruption to traffic caused by roadworks. To do this, they introduced the Lane Rental Scheme to ensure work promotors acknowledge the value of occupying road space — penalties were introduced for failing to complete works on time, or for performing the works in a non-compliant way. The technology needed to be flexible and re-deployable in order to cope with the constantly changing location of works. This was all taken into consideration in the development of the Automatic Road Network Monitoring system (ARNM). TfL identified video analytics as the core component to the solution, since a fundamental part of video analytics technology is translating video into metadata, which can then be used to populate databases. This data can then form the basis for tracking the activity on work sites. TfL worked with Ipsotek and Axis Communications to create a smart camera solution. Using Ipsotek’s Scenario Based Detection Engine, TfL can remotely configure the video analytics software to provide accurate results. The data gathered by the smart camera allows TfL staff to receive automated alerts if work promoters are working outside permitted times, or if they are not making full use of the agreed work plans. Daily activity reports are also generated to show the scale and time of work which has taken place. The ARNM deployment demonstrated an immediate and significant step forward in the optimization of roadworks.

40

In fact, MarketsandMarkets expects counting and crowd management applications to grow at the highest rate from 2016 to 2021. They attribute this growth to how the application could help end users measure the flow of people at specific entry and exit points within a facility, door or building in real time or periodic reporting. Furthermore, the application’s ability to intelligently identify bottleneck areas and alert personnel with the location enables end users to manage the crowd and analyze the behavior and other activities of people and vehicle in real time from remote locations. This not only helps to maximize security, but also aids with decision making.

BeTTer CAmerAs And AffordABle sensors Trends aside, advancements in technology and more affordable sensors have also played a major role in VCA development. Improved camera resolution now provides sharper, more detailed images for VCA. “This increase in resolution avoids the field of view loss caused by zooming into a scene, as well as complications that can arise due to long focal lengths,” Olson explained. These high-resolution images help the accuracy of VCA, particularly in critical environments. Not only has camera resolution gotten better, cameras have also become smarter and more affordable, both of which contribute to VCA adoption and improved accuracy. Olson also pointed out how video analytics has become more collaborative over the past few years. “Rather than performing all of its intelligence exclusively based on video data, it has evolved to take advantage of other sensors,” he said. A more collaborative effort has been in part made possible due to the availability of more affordable sensors. New low-cost position sensor technology provides extremely accurate pitch, roll and yaw position data, according to Olson. This data is then utilized by VCA to allow rapid


Systems Integrators to Evolve

Tips for

Alongside Industry

The face of the security industry continues to grow and evolve into one that resembles a service industry. Systems integrators need to be vigilant about keeping up with the new trends as well as listen closely to the needs and requirements of both sides of the market — not only end users, but manufacturers as well. It is only then that they can create the right solutions that will benefit all parties involved. In the following articles, we approached several manufacturers to get their thoughts on the matter. BY Prasanth Aby Thomas, Freelancer

What Mistakes do Systems Integrators Often Make?

FEB 2017 ● www.asmag.com

Systems integrators (SIs), by the very nature of their business, are representatives that manufacturers rely on to reach the end users. Depending on how the SI chooses to present a principal’s products, end users will have an impression on the manufacturer and their products.

A

s s u c h , t h i s m e a n s t h e S I’s business is a balancing act, between understanding the offerings of the manufacturer and satisfying the requirements of the

44

customer. This is not easy, given that the former keeps innovating with new products almost every other day and the latter demands lower cost and higher value.

With such pressure over them, it is inevitable that SIs make some mistakes in their approaches towards fulfilling projects. These can either be technical or in terms of their business strategies,


but what is important is that at times such mistakes can prove to be crucial in a work environment. Fortunately, manufacturers themselves are willing to provide certain guidelines pointing out where the usual mistakes are and how they can be corrected. For this article, we asked several manufacturers what they would like to see SIs do less and why. The answers were interesting and here we present them to you.

Training Too Few The training that manufacturers offer is quite important for the SI. For this reason, most SIs send their employees to the solution providers to be up to date with the latest in technology and business. However, some SIs tend to limit the training to a few technicians according to Tyco Security Products. This can prove costly in the short and long term as it is critical that all the technicians at an SI’s business receive ample training to stay on top of the latest technology. “Integrators sometimes feel that having a few technicians in their organization

trained is sufficient, as it is often a decision to sacrifice time spent in the field in favor of time in the classroom for training,” Perry Levine, Senior Product Manager, Software House at Tyco Security Products. “It is crucial that ALL technicians are properly trained and certified, for both installations and future service calls. It can be assumed that, if they are trained on one product, they are knowledgeable on all products, and if they were trained on an older version, no additional training is required. As security solutions become more IT-centric, it is necessary to stay current with the latest upgrades and new technology. To continue to serve customers well and to grow their business, it is important that integrators continue to invest in ongoing training for all technicians.”

give imporTance To STandardS over value In today’s security industry, there is a lot of stress on standards-based solutions. Although this is key to taking the industry forward, such debates often overshadow the importance of providing

value to the customer. Marwan Khoury, Regional Marketing Manager at Axis Communications, pointed this out as he explained his perspectives on what SIs should be doing less of. “To focus less on standards and data sheets when offering customers options and instead focus more on the value of quality that is placed during all phases of design to production and delivery of the technology,” said Khoury. “This focus better positions SIs in ensuring customers receive products that enjoy expanded lifetimes with a lower total cost of ownership with minimized business disruptions.”

delay in conTacTing manuFacTurerS It is natural for SIs run into difficulties in their line of work, especially in terms of the technical aspects at hand. Ideally, when hitting a roadblock SIs should contact the manufacturer as early as possible so that issues can be resolved efficiently. However, Mitchell Kane, President of Vanderbilt Industries, pointed out that this is not always the case. At

45


FEB 2017 ● www.asmag.com

he next big thing in the technology industry is undeniably the Internet of Things (IoT ). The concept of connected devices and the benefits that they bring to users have taken the market by storm. According to the research firm MarketsandMarkets, its market size is estimated to grow from US$ 157.1 billion in 2016 to $661.7 billion by 2021, at a CAGR of 33.3 percent during the period. All industry verticals are undergoing a huge transformation in a bid to move toward affordable, accessible and quality services to their customers. “New applications and use cases, a result of cutting-edge technology innovations, are being developed to address the changing industry needs,” said the research firm in a release accompanying the repor t. “IoT, in combination with cloud computing and big data, is creating lucrative opportunities for organizations.” The physical security industry is keenly watching the development of the IoT market while trying to take advantage of the factors that would assist in making its products more efficient. Several security solution providers have already taken steps to ensure their place as the market moves forward. However, several experts warn that unlike other industries, the physical security industry should be cautious when it comes to adopting IoT systems. This is because the very nature of the physical security industry is to protect and while IoT expands possibilities, it also creates more chances for this protection to be weaker. Recent examples of IoT devices being hijacked by hackers are indeed confirming this possibility of security systems becoming weaker with IoT. Nevertheless, with the right approach, physical security solution providers can reap several benefits from IoT. Traditional security companies who are willing to embrace this new technology have an edge over others, in terms of infrastructure, brand confidence as well as customer base.

50

The MarkeT TransiTion FroM CoMpanies’ perspeCTive Contrar y to other technological developments, IoT is making its presence known among customers. Even end users are becoming aware of the various benefits that the new technologies can bring and expect the solution providers to come up with them. Stressing on the connected home technology in Europe that is expected to reach $19,411 million in Europe by 2021, James Somerville-Smith, Northern Europe Channel Marketing Leader at Honeywell Security & Fire, said that the segment is witnessing tremendous growth.

“As a result of this growing demand, consumers have raised expectations about what their technology can achieve,” said Somerville-Smith. “Many now look to combine various household systems into one solution where systems not only work together, but understand each other. Security systems are increasingly a key part of that.” Stressing further on the demand from consumers, David Ly, CEO of Iveda, said that the market will dictate the transition, and the shift has begun. More and more, customers are demanding ease of use and management and accessibility from their smartphones. This change widens the scope for even non-traditional security companies to

Latest advancements in technology have forced many security companies to enter the realm of IoT and smar In this article we talk to a few companies that have m transition to understand what it takes to succeed in th BY Prasanth Aby Thomas, Freelancer


pitch in with their offerings. “ They want more interaction and control from security systems,” Ly said. “This trend presents more opportunity for non-traditional security technology providers to now play in the security arena. I think it really is an opportunity for the industry to expand on its product and service offerings. In other words, you don’t need to offer traditional video sur veillance/DVR solution or even IP cameras with installation services anymore. The market opportunity is becoming more open and flexible because you no longer need to sell hard traditional security products. For those potential customers who may have passed on

the traditional security alarm or video surveillance system because of high cost and cumbersome installation, they may now want just a doorbell camera or a temperature control system. The new choices bring to the industry more customers.” He added that the company plans to take advantage of this trend by simply being more flexible with the product lineup that they offer. Leveraging the relationship they have with their telecom customers, Iveda will listen to the requests and feedback from their massive customer base. The company will, in turn, seek out technology and manufacturer partners who can help them fulfill the market expectations.

Jeffrey Wu, President of Starvedia Technology, said that the major reason for the transition from traditional security to smart home and IoT-related systems is due to competition and the lowering costs of devices. In short, it can be noted that the customers are key to driving innovation in the field of IoT. As the end users become more and more aware of the innovations that are taking place in the field, they would demand more solutions that are new and effective. At this point, it would be important to take a closer look at these customer requests in this context. No doubt, they are unique in terms of technology, but what would be more interesting is the end results they aim to achieve.

y traditional rt home segments. made this he new market.

51


SMAhome

Five Interesting Non-Traditional Home Security Launches LIFX+ Smart Light Bulb has Infrared Light to Boost Home Security The latest smart light bulbs from LIFX feature infrared lights for home security cameras to see well in the dark. Although most cameras are already equipped with infrared light LEDs, they are usually quite weak. So this latest product from LIFX can provide the needed additional infrared light needed for the cameras to spot things in the dark and provide clearer images. The LIFX+ smart light bulbs will be available as standard A19 light bulbs or BR30 flood lights. It supports Wi-FI connectivity and allows users to control the light via their smartphone app, just like what people now expect from a smart light bulb.

Instead of Cameras, Sunflower System Wants to Protect Homes with Drones

FEB 2017 ● www.asmag.com

Instead of smart cameras or smart doorbells, a Swiss startup came up with another way to improve home security — a flying drone. One disadvantage that cameras are still unable to overcome is that typically when the users are alerted of a situation, the intruder is already close or actively trying to enter the house. The startup’s home security system, the Sunflower System, contains two features: smart lights and flying cameras (on the drone). Solar-powered smart lights with sensors can be installed on the walkways to light up the home property and detect motion, sounds and vibrations. The lights are connected with the camera-equipped drone. When the smart lights sense suspicious activities around the property, the drone will fly to where the action is, record the video and upload it to the cloud. As the drone starts to do this, the users are simultaneously notified via their smartphone app which they can also use to watch the real-time video being captured by the drone.

56


Vayyar Enters Smart Home Market with Non-Camera 3D Imaging Sensor Technology 3D-imaging sensor company, Vayyar, has announced its entry in the smart home market and aims to bring non-camera monitor capabilities to the users. According to Vayyar, its 3D sensor is able to see through walls to detect, identify and track motion. In home environments, the camerafree monitoring environment can provide more privacy to users. Earlier this year, Vayyar debuted a 3D imaging tool called the WalabotDIY which allows users to track home renovation projects, construction and DIY tasks. The device lets users see through drywall or cement to determine where to set up pipes or wires. Vayyar has given some examples of how its technology can be used in a smart home context. Without cameras installed in the home, Vayyar’s 3D imaging sensor possesses the ability to detect when an elderly person falls or stops breathing.

Further combination with other technologies will allow the system to send alerts for healthcare monitoring without violating the user’s privacy in his day-to-day life. Also, the sensor can be used to track real-time movements outside of the house, which offers additional security features to homeowners.

The Mobile App ‘Fortiphi’ Designed as A Tool to Protect IoT Devices at Home A Colorado-based company, Yphi, has launched a mobile app called Fortiphi designed for IoT device protection. By connecting the IoT devices with the mobile app, the user will be able to control and protect the devices from the hackers hijacks through Wi-Fi. When the Fortiphi system detects a connected home device being hacked or an unauthorized attempt to connect to the device, it will isolate the device and send notifications to the user via the app. The user can choose to clear or to keep it quarantined until the intention of the connection is identified. The user can also set a timeline to quarantine connected devices any time they want via the app. Besides detecting cyberattacks, the Fortiphi app

also provides home automation features that will work with Nest’s thermostat, fire alarm and home camera as well as Philips Hue’s lighting devices. According to the company, more smart home devices will be added soon, including products from Samsung and Insteon. The Fortiphi application requires routers which have open source firmware like DD-WRT, DD-WRT NXT or OpenWRT. Companies providing such routers include Linksys, ASUS and Buffalo. Fortiphi also manufactures its own routers. Fortiphi provides three different packages for its app. The free version can be used by customers to test drive the app and lets the user connect and control Nest and Philips Hue devices at home. However, a subscription fee is required for continued complete protection of home devices.

An A.I.-based Wi-Fi Router Protects Connected Devices at Home The Wi-Fi router, Gryphon, has a built-in software that monitors connected devices for unusual activities when it is plugged into a broadband modem. With Gryphon, devices connecting via Wi-Fi such as smart thermostats and webcams can be managed during cyberattacks. The router can also scan ordinary traffic with antivirus tools. Gryphon is continously synced with the threat database from Kaspersky, a service provider in internet security, to help prevent virus attacks via IoT devices. Gryphon works with an app that the user can use to set up different internet access rights on various home

devices. When one of the devices requests access for some websites, the router will send real-time notification via the app and the parents can send permission back. The app also provides approval ratings about the websites being accessed. Gryphon has six high-powered built-in internal antennas. It supports 2.4 GHz and 5 GHz Wi-Fi radios as well as 802.11gbn and AC standards. According to the company, one Gryphon is able to cover up to 2055 square feet.

57


Home8 Indoor Outdoor Security System Features:

• S elf-monitored – no need to pay high monthly fees for professional monitoring • Video verification – can confirm a break-in or other event via video • Multiple applications – safety, security, video, fire and more • Cloud-based platform – extremely secure • One-touch-to-responder calling – one push of a button on your phone to contact authorities • Easy to install

■Home8/U.S. ■Email: sales@home8alarm.com

Hanwha Techwin PNM-9020V 7.3 MP Multi-sensor 180˚ Panoramic Camera

Arecont Vision MicroDome Duo AV4655DN-08 Dome IP Camera Features:

• M ax. 7.3-MP (4096 x 1800) resolution • Built-in 3.6 mm fixed lens • H.265/H.264: max. 30fps at all resolutions; MJPEG: max. 15fps at all resolutions • H.265, H.264, MJPEG codec supported; multiple streaming • Motion detection, hand over to PTZ, tampering, defocus detection, digital auto tracking, heatmap • SD/SDHC/SDXC (128 GB) memory slot, PoE+/12V DC

• S NAPstream (Smart Noise Adaptation and Processing) reduces bandwidth without impacting image quality • True day/night functionality with mechanical IR cut filter • CorridorView allows 90° image rotation for better coverage in hallways and corridors • Dual encoder H.264/MJPEG • Remote focus module • All-in-one H.264 total power over ethernet (PoE) solution

■Hanwha Techwin Europe/U.K. ■Email: help.cctv@hanwha.com

■Arecont Vision/U.S. ■Email: support@arecontvision.com

Features:

EOC IX8060 Thermal Camera Features:

• E fficient and powerful thermal imaging – inexpensive thermal IP camera and specialized S/W, real-time thermal video imaging for live temperature monitoring • Effective multi-channel thermal monitoring – provides effective multi-channel thermal monitoring with specialized VMS S/W (max. 120 channel monitoring) • Useful additional functions of specialized S/W – provides handy multi-channel thermal monitoring with features such as max. temperature, 3-step alarms, voice warnings, etc.

IndigoVision Enterprise NVR-AS Features:

FEB 2017 ● www.asmag.com

• D istributed Network Architecture (DNA) – intelligence is at the edge of the system with no reliance on a central server; provides resilience and redundancy • Firewall – a security feature that regulates incoming and outgoing network traffic to guard against potential malicious attacks on the system • JPEG2000 – a still-image compression standard that allows images to be displayed in multiple resolutions • 30fps is guaranteed at the maximum resolution using IndigoVision’s unique video processing technology • H.264 – a motion-based video compression format ■IndigoVision/U.K. ■Email: IR@indigovision.com

• S upportive network protocols for device control – provides flexible interface for easy device control with TCP/IP type network protocol. • Built-in PoE (IEEE 802.3af) allows easy and cost-effective installation; power supply is secured in case of power failures with back-up power ■EOC/Korea ■Email: sales@eoctech.net

FLIR Systems GFx320 OGI Camera Features:

• C apable of visualizing methane, propane, butane, and hundreds more hydrocarbons and volatile organic compounds (VOCs) • Independently tested and certified for use in hazardous locations • Designed with the operator’s comfort in mind, with features that allow users to maintain three points of contact during operation

■FLIR Systems/U.S. ■Email: visiblesales@flir.com

Digital Watchdog DW Witness Mobile Application Features:

• • • • • •

ontrols the recording from the app C Supports front and rear cameras Provides a “Black Box” for vehicles or personnel Video resolution: 1080p, 720p, 480p or 288p Frame rate: 30fps, 25fps, 15fps or 5fps Auto flash, flash on or off

■Digital Watchdog/U.S. ■Email: patrick@digital-watchdog.com

60

• A ppends required GPS data to images and videos, and verified to meet sensitivity standards defined in US EPA OOOOa methane rule • Rubberized optics and rugged camera housing designed specifically for tough work environments • Calibrated for temperature measurement so users can insure thermal contrast between gas compounds and the background


Lenel OnGuard 7.3 Security Management System Features:

• L enel Console app included • App support for optional OnGuard credentials module • Support for Lenel BlueDiamond Mobile, HID Mobile Access, Allegion aptiQmobile • Integrated authentication of FIPS-201 credentials on LNL-4420 • OnGuard/Prism bi-directional event exchange ■Lenel (part of UTC Climate, Controls & Security)/U.S. ■Email: orderentry@lenel.com

Vicon Valerus Video Management Software Features:

• B uilt on ONVIF standard foundation – widely adopted industry common open protocol • Single point of management and operation • Intelligently lowers bandwidth demands and increases storage capacity • Three-tier licensing levels and protection packages offer room to grow • Separate modules safeguard against risk of interruption

360 Vision Technology Eclipse HD Stainless Steel Camera Features:

• F ull 1080p high definition camera • Anti-corrosive 316L stainless steel • Onboard LED illumination – IR or IR and White Light options • Built-in wiper • Sony Starvis camera module – Ultra Low Light • 30x optical zoom

■Vicon Industries/U.S. ■Email: sales@vicon-security.com

■360 Vision Technology/U.K. ■ Email: info@360visiontechnology.com

Matrox Graphics Maevex 6100 Quad Encoder Card Features:

• • • • •

4 K/UHD and Full HD multi-channel capture, encode and stream AV-over-IP Transmission of live or recorded content to and from multiple video-on-demand platforms H.264/MPEG-4 Part 10 (AVC) RTSP, RTP and MPEG2.TS streaming support with an onboard RJ45 network connector Capable of simultaneous streaming and/or recording to shared network drives or network attached storage

■Matrox/Canada ■Email: graphics@matrox.com

AXIS Companion Dome WV Camera Features:

• W ireless communication with support for IEEE 802.11a/b/g/n • HDTV 1080p video quality and 2-MP resolution and WDR • Comes with a 64 GB AXIS Companion Card included • HDMI output for connection to monitors • Vandal- and dust-resistant ■Axis Communications/Sweden ■Email: axis-sap@axis.com

Panasonic i-PRO Extreme WJ-NX400 Network Disk Recorder Features: • • • • • •

6 4 Channels – max. 128 (H.265/264) 384 Mbps recording bandwidth Secure communication and Symantec device certificates Built-in GUI and dual HDMI outputs External storage expansion up to 270 TB Dynamic HDD power management increases HDD life

■Panasonic Security System/Japan ■Email: panasonicwebcasesf@us.panasonic.com

Tascent InSight One Iris and Face Recognition System

■Tascent/U.S. ■Email: info@tascent.com

Features:

• C aptures high quality dual iris and face images in about 2 seconds at a standoff distance of 0.5 to 1.0 meters • Customizable LCD and LED user interface is seamlessly integrated into the precision-crafted aluminum enclosure • High quality face and iris images that meet or exceed demanding ISO/ICAO standards for format and quality • Fully automated capture process supported by real-time feedback enables intuitive operation even for non-acclimated users • On-demand face capture for multiple poses • Can be integrated as a secure locked-down network appliance or point-to-point USB peripheral

61


Show Calendar

Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

WORLD SECURITY EXHIBITION DIRECTORY MARCH

PROTECT

ISC BRASIL

JUNE

• Date: 2017/04/18–04/20 • Venue: Expo Center Norte, São Paulo, Brazil • Tel: +55-11-3060-4717 • Email: atendimento@reedalcantara. com.br • URL: www.iscbrasil.com.br

IFSEC INTERNATIONAL

• Date: 2017/03/07–03/09 • Venue: Pak-China Friendship Centre, Islamabad, Pakistan • Tel: +92-21-111-734-266 • Email: info@safesecurepakistan.com • URL: www.safesecurepakistan.com

• Date: 2017/03/29–03/30 • Venue: SMX Convention Center, Manila, Philippines • Tel: +632-818-6828 • Email: leverage@leverageinternational.com • URL: www.protect.leverageinternational.com

• Date: 2017/06/20—06/22 • Venue: ExCel London, London, U.K. • Tel: +44-20-7921-8231 • Email: ifseccustomerservice@ubm. com • URL: www.ifsec.co.uk

APRIL

MAY

JULY

• Date: 2017/04/05–04/07 • Venue: Sands Expo & Convention Center, Las Vegas, U.S.A. • Tel: +1-203-840-5602 • Email: inquiry@isc.reedexpo.com • URL: www.iscwest.com

• Date: 2017/05/03–05/05 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-7966-222-505 • Email: agnius.kazlauskas@ubm.com • URL: www.ifsec-global.com/philippines/

SECUTECH INDIA

EXPOSEC

• Date: 2017/04/06–04/08 • Venue: Bombay Exhibition Center, Mumbai, India • Tel: +91-22-4286-3800 • Email: info@secutechexpo.com • URL: www.secutechindia.co.in

• Date: 2017/05/23–05/25 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: info@fieramilano.com.br • URL: www.exposec.tmp.br

SECUTECH INTERNATIONAL

SECUREX

• Date: 2017/04/12–04/14 • Venue: Nangang Exhibition Center, Taipei, Taiwan • Tel: +886-2-8729-1017 • Email: kirsten.wu@newera. messefrankfurt.com • URL: www.secutech.com

• Date: 2017/05/30–06/01 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: leighm@specialised.com • URL: www.securex.co.za

SAFE SECURE PAKISTAN

SECURITY SHOW • Date: 2017/03/07–03/10 • Venue: Tokyo Bright Sight, Tokyo, Japan • Tel: +81-3-3512-5670 • Email: tradefairs2017@smj.co.jp • URL: https://messe.nikkei.co.jp

EXPO SEGURIDAD • Date: 2017/03/14–03/16 • Venue: Centro Banamax, Mexico City • Tel: +1-203-722-7351 • Email: joliver@reedexpo.com • URL: www.exposeguridadmexico.com

MIPS • Date: 2017/03/21–03/24 • Venue: Expocentre Fairgrounds, Moscow, Russia • Tel: +7-499-750-08-28 • Email: valentina.michaelson@ite-exhibitions.com • URL: www.securika-moscow.ru

ISC WEST

IFSEC PHILIPPINES

SECURITY EXHIBITION & CONFERENCE • Date: 2017/07/26—07/28 • Venue: International Convention Centre Sydney, Darling Harbour, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au

AUGUST

SECUTECH VIETNAM • Date: 2017/08/16—08/18 • Venue: Saigon Exhibition & Convention Center (SECC), Ho Chi Minh City, Vietnam • Tel: +886-2-8729-1016 • Email: stvn@newera.messefrankfurt.com • URL: www.secutechvietnam.com

CompanieS in ThiS iSSue PRODUCTS OF THE MONTH • Bell & Wyson • Cognitive Systems • Fortress Cyber Security • Mu Design • Ring • Symantec • Yubico

FEB 2017 ● www.asmag.com

VERTICAL SOLUTION • Academy of Arts University • AMAG Technology • Arteco • ASSA ABLOY • Axis Communications • Blackboard • Convergint Technologies • George Mason University • HID Global • Kratos Public Safety & Security Solutions • Microbiz Security Company • S2 Security 58

INDUSTRY REPORT • Allegion • Arteco • Axis Communications • AxxonSoft • Bosch Security Systems • Genetec • IHS Markit • IDIS • Oncam • Panasonic • Pivot3 • Qognify • Vanderbilt Industries • Verint • ZKAccess INTEGRATED SYSTEM • Arteco • OnSSI • Vanderbilt Industries • Verint Systems

SMART TECHNOLOGY • iOmnicient • Ipsotek • PureTech Systems VIEWPOINT • AMAG Technology • Axis Communications • HID Global • IDIS • Tyco Security Products

nexT iSSue

• Vanderbilt Industries • Verint Systems BUSINESS TALK • ASSA ABLOY EMEA • Honeywell Security & Fire • Iveda • Starvedia Technology

VERTICAL SOLUTION | Airport Security INTEGRATED SYSTEM | Physical Identity Management SMART TECHNOLOGY | Cybersecurity IoT & BIG DATA | Smart Parking


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.

MAJOR ITEM

COUNTRY

E-MAIL

SURVEILLANCE

CHINA

overseas@dahuatech.com

13

FUJIAN FRAN OPTICS CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

11

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

3

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

9

RICOM

LENS

CHINA

sales@forecam.com

2

RIFATRON CO., LTD.

DVR

KOREA

contact@rifatron.com

63

SHENZHEN COMMANDER TECHNOLOGY CO., LTD.

CASING

CHINA

sjw@yjdcase.com

4, 5

SONY SEMICONDUCTOR SOLUTIONS CORPORATION

SEMICONDUCTOR

JAPAN

-

INSIDE BACK COVER

TAMRON CO., LTD.

CAMERA

JAPAN

newbiz@tamron.co.jp

7

TECHPOINT INC.

CHIPSET

USA

dma@techpointinc.com

COUNTRY

E-MAIL

ACCESS CONTROL PAGE NO.

ADVERTISER

MAJOR ITEM

41

GIGA-TMS INC.

RFID MODULE / LOCK / READER TAIWAN

promag@gigatms.com.tw

53

UWC ELECTRIC (M) SDN. BHD.

ACCESS CONTROL

MALAYSIA

sales@uwcelectric.com

INTRUSION ALARM PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

6

KMT CO., LTD.

ALARM

KOREA

overseas@isaso.com

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

63


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.