Contents Vertical Solution
19 The Integral Role of
Middle East Security Market Strides Toward Growth
Security in Smart Buildings
Security and safety systems play an instrumental role in the "smartness" of a smart building.
The growth in the market was not without obstacles. Industry players, however, have risen to the challenge.
22 New Developments
Make Managing Office Visitors Easier
Keeping track of visitors entering and exiting an office building can be difficult and time consuming.
10 Application Cases 54 SMAhome 58 Show Review 60 New Products /Show Calendar 62 Companies in This Issue
Smart Buildings Integrate
With Systems With integrated comprehensive security and fire and life safety system oversight in place, facility managers are better equipped to minimize disruption and focus on creating what matters most: a safe and secure environment, maximum efficiency and uptime, and a healthy bottom line.â€? Joe Oliveri, VP and GM, Security, Building Technologies and Solutions, North America, Johnson Controls The Integral Role of Security in Smart Buildings, p. 19
The market for smart buildings is growing quickly, driven by smart city initiatives around the globe and the desire for better energy efficiency.
WEBSITE ARTICLES https://www.asmag.com Big Data Pushes Advanced Business Intelligence Solutions Having a platform that analyzes and makes sense of customer or operational data is becoming a critical requirement for industries such as retail or hospitality.
Get Insights From Events via Connected Devices, Data
A difficulty for organizers is measuring and quantifying the overall performance of events. With data generated by wearables and other connected devices, these challenges can now be addressed.
Editorâ€™s Note Major Industry Consolidation and Convergence Continues Two major industry consolidations were announced in the beginning of 2018. Motorola Solutions acquired Avigilon with an approximate US$1 billion transaction. Their joint announcement pointed out that this acquisition would boost Motorola Solutions, particularly in national government security and law enforcement. Seeing the important role of intelligent video on the rise in safe cities and business intelligence, the acquisition is a good fit for Motorola to acquire cameras that feed into safety workflows. In regard to convergence, this can be seen with Bosch Security Systems. The division has been renamed Bosch Building Technologies. Its product business sector will be known as Bosch Security and Safety Systems to include all the security and safety related products. Its systems integration sector should benefit a lot in order to provide commercial buildings with a more fit solution, including security, automation and energy services. These two headlines show security and safety technologies being gradually recognized by all verticals and commercial/government applications. Video and all security and safety-related data are proven to provide a lot of business values to achieve different purposes, which give systems integrators more opportunities. However, from a product supplierâ€™s point of view, the challenge will be in the increasing investment in software and its compatibility and interoperability in multiple applications.
KEEP IN TOUCH WITH...
SOCIAL MEDIA www.facebook.com/ asmagglobal
www.linkedin.com/ company/ asmagglobal
EDITOR-IN-CHIEF JILL LAI
Global Security News Media Platform FOLLOW US:
SENIOR REPORTER WILLIAM PAO
EXECUTIVE EDITOR EMILY LIN
Face recognition is a growth market whose compound annual growth rate is forecasted at 14 percent up to 2022. More and more, this functionality has been moved to the edge as manufacturers roll out smart cameras with face recognition capabilities. Equipped with advanced GPUs/CPUs and deep learning algorithms, these cameras can detect and recognize faces with improved accuracy.
The Middle East security market has seen its share of ups and downs in recent years; however, 2017 marked a period of gradual recovery. Compliance with security requirements continue to be a major driver for growth, while industry players saw opportunities growing across the region from users interested in leveraging their security systems for applications beyond security.
Products of the Month
Encrypt Data as Cyberthreats Grow
Shure Network Audio Encryption
Modern technology is continuously evolving. All our data is now transmitted through the internet and the need to protect our data is essential as cyberthreats grow. Data encryption is a technology that has gained popularity due to its ability to convert information to a code, which prevents unauthorized access. The technology is especially helpful with the cyber problems we face today, which addresses the privacy concerns and data protection demands from users.
hure has considered the unique security needs of our customers and developed technology to safeguard content without compromising audio quality. Shure Network Audio Encryption uses AES-256 crypto technology to protect confidential content. The AES-256 encryption algorithm has been adopted as one of the safest forms of network protection by leading financial institutions, government bodies and healthcare services. Only Shure devices with the correct pass phrase will permit audio to be heard. With Shure Network Audio Encryption enabled, Dante audio is encrypted before being sent over the network. When it is received by another Shure device that supports this feature, it is decrypted and forwarded for IntelliMix processing or analog conversion. Key Features • Safeguards confidential content without compromising audio quality • AES-256 crypto technology • Utilizes a user-configured passphrase on each device • Can be combined with other network security measures to create multilayered security solution • Available with Microflex Advance Ceiling and Table Array microphones, the IntelliMix P300 Audio Conferencing Processor, and selected Audio Network Interfaces
Supplier: Shure URL: www.shure.com
VdoCipher Secure Video Streaming
doCipher provides video streaming solutions for businesses to help them stream content on their site or app in a smooth, secure and affordable manner. The key feature is highest security from online video piracy through DRM encryption, licensing and watermarking technologies. It ensures that no downloader or hack is able to download and pirate online content. This helps portals to earn maximum revenues from their premium videos. VdoCipher serves media and e-learning enterprises from 30+ countries with its offerings. Key Features • Encrypted streaming • Watermarking and DRM • Buffer retention • Customizable player • Analytics • Upload from anywhere
Supplier: VdoCipher URL: www.vdocipher.com
Gemalto SafeNet ProtectApp
ematlo’s SafeNet ProtectApp provides an interface for key management operations, as well as application-level encryption of sensitive data. Once deployed, data is kept secure across its entire lifecycle, no matter where it is transferred, backed up or copied. Using Safenet ProtectApp APIs, both structured and unstructured data can be secured in multi-vendor application server infrastructures. SafeNet ProtectApp’s application-level encryption can be deployed across on-premises, virtual, cloud and hybrid environments.
Key Features • Apply transparent and efficient encryption to all types of sensitive application-level data across on-premises, virtual, public cloud and hybrid environments • Works with SafeNet KeySecure to provide centralized administration of all keys and policies • Granular access controls to ensure only authorized users or applications can view protected data • Support for Format Preserving Encryption (FPE), including flexible key management interfaces, as well as multiple interfaces to support the full key management lifecycle • Broad standard and interface support, including web services (SOAP and REST) • Built-in, automated key rotation and data re-keying
Supplier: Gemalto URL: www.gemalto.com
Mobotix Cactus Concept
he objective of the Cactus Concept is to implement a multimedia cybersecurity campaign in order to raise awareness among potential and existing MOBOTIX customers of the importance of data security in network-based video security systems and how organizations can protect themselves through cost-efficient and intelligent solutions. End-to-end encryption with no blind spots is required, from the image source via the data cables and the data storage through to the video management system on the user’s computer. Like a cactus, whose every limb is covered in thorns, all of the modules (camera, storage, cables, VMS) in the MOBOTIX system have digital thorns that protect them from unauthorized access.
Key Features • Set of built-in tools and features that allows administrators to configure each device as multi-layered approach to cyberattacks • Uses the services of SySS to examine the security of both n and hardware • Provides end-to-end encryption with no blind spots software
Supplier: Mobotix URL: www.mobotix.com
Thales Vormetric Data Security Platform
he Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, the data security protection platform features multiple data security products that can be deployed individually or in combination to deliver advanced encryption, tokenization and centralized key management. This data security solution prepares your organization for the next security challenge and new compliance requirement at the lowest TCO.
Symantec Information Centric Encryption
ymantec’s information centric encryption protects sensitive data, wherever it is, ensuring access only to authenticated users. The solution prevents data loss by revoking user access with central monitoring and controls. Information Centric Encryption delivers strong, simple protection that follows data wherever you store, use or move it. It protects data with enterprise-strength techniques through the integration with Symantec Data Loss Prevention, Symantec CloudSOC (Cloud Access Security Broker) or Symantec Information Centric Tagging technologies. Using highly accurate data discovery engines, sensitive data is detected on premises, in cloud and mobile locations. Alternatively, users can identify and classify files and emails that contain sensitive data. Key Features • Protects sensitive data in the hands of third parties • Finds and deletes rogue copies • Supports application data and a broad set of file formats to meet the needs of the user’s information ecosystem • Keys can be stored in a customermanaged Amazon Web Services account
Supplier: Symantec URL: www.symantec.com
Key Features • FIPS 140-2 compliant virtual appliance or hardware appliance • Supports environments such as physical server, virtual server, public-private-hybrid cloud, big data, container • Encryption techniques: advanced encryption standard (AES), format preserving encryption (FPE), granular database, transparent file-level, cloud gateway • Data pseudonymization techniques: cryptographic tokenization, random tokenization, dynamic data masking, static data masking, batch transformation
Supplier: Thales Security URL: www.thalessecurity.com
Senetas CM7 Network Encryption Management Senetas CM7 Network Encryption Manager (CypherManager) is Senetas’ innovative encryption management platform. Designed as an element manager, it enables the intuitive management of the full range of Senetas CN network encryptors, across all Layer 2 Ethernet and Fibre Channel network protocols and topologies. Encryption management includes real-time status monitoring, configuration changes and certification. CM7 is a Windows or Linux-based application that loads onto a PC and uses SNMPv3 to configure, manage and monitor your encryptors. Featuring a simple, intuitive user interface, CM7 provides users with the ability to view and configure multiple devices on screen at the same time; making the configuration of endpoints quicker and easier. Key Features • Secure in-band and out-of-band remote management using SNMPv3 • Automatic detection and management of Senetas encryptors • Real-time monitoring and display • Integrated certificate authority • Purpose-built graphical management tool
Supplier: Senetas URL: www.senetas.com
Avigilon Acquired by Motorola Solutions Finally, after all the speculation in the market, Avigilon has a new owner — Motorola Solutions, whose portfolio of mission-critical communications technologies can be enriched by Avigilon’s video and analytics solutions. BY William Pao
n a joint statement by the two dated Feb. 1, Motorola Solutions said it has entered into a definitive agreement to acquire Avigilon in an all-cash transaction, buying all of Avigilon’s outstanding shares for CAD$27 per share, higher than the company’s closing value of CAD$22.82 on Feb. 1. The enterprise value of the transaction is approximately US$1 billion, including Avigilon’s net debt. Avigilon, based in Vancouver, British Columbia, designs, develops and manufactures advanced security surveillance solutions, including IP cameras, video management software and video analytics, like Appearance Search and Unusual Motion Detection, that issue alerts in real time when a person, object or vehicle of interest is detected. Targeted vertical markets include airports, banking, casinos, city surveillance, critical infrastructure, education, healthcare and retail. The company also holds more than 750 US and international patents. The acquisition of Avigilon seems a good fit for Motorola Solutions, whose offerings to their targeted verticals, including in particular national government security and law enforcement, can be boosted with video surveillancerelated products and solutions. “This acquisition will bring Avigilon’s advanced video surveillance and analytics platform to
the rapidly evolving public safety workflow, while also expanding our portfolio with new products and technologies for commercial customers,” the statement cited Greg Brown, Chairman and CEO of Motorola Solutions, as saying. “Video can play a powerful role in creating safer cities and thriving businesses. It can serve as highly efficient ‘eyes and ears’ for monitoring a given location, and advanced video analytics can proactively alert officials to a perimeter breach or quickly find a person who left behind an object of interest.” “We’re very pleased to be joining Motorola Solutions, as their vision and strategy aligns fully with our own,” Avigilon’s founder, CEO and Chairman Alexander
“This combination will bring new opportunities to Avigilon, allowing us to accelerate our innovation and provide even more value to our customers.” Fernandes said in the statement. “This combination will bring new opportunities to Avigilon, allowing us to accelerate our innovation and provide even more value to our customers.” Avigilon ranks No. 12 on a&s International’s 2017 Security 50 with 2016 revenue of $280.7 million. Motorola Solutions had $6 billion for that year. “Motorola
APPLICATION CASES Hospitality BOSCH EQUIPS GOLDEN TOWER PANAMA HOTEL WITH COMPREHENSIVE SECURITY SYSTEM With 285 upscale bedrooms and suites offering panoramic views of the city, the 30-story Las Américas Golden Tower Hotel Panama, designed by Uruguayan architect Carlos Ott, is a landmark in the heart of the Panama’s financial and business district. Its auditorium for up to 460 people and seven flexible conference rooms including restaurants and bars host illustrious events ranging from the Panama Film Festival to the International Meeting of Economists, to the Mercedes-Benz Fashion Week Panama. Bosch provided the new hotel with a comprehensive, state-of-the-art safety and security system covering fire protection, public address, access control and video security. The objective was the highest safety and security for guests, visitors and staff, with security being as unobtrusive and invisible as possible, blending in with the interior design of rooms and common areas.
Solutions has sufficient capital resources, including cash on hand and available commercial credit facilities, to complete the transaction,” the statement said. The statement further said the transaction is expected to be completed by the end of the second quarter of 2018, subject to customary closing conditions, including regulatory, shareholder and court approvals. The impact of the deal on Avigilon’s existing distributors and partners remains to be seen.
117.6 mil. UK major ports handled 117.6 million tons of freight in Q3 2017.
Source: UK Department for Transport
a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.
Data Pushes Business Intelligence Solutions With the arrival of the Internet of Things, data has becomes more available. That said, having a platform that analyzes and makes sense of this data, therefore, becomes critical. BY William Pao
tartups and growing businesses track key performance indicators closely, and data teams spend a lot of time to condense operational data, such as payments, CRM records and orders, into insights,” said Vincent Woon, Co-Founder of Holistics Software, which provides business intelligence solutions. “Holistics provides both the analysis and automation capabilities for teams to move away from the mundane and focus on understanding drivers of business growth.” According to Woon, what makes their solution unique and special is that all the data analytics is done on a single platform, as opposed to deploying one tool each for data preparation, reporting automation, visualization and advanced analytics. “Such a setup increases cost and reduced flexibility, especially as decision makers desire quicker turnaround from analysts. With one product that requires no additional training, teams can get started in under 10 minutes and build impactful visualizations for executive consumption,” he said. Holistics’ backend is hosted on the cloud, and the product is built on a Ruby-on-Rails stack with
a VueJS front end, Woon said. “As Holistics sits between a user writing queries and the database that is being queried, a lot of input/output operations, querying and displaying of data, and rendering of visualization are the key functionalities. Doing these in a quick, responsive, and within a browser window drives us to be efficient and lean,” he said. Meanwhile, with artificial intelligence (AI) and deep learning becoming more common, Woon said that Holistics can be an enabler in this regard, too. “Holistics will be an enabler for organizations that wish to adopt AI into their products, as model building requires data to be organized, categorized and automated. Holistics’ data preparation suite perfectly complements data science teams by reducing the effort in creating data sets, and improving the time taken to make changes as data scientists can make changes to SQL on the fly,” he said. “On the other hand, the analysts that Holistics empowers to answer business questions with data may find some of their duties replaced by voice assistants.”
Ports VIDSYS SECURES DP WORLD LONDON GATEWAY PORT Vidsys, a global provider of physical security information management (PSIM) and converged security and information management (CSIM) software, announced that London Gateway, a port owned and operated by DP World, has implemented Vidsys port-wide to increase security and provide overall situational awareness capability. DP World London Gateway has been a Vidsys end customer since 2016 and has partnered with Vidsys on recent expansion projects. The trade-enabling port operator selected Vidsys due to its open platform architecture and vast agility for future growth and innovation, while being able to manage all sensors and systems from one unified view. DP World London Gateway is the United Kingdom’s first 21st century major deep-sea container port located next to Europe’s largest logistics park. Situated on the north bank of the River Thames, it provides unrivalled deep-sea shipping access.
Countries Differ on Tackling Cloud Data Security, Poll Shows A recent survey shows the level of security applied to data in the cloud varies by country. BY William Pao
rocessing and storage of data in the cloud has become more and more common. Against this backdrop, securing data in the cloud has also become critical. While end users in different markets across the globe realize this point, a recent survey shows that the level of security applied to data in the cloud varies from country to country. The research was conducted by the Ponemon Institute on behalf of Gemalto, with 3,285 IT and IT security practitioners surveyed across the U.S. (575), U.K. (405), Australia (244), Germany (492), France (293), Japan (424), India (497) and Brazil (355). The study reveals that while the vast majority of global companies (95 percent) have adopted cloud services, there is a wide gap in the level of security precautions applied by companies in different markets. In particular, German businesses are almost twice as likely to secure confidential or sensitive information in the cloud (61 percent) than British (35 percent), Brazilian (34 percent) and Japanese (31 percent) organizations, the numbers show. The study further shows that Germany’s lead in cloud security extends to its application of controls such as encryption and tokenization. The majority (61 percent) of German organizations revealed they secure sensitive or confidential information while being stored in the cloud environment, ahead of the U.S. (51 percent) and Japan (50 percent), the poll shows. Also according to the survey, about half of respondents say that payment information (54 percent) and customer data (49 percent) are at risk when stored in the cloud. Due to this perceived risk, almost all (88 percent) believe that the new General Data Protection Regulation (GDPR) to be implemented in Europe will require changes in cloud governance, the survey shows. Meanwhile, the survey reveals that threequarters of global respondents (75 percent) think it is more complex to manage privacy and data protection regulations in a cloud environment than on-premise networks.
The market for smart buildings is growing quickly, driven by smart city initiatives around the globe and the desire for better energy efficiency. While challenges regarding knowledge of new technologies and budget are obstacles to adoption, the immense benefits smart buildings have on operational efficiency and cost savings will help the market really take off. BY Eifeh Strom, Freelancer
here is no denying buildings are getting smarter. By 2022 the global smart building market is expected to reach US$31.7 billion, at a compound annual growth rate (CAGR) of 33.7 percent from 2017 to 2022, according to a report by MarketsandMarkets. A growing demand for integrated security and safety systems, along with increasing government initiatives for smart building projects are among those driving market growth. The smart cities market is also growing rapidly, and smart buildings are playing an integral role. In fact, smart buildings will make up 7 percent of the total global smart city market in 2025, according to Frost & Sullivan. Furthermore, with several research firms expecting the global smart cities market to surpass $1 trillion in the next few years, the opportunity for growth is exponential.
Smart City Initiatives Boosting Adoption
As more and more governments around the world strive to make their cities smart, buildings are looking for ways to increase operational and financial efficiency to keep up with the smart trend. According to MarketsandMarkets, increased initiatives to build smart and intelligent structures by European governments is why the region is expected to account for the largest market share during the period 2017 to 2022. Terrence McManus, VP of Business Development at BuildingIQ argued the adoption of smart building technologies should be supported and driven by infrastructure-based utilities, cities, governments and building owners, in support of climate change initiatives. â€œThis adoption effort
Keeping track of visitors entering and exiting an office building can be difficult and time consuming. With the latest developments in visitor management systems, along with integration of systems such as access control, security and emergency dispatch, keeping track of and utilizing visitor data has gotten easier and better than ever. BY Eifeh Strom, Freelancer
Deve Off Visit
New elopments ffice itors
Martin Brooker, CEO, CondecoAmericas
n a daily basis a large office building sees a variety of visitors come through its doors. Whether it be delivery personnel needing to deliver packages, businessmen visiting clients or temporary workers only there for a few weeks, it is important building security operators know exactly who is on the premises at all times. Visitor management systems are there to do just that, and with an increasing need to strengthen safety and security at the workplace, such a system could have immense benefits. Globally the visitor management software market is expected to reach US$6.3 billion by 2025, up from $1.2 billion in 2015, according to a recent report by Zion Market Research. The market is expected to grow at a compound annual growth rate (CAGR) of around 17.3 percent between 2017 and 2025. The report attributes growth to the increasing implementation of paperless administrative operations, with future opportunities for growth as a result of a current lack of awareness regarding the potential benefits of visitor management software and slow rate of adoption in developing countries. In terms of regional adoption, North America dominates the market. â€œThe major factor for the dominance is high importance in order to strengthen safety and security of the work premises and supporting existing infrastructure to deploy visitor
Joe Oliveri, VP and GM, Security for Building Technologies and Solutions, North America, Johnson Controls
Gaoping Xiao, Director, Sales, APAC, AMAG Technology
Technology â€” Deep Learning
Deep Learning and AI to Increase Security & Efficiency
What was once considered something out of a science-fiction movie is now being applied to almost every industry you can think of. Artificial intelligence and deep learning are here and they are increasing efficiency across industries. BY Eifeh Strom, Freelancer
ver the past few years, the artificial intelligence (AI) market has grown rapidly. With the advancements in processing power and the plethora of information now available as a result of IoT proliferation, more and more industries are putting AI to work. In markets such as retail, an increasing necessity for superior surveillance and monitoring at physical stores, growing awareness and application of AI in the retail industry, enhanced user experience, improved productivity, return on investment (ROI), mainlining inventory accuracy, and supply chain optimization are all driving AI adoption, according to a report by MarketsandMarkets. Growth of AI in the global retail market is expected to reach US$5 billion by 2022, up from $736.1 million in 2016, the report stated. In addition to AI, deep learning has also gained prominence. Despite often being lumped together with machine learning, deep learning takes machine learning a step further by creating smarter, more actionable intelligence through the use of deep neural networks (DNN). The market for deep learning is expected to be worth $1.8 billion by 2022, growing at a compound annual growth rate (CAGR) of 65.3 percent between 2016 and 2022, according to MarketsandMarkets. The report attributes growth to increased R&D activity for the development of
better processing hardware for deep learning, growing adoption of cloud-based technology, and the growing usage of the deep learning technology across various industries. In the U.S. alone, the deep learning market is expected to grow at a CAGR of over 57 percent during the period 2017 to 2021, as stated in a report by Technavio. â€œIndustries across the U.S. are striving hard to channelize and optimize multiple facets of operations, including data analysis, storage, strategy and decisionmaking. Deep learning has surfaced as a powerful tool that assists industries in improving the programming of automated machines/equipment and inducing self-learning capabilities,â€? the report said. In this article, we will focus on how AI and deep learning are being applied in the physical security industry and how it is helping drive building efficiency.
Using Deep Learning and AI in Security
Words such as big data and the IoT have been hot topics in the last few years. Better image resolution and the IoT have created a massive amount of data, which makes sifting through and maximizing it much more daunting. To
meet these demands, camera and software manufacturers are incorporating AI and deep learning technologies into their analytics. These advances in technology are helping to tackle all this information, thereby increasing the overall effectiveness and efficiency of such systems. In security alone the AI market was valued at roughly $3 billion in 2016, according to MarketsandMarkets; it is expected to reach $34.8 billion by 2025, at a CAGR of 31.4 percent during the period 2017 and 2025. “Today’s security industry has reached a critical mass in the volume of collected data and the limits of human attention to effectively search through that data,” said Willem Ryan, VP of Global Marketing and Communications at Avigilon. “As such, the demand for video analytics is increasing globally. Through the power of AI, Avigilon is developing technologies and products that dramatically increase the effectiveness of security systems by focusing human attention on what matters most.” Avigilon’s Appearance Search technology, a sophisticated deep learning AI search engine, is designed to make searching surveillance footage easy. “It incorporates the unique characteristics of a person’s face, as well as shape, size, texture, color, clothing and accessories, to quickly locate a specific person of interest across an entire site,” Ryan explained. “Using the unique combined features of a face based on hair color, texture and other facial features and accessories, this technology is designed to increase the speed and accuracy of investigations by detecting and understanding that it is searching for the same person, even if items such as their clothing change over time.” AI is also being used to bring a new level of automation to surveillance. An example is Avigilon’s Unusual Motion Detection (UMD) technology. “Without any predefined rules or setup, UMD technology is able to continuously learn what typical activity in a scene looks like, and then detect and flag unusual motion. This allows operators to search through large amounts
of footage faster, as UMD focuses their attention on the atypical events that may need further investigation, helping to reduce hours of work to minutes,” Ryan added. Tom Edlund, CTO of BriefCam explained how the use of deep learning helps them achieve significantly higher accuracy than traditional computer vision algorithms, provided there is sufficient data for training and enough resources to compute. “BriefCam offers applications for rapid review and search, real-time smart alerts and quantitative analysis of video from surveillance cameras. Our video processing module uses deep neural networks for object detection, classification and recognition.” “We use deep learning to learn the video scene dynamics and to generate rich and unique metadata. To give an example, a user can search for a woman, 1.7-meters tall wearing a red dress across multiple cameras. The video processing works on all stationary cameras without need for manual configuration,” Edlund added.
Creating More Efficient Buildings With AI
AI is also being used to create more efficient buildings. Things like energy efficiency are becoming increasingly important as smart cities and smart buildings adoption continue to grow. However, smart buildings can be made even smarter with the help of AI and deep learning. An article by an analyst at Navigant Research named three reasons for why commercial buildings are ready for AI: rapid adoption of IoT opens the door to AI in buildings, customers expect technologyenabled convenience, and AI can bolster building owners’ top line. Verdigris Technologies offers an AI-based IoT energy sensor and software as a service (SaaS) for commercial and industrial buildings that learns equipment electricity consumption and optimizes existing building management systems. “Our hardware solution generates a highly granular data stream (monitored at 8kHz). This data provides the foundation
Smart Cameras Bring Facial Recognition to the
Face recognition has become more common than ever. The technology can be used for both security and non-security purposes. More and more, face recognition is moving toward the edge, as smart cameras embedded with face recognition and deep learning capabilities help users achieve their various objectives. BY William Pao
ace recognition is now seeing increasing deployment among end-user entities due to its effectiveness in identifying individuals. “Face recognition is the sort of basic capability that could be useful across a very broad range of vertical markets. An automatic system to recognize a person out in the world and connect them with all the other times they have appeared is quite powerful,” said Michael Jamieson, Computer Vision Scientist at Senstar. The primary goal for deploying face recognition is still to secure people and assets against criminals, terrorists or other unwanted individuals. “Face recognition is used a lot in safe city, smart city and airports. In these environments, face recognition is frequently used for identifying blacklisted people,” said Sadi Vural, President and CEO of Ayonix. “Facial recognition software is making video surveillance systems highly effective in terms of minimizing the threat associated with criminal activity. It can be used to provide alerts when blacklisted people enter the building,” said Karen Sangha, Field Marketing Manager for Security Solutions at Panasonic. “This happened at DonauEinkaufszentrum shopping center, 70 miles north of Munich, Germany. It followed a robbery out of hours, when a cash till was stolen. Two weeks later the center’s security team was alerted by the system that the suspected robber had triggered an entrance camera and were able to apprehend him.” In fact, stopping cr ime is one of the main growth drivers fo r fa c e r e c o g n i t i o n , w h i ch MarketsandMarket forecast
Middle East Security Market Strides The Middle East security market performed relatively well in 2017. This growth was not without obstacles as economic and political instabilities continued to test the tenacity of companies operating in the region. Companies looked toward integrated solutions and added value in and beyond security to lead the way to growth in the region. BY Emily Lin
016 was a turbulent period for the Middle East. Marked by ongoing wars and political coups, the region also suffered a major blow when oil prices fell significantly, even dipping to its lowest in over a decade at one point. Remnants of the crisis lingered in 2017, affecting countries that are more dependent on oil and gas more than others. Nonetheless, companies have seen a pick up in the economy and in the security sphere as well over the past year, boosted in part by an increased focus on security and stringent implementation of new security regula-
Erika Görge, Corporate Communications, Bosch Security Systems
tions. Infrastructure development in preparation for upcoming events such as Expo 2020, the FIFA World Cup 2022 as well as the Vision 2030 program, has also increased demand for surveillance system and access control installations to enhance overall security and safety. “In 2017, the Middle East security market continued to grow and for us, it was an exciting time as we matured further and entered new industry segments such as retail, critical infrastructure and smart cities,” said Philippe Kubbinga, Regional Director for Middle East and Africa at Axis Communications. “If you considered other sectors such as banking and transportation, we have seen those grow very well. So, all in all, I can say it has
Firas Jadalla, Regional Director, Middle East and Africa, Genetec
Philippe Kubbinga, Regional Director, Middle East and Africa, Axis Communications
been a balanced year in the Middle East security market region. Some markets performed better than others but there are definitely new opportunities in all the sectors and we are very happy with how 2017 ended. The team is geared and looking forward to 2018.”
Solutions and Integration Lead the Way
The Middle East market continued to face challenges like the slower uptake of new technology in the region (which can take longer as these would need to be approved or certified by local authorities first) and product commoditization. Many companies have responded by differentiating themselves from the rest of the market through offering solutions, rather than products,
Mohamed El Shenawy, Regional Sales Director, Suprema
s Toward Growth and adding more value into their services. “We’re pushing solutions rather than products. That’s why we want to change our image for the market. Unlike some other companies, we offer them a complete solution that can bring them more benefits. Such as in projects involving building automation, CCTV is just a small part, but we can bring them the complete solution and not just CCTV,” said Gabriel Yang, Operation Director for VIVOTEK Middle East. Many have also started framing their products as a component of a big integrated picture that can offer customers more security or business intelligence. “For the large segment, integration is definitely the hot word. We see a growing demand for integrated security solutions. We have our own software solution that integrates all of our systems under one umbrella, called Building Integration System (BIS). This platform also allows integration with third party applications, like building management systems, elevators or air conditioning in the building. No doubt this is on the rise. Such integrated solutions also come with the request to their manufacturers like ourselves not only to supply the solution, but also services,” said Erika Görge, Corporate Communications for Bosch Security Systems.
“Over the past 10 years, we saw end users and consultants in the Middle East caring much about integration and having different security systems communicating to each other and providing one single user interface or one single platform that is integrated to multiple systems,” said Firas Jadalla, Regional Director of Middle East and Africa for Genetec. “What we have been offering to the market, besides integration, is unification. Our platform, Security Center, has an open architecture infrastructure, enabling us to support user’s hardware of choice as well as provide built-in video management, access control, LPR, intercom SIP protocol, intrusion alarm system and advanced mapping built-in on a single platform with one user interface.” Genetec has also been developing and improving its Mission Control which is a decision support system that supports dynamic SOPs. “It supports the end user or the owner to make the right decision or action based on an input that could be from a human or automated. Everything is documented. We are able to measure the performance, how long it took for the operator to respond. This can be used for evaluation and to improve the process of training the operator to address and handle different scenarios,” Jadalla added.
IoT â€” Factory
Driving Production Efficiency With
Amid fierce competition in the manufacturing sector, plants and factories are striving to increase productivity and keep downtime to a minimum. Now, operators can rely on the Industrial Internet of Things (IIoT) and data generated by connected devices to make the production floor smarter than ever. While data is commonly processed by servers in the backend, more and more this is done on the edge.
BY William Pao
The hospitality industry is getting more competitive than ever. Against this backdrop, hotels are seeking to differentiate themselves by offering cutting-edge service to guests. With the arrival of IoT, hotel operators are now able to use connected devices and the data they generate to maximize the guest experience, at the same time achieving further operational efficiency and energy savings.
hroughout history, manufacturers have seen several revolutions taking place, each upending the way manufacturing had been done. The Industrial Revolution of the 18th century saw a replacement of human labor with machines. The second revolution came during the early 20th century when the concept of production line was introduced. Then, the rise of computers, networks and robotics further transformed manufacturing. Now, Industrial Internet of Things (IIoT), also known as Industry 4.0, has sparked another industrial revolution, whereby operators rely on connected devices and sensors to boost productivity and efficiency. “Sensors can be used to generate data related to machine health, process health, cleaning in place (CIP), security and production planning and asset tracking. Consequently, it can help in moving toward a proactive approach in the operations and improving productivity. From a quality perspective, additional sensors are being deployed to enable better process quality control,” said Keshab Panda, CEO and MD of L&T Technology Services. “Sensors measure numerous applications in a factory, but their use is dependent on what the business considers to be the most critical
applications, for example, environmental (temperature, humidity and pressure). Others are going to look at safety/security, so you may see proximity or optical sensors that will monitor an area. There are also sensors that measure production/machine health such as acceleration and vibration,” said Eric Ehlers, Vertical Marketing Manager at Cisco. “Ultimately, this data provides visibility — driving better operational efficiency, improving automation processes, safety/security and monitoring and optimizing asset utilization. This information can also be used to drive better supply chain utilization and prototyping of new products.” In fact, the market potential for IIoT is not to be ignored. According to a market research report by MarketsandMarkets, the IIoT market is expected to grow from US$113.7 billion in 2015 to reach $195.5 billion by 2022, at a compound annual growth rate of 7.9 percent between 2016 and 2022. “The manufacturing vertical is witnessing a transformation through the implementation of the smart factory concept and factory automation technologies. Government initiatives such as Industrie 4.0 in
Germany and Plan Industriel in France are expected to promote the implementation of the IIoT solutions in Europe,” the report said. “Moreover, leading countries in the manufacturing vertical such as the U.S., China and India are expected to further expand their manufacturing industries and deploy smart manufacturing technologies to increase the contribution of this vertical to their national GDPs.”
The Roles of Data
At the center of IIoT is data, which helps the factory operator gain better visibility of the production floor. “Traditionally, and for decades, sensor data has been mainly measured for three purposes: as inputs to the real-time control process of the machine/factory; to display it in control rooms, so human controllers can view and react to various changes or be alerted by simple rules; and stored locally for post-mortem purposes and used after a failure for analysis and re-adjustment of control processes,” said Eitan Vesely, CEO of Presenso. Specifically, data can help with preventive maintenance, which has become critical for manufacturers in their efforts to minimize factory downtime.
How Security Equipment Fits In
Besides industrial sensors, factory operators can also benefit from security equipment such as video surveillance and access control, whose primary function is still to upkeep the safety and security of the production facility. “Cameras are often deployed first as a physical security step across the factory, helping support improved safety in a facility. Sensors, combined with cameras, can be used to ensure the right access for the right people,” said Eric Ehlers, Vertical Marketing Manager at Cisco. “Data from access control systems can ultimately help refine the rules and requirements of ever-changing business requirements. This will ultimately define policy and provide visibility that can support better compliance, as well as help mitigate future threats that could impact production.” More and more, video in factories performs other tasks as well. One example is machine vision, whereby video taken by cameras is used to detect defects or direct robotic arms or automatic guidance vehicles in the factory. In a report by MarketsandMarkets, the market research firm forecasted that the overall machine vision market will be valued at US$14.4 billion by 2022, growing at a CAGR of 8.4 percent between 2016 and 2022.
“The major factors driving the growth of the machine vision market are the increasing need for quality inspection and automation across industry verticals, surge in demand for vision-guided robotic systems in automotive, pharmaceutical, food and packaging and industrial sectors, and growing demand for application-specific machine vision systems,” the report said. Meanwhile, cameras are also used to drive better insight into process, Ehlers said. “For example, sensors that detect motion can also be aligned with cameras to view movement and create heat maps of a factory setting to understand traffic flows. Sensors can also be used to monitor the process and then trigger alerts in hard-to-reach areas within a factory setting. They also support better remote troubleshooting and help reduce product loss. Some are used to monitor product quality, looking for deviations from a reference part,” he said.
AWS Seeks New Partners to Provide Video Analytics Amazon Kinesis Video Streams (KVS) is a video ingestion and storage service that allows users to stream videos to Amazon Web Services (AWS) for analytics, machine learning and other processing. AWS partners with companies specialized in video analytics or artificial intelligence solutions enable users to build custom applications on the KVS platform and take advantage of these features. Since Agent Vi, Veritone and ABEJA are among the first companies AWS has partnered with, we asked them to talk about the benefits of such a partnership and what they expect to see going forward. BY the a&s Editorial Team
Itsik Kattan, CEO, Agent Video Intelligence
Yousuke Okada, Co-Founder and CEO, ABEJA
ere is how Amazon Kinesis Video Streams (KVS) works. First, KVS provides software development kits to manufacturers to install on their security cameras or other devices â€” this makes it easier for users to securely stream videos or any time-encoded data from their connected devices to AWS. Then, KVS ingests, stores and processes video streams at any scale for real-time and batch analytics, allowing users to quickly access and retrieve video fragments based on timestamps. Finally, KVS enables users to further analyze video data using video recognition or other applications that take advantage of computer vision and video analytics. It is during this last step that the strengths of AWS partners such as Agent Video Intelligence (Agent Vi), Veritone and ABEJA come into play. The biggest advantage of KVS is that it creates and maintains a readyto-use video ingestion system, in which all the infrastructure necessary to manage video streams is already in place. Users do not need to worry about configuration, scalability, available storage and data security as the number of streams grows; instead, they can focus on building their own artificial intelligence (AI) or machine learning applications to analyze video data. KVS can be applied to many different
scenarios. For example, in a smart home setting the user can stream videos from a baby monitor to AWS for simple playback on a smartphone or some more advanced tasks such as facial recognition. In a retail store where there are multiple security cameras installed, the owner could stream footage captured in real time to AWS and then analyze live feeds using video analytics applications to understand consumer behavior.
While AWS offers its scalable and cost-effective KVS service to end users, it has also established the AWS Partner Network (APN) program. The program is designed to help customers identify companies with machine learning competency and expertise to support integration and deployment of various solutions. The designation recognizes members who provide solutions that help organizations solve their data challenges and enhance machine learning applications. Both Agent Vi and Veritone are APN partners. According to John Ward, VP of Marketing at Veritone, a company must first meet three requirements to
“ The biggest advantage of KVS is that it creates and maintains a readyto-use video ingestion system, in which all the infrastructure necessary to manage video streams is already in place.”
become an APN partner. First, it must have more than four AWS customer references regarding completed machine learning projects. The references must be for projects that started within the past 12 months and are actually in the production stage. Second, its products or solution must be available in three or more AWS regions. Third, there must be a reference for an machine learning case that is optimized for security, reliability, performance, cost optimization and operational excellence. innoVi, Agent Vi’s cloud-based video analytics software as a service (SaaS), is implemented by deep learning technology and other advanced algorithms that enable detection accuracy. Able to distinguish between people, vehicles and static objects, innoVi can not only detect security incidents in real time but also perform analysis that transforms security cameras into intelligent devices, uncovering previously unavailable information. Veritone has developed aiWARE, an AI operating system that leverages AI-based cognitive computing, including facial recognition, transcription, geolocation and sentiment detection to analyze unstructured audio and video data, such as TV broadcasts and surveillance footage. In a press release, Chad Steelberg, Chairman and CEO of Veritone said, “Institutions and organizations recognize the necessity of analyzing unstructured data at scale in near real-time. aiWARE provides them a way to unlock this data, accessing deep analytics and providing business insights like never before. Our collaboration with Amazon Web Services allows customers to deploy our platform in the cloud within minutes, giving them the ability to harness AI to make decisions with more confidence.”
The partnership between AWS and the aforementioned three companies presents a win-win situation. For Agent Vi, the integration of innoVi
with KVS allows the camera owner to add smart analytics functionalities that can automatically detect and alert to events of interest. “The collaboration between Agent Vi and AWS brings a truly disruptive service to the market, that leverages advanced cloud and AI technologies to make any camera, of any brand and from any location, seamlessly smart within seconds,” said Itsik Kattan, CEO of Agent Vi, in a press release. One of the biggest benefits brought by the integration is that it saves hardware costs for customers. “Access to the surveillance footage is obviously mandatory to employ innoVi, and we have so far implemented it using our own innoVi Edge, which is an appliance deployed in the customer’s network that serves as a cloud-gateway between the cameras and our cloud platform. Now, using the integration with Kinesis Video Streams, the video will be streamed directly from the cameras to the AWS cloud, allowing us to access the video in the cloud directly, for further analysis. This simplifies the customer’s deployment, eliminating the need and cost of the innoVi Edge,” Kattan said. Kattan added, “Now that the integration with Kinesis Video Streams can eliminate the need for innoVi Edge in certain cases, innoVi can become a pure SaaS solution. This opens up opportunities regarding how to make innoVi more available to potential customers.” With the integration of Veritone aiWARE and KVS, users are free from the trouble of managing a huge amount of video data while enjoying the advantage of aiWARE making every frame of video searchable for objects, faces, keywords and more. “Amazon Kinesis Video Streams can benefit Veritone by allowing some customers to more easily stream their content to the AWS Cloud where Veritone will process and enrich their content with AI as it is captured, in near real-time and at scale. For example, a customer that has a lot of content being captured on-premise such as
PoPular Smart ButtonS in the market today Demand for smart buttons is closely related to consumer adoption of smart homes. Acting like a remote, the smallsized button remains a convenient way to control a smart home. A button can typically be configured to perform three control actions triggered by one press, two presses or a long press.
lic is a wireless smart button that creates shortcuts for common tasks. With a one-click command, users can trigger actions to control lights, play music, call Uber or automate home scenarios with IFTTT. A click, two clicks and a hold can be custom-configured for different tasks. With just a click, Flic can share a userâ€™s phone GPS location with its family and friends so they can follow the user on his way home. In the event of a distressed situation, a user can easily sound the alarm and send a distress message. Flic comes with a re-usable adhesive sticker so you can fixate it on any surface. You can easily peel it off and re-stick it again. Flic also comes with a clip, so you can wear it on your clothes and bring it with you everywhere. Flic connects to your phone with Bluetooth Low Energy, giving it a range of roughly 50 meters. The battery lasts for a year with normal usage.
he Fibaro Button allows a user to manually activate or deactivate any device, a group of devices or a scene within the Fibaro system or any compatible third-party Z-wave device. There are numerous ways to use the Button, in an emergency situation, for entertainment and music for lighting control or for activating home automation scenes. In an emergency situation the Button can be pressed to contact a caretaker via app notification or send a call for help. Within the Fibaro and Z-Wave ecosystem the Button can be used to activate scenes to turn devices on/off, to raise or lower light brightness or to adjust music volume among other functions. The Button is flexible and can be integrated into a home or office, offering control with different click sequences. It also comes in different colors so families can assign one Button to each family member, type of control or choose a color best suited to the dĂŠcor.
QBlinks QMote s
logitech PoP sMart Button
Blinks is one of the earliest providers of smart buttons. Its Qmote S is an intuitive, single-button remote control that lets users perform actions on smartphone, even when it’s out of reach. Qmote S offers users easy and intuitive functionality, all at the click of a button. Using predefined click patterns to control functions on your smartphone, Qmote S turns your phone into a smart hub. Qmote S can control music and alarms, find a smartphone, activate Siri or Google, make a call, send location information, take photos or screenshots, record audio, start navigation and automate a home. Qmote S works with IFTTT, Zapier and Muzzley. Qmote S uses Bluetooth Low Energy 4.0 to connect with a phone. The changeable coin cell lithium battery can last for up to a year with regular use. Its waterresistant design allows you to use Qmote S anywhere, anytime. Different from its predecessor, Qmote, the exterior case of Qmote S is made of metallic-looking yet non-metal compound material for an optimized RF signal, and therefore no more antenna extension is needed.
OP Smart Button lets everyone in the home control smart lighting, music and more. Whether it’s movies, reading or a party, POP makes it easy to match lighting with lifestyle. Use the Apple Home app to set up HomeKit-compatible smart lighting, or use the POP app with Philips Hue, Insteon, LIFX or Lutron lights for brightness, warmth and color, and then enjoy simple push-button control. Whether it’s for connected lights, blinds, locks, thermostats or other smart home devices, POP makes it easy to control many devices as one. Use either a HomeKit scene or a POP app recipe to trigger multiple smart devices, like setting smart locks and nightlights before going to bed. Use POP to start music, movies and more. Program POP with Sonos stations and playlists; or combine POP with a Logitech Harmony hub-based remote to start an Activity like “movie night,” turning on TV, cable box and stereo while dimming smart lights.
Philio tech sMart color Button
IU is a smart button connected to a smartphone via Bluetooth. NIU has its dedicated IFTTT channel, allowing it to control more than 350 connected devices and services. NIU has been on the market for over one year and can be used to control light, music and home appliances. The smart button is available as an OEM solution. NodOn provides both the hardware and the software development kit, and can help companies integrate the smart button concept into their apps. The solution has been applied in security, consumer electronics and emergency response, among others. All the clients use the button to trigger actions on their apps, without having to pull out a smartphone. NIU has a stylish design and there are several vibrant color choices for customers. The button can be configured with its dedicated app (iOS and Android). Many actions are already embedded to interact directly with a smartphone (e.g., triggering photo/video shooting, fake call, snooze alarm, etc.).
he PSR04 smart button acts as a battery-powered multifunctional remote control. The button does more than just turning devices on and off. It can also act as a dimmer to make incremental adjustments to lighting, blind opening and other smart devices. Being a Z-Wave Plus certified product, the button runs on the Z-Wave communication protocol and can work with any Z-Wave products or applications. Z-Wave Plus offers increased range, extended battery life and over-the-air upgrade. The button can also serve as a timer and is designed for security and home automation. It can be easily retrofitted into homes. The slim, compact and elegantly designed switch can be fixed on any wall and comes with a built-in magnet that allows it to be fixed on a refrigerator. Since the switch comes powered by batteries, it requires no external wiring or power supply, and can be fixed anywhere in a home.
asmag.com PRODUCT FOCUS To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact email@example.com
Hikvision MV-PD-030001-02 Fixed Under Vehicle Inspection System
Hikvision Digital Technology/China Key Features • 2048 x 12000 resolution, supports tiled display • Matching high speed/non-uniform movement, with no motion blur • Automatic trigger, optional photoelectric or sense coil • Waterproof, anti-fog, anti-corrosion • Supports heavy vehicles • Illumination optimized for vehicle undercarriage Email: firstname.lastname@example.org
Dahua A26 H.265 Wi-Fi Camera
Dahua Technology/China Key Features • 1080p FHD video • Alarm notification • H.265 codec • Two-way communication • Easy4ip cloud • Smart tracking Email: email@example.com
DTK-RM24POES Surge Protector
Ocularis 5.5 VMS
AXIS Q6155-E PTZ Network Camera
DITEK Surge Protection/U.S. Key Features • Uses SAD and GDT technologies for optimal protection • Data speeds up to 10 GbE without signal degradation • Individual field replaceable protection modules with shielded RJ45 connections • Provides surge protection grounding to remote devices when using STP cabling • PoE Plus, HiPoE ready for high-wattage applications Email: firstname.lastname@example.org
Fujifilm/Japan Key Features • 4D high resolution performance • Telephoto lens with compact body measuring 33 mm in external diameter and the minimum object distance of 200 mm • Anti-vibration and shock-resistant performance with the optical axis displacement of no more than 10 µm • Advanced installation convenience • Achieves the minimum object distance of 200 mm Email: email@example.com
FB-Series ID Thermal Fixed Bullet Camera Matrix COSEC Elevator-Based Access Control Matrix Comsec/India Key Features • Controlled access for 32 floors in one elevator • Multiple credential-based identification • Time, user and floor-based access control • Seamless third-party hardware integration • QR code-based identification • Secured end-to-end communication Email: firstname.lastname@example.org
FLIR Systems/U.S. Key Features • High-performance onboard analytics • Video analytics capable of classifying human or vehicular intrusions • Automatic gain control (AGC) • Digital detail enhancement (DDE) • Certified for integration with major third-party video management systems Email: email@example.com
450 Lbs Magnetic Door Holder – REL80-200D
ALGATEC/Malaysia Key Features • Suitable for most types of doors, particularly fire and smoke barrier doors • Widely use in boom gate application • Dual voltage – 12Vdc / 24Vdc selectable • Zero residual magnetism • For swing door types • Ease of installation with low maintenance makes it a cost-saving product Email: firstname.lastname@example.org
On-Net Surveillance Systems/U.S. Key Features • Recorder configuration changes are now made automatically inside Ocularis Base • Added bookmarking feature in Ocularis Web for faster access • New playback mode of alarm recordings only to reduce bandwidth • New smart camera drivers for Dahua and Panasonic cameras • Available in Professional, Enterprise and Ultimate Email: email@example.com
Axis Communications/ Sweden Key Features • Laser focus • Axis Sharpdome technology with speed dry • Lightfinder and WDR — Forensic Capture • Zipstream • HDTV 1080p and 30x optical zoom Email: firstname.lastname@example.org
EECF1-LN1-R-MN-B 1-CH Ethernet Over Coax Receiver
KBC Networks/U.S. Key Features • One coax ports with PoC • One 10/100 Base-T port • Connect to one unit EECF1-LS1-T-IN-B or one unit EECF1-LS1-T-MN-B • Coax data rate >50 Mbps (300m) • PoE+ is supported up to 300 m based on coax quality and applied voltage to coax (48~57VDC) • Over current and short circuit protection Email: email@example.com
MxBell Door Station App G450 Home Control Gateway
Bosch Security Systems/Germany Key Features • Support for multiple wireless communications protocols • Visual scene-creation wizard • Intuitive app for iOS and Android mobile devices • Cloud storage service • Single, integrated system for security and automation Email: firstname.lastname@example.org
Mobotix/Germany Key Features • Displays doorbell messages from Mobotix IP Video Door Stations • Live views from Mobotix IP cameras with gesture-controlled PTZ function • Open the door from anywhere, hands-free talking • Automatic camera search, live view and camera connection using SSL • Displays the connection status • Supports remote connections and mobile data Email: email@example.com
Show Calendar PACOM 8707 Display Card Reader
Pacom/Australia Key Features • Card reader with OLED display • User-friendly interface with clear text and symbols, LED indication • Support MIFARE, MIFARE Plus, DESFire EV1 + EV2 • Tamper protection • RS485/ODSP/Wiegand • IP54 rated Email: firstname.lastname@example.org
AMG9000 10Gb Managed Ethernet Switches
AMG Systems/U.K. Key Features • 10/100/1000 Mbps Ethernet RJ45 or SFP ports • 1/10 Gb SFP uplink ports • IPv4/IPv6 L3 static route • PoE and PoE+ support • IGMP Snooping v1/v2/v3 • Compliant with all IEEE 802.3 variants Email: email@example.com
VCG Video Compression Gateway
WORLD SECURITY EXHIBITION DIRECTORY
Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_ events.aspx.
INTERNATIONAL HARDWARE FAIR COLOGNE
• Date: 2018/03/04—03/07 • Venue: Koelnmesse, Cologne, Germany • Tel: +49-221-821-0 • Email: firstname.lastname@example.org • URL: www.eisenwarenmesse.com
Great Lite International/Taiwan Key Features • GSM / DCS full dual band operation (SGD-5055) • 2G / 3G / HSPA / HSPA+ full dual band operation (SGU-5055) • DIY kit, all accessories included • Loop oscillation alarm indication • Coverage: 3000 ft2 (300 m2), 5000ft2 (500m2) (by using optional antenna) Email: email@example.com
IP955 Network Video Door Phone System
LIGHT + BUILDING
Kanrich Electronic/Taiwan Key Features • Portable video door phone, never miss any door call anytime • Download app to cell phone directly and reach the function “door to door intercom” via cell phone • Just one network wire and power wire , you can catch network video door phone system at once • Handheld devices (tablet or cell phone) are available • Monitoring and watching surrounding environment of the camera via cell phone Email: firstname.lastname@example.org
VTC1910-S IoT Mobile Gateway and Telematics Computer
Nexcom International/Taiwan Key Features • Super slim and ruggedized design • Intel Atom processor Bay Trail E3815 (1.46GHz) • Built-in 1 x CAN 2.0B, optional SAE J1939/ J1708 module • Smart power management with ignition on/off delay via software control and low voltage protection • Built-in U-blox M8N GPS • Dual SIM cards for WWAN modules Email: email@example.com
ICP-5000 IP-Based Audio and Video PA System
BXB Electronics/Taiwan Key Features • Visualized messaging with audio, video and texts • Customized schedule arrangement: you can set the time schedule for auto-broadcasting in advance; all holidays can also be set for not disturbing the surrounded residents • Protect personal safety: integrate with emergency call, door access, video surveillance, two-way intercom, and other safety equipment • Control via mobile devices: the administrators can instantly know the situation via BXB’s APP as any emergencies are occurring Email: firstname.lastname@example.org
• Date: 2018/03/14—03/16 • Venue: Hall 4-5, KINTEX, Seoul, South Korea • Tel: +82-2-6715-5406 • Email: email@example.com • URL: seconexpo.com/2018/eng/ main.asp
• Date: 2018/03/18—03/23 • Venue: Messe Frankfurt, Frankfurt Am Main, Germany • Tel: +49-69-75-75-0 • Email: firstname.lastname@example.org • URL: www.light-building.com
INTERTRAFFIC AMSTERDAM • Date: 2018/03/20—03/23 • Venue: RAI Amsterdam, The Netherlands • Tel: +31 (0) 20-549-12-12 • Email: email@example.com • URL: www.intertraffic.com/ amsterdam
SECUTECH INTERNATIONAL • Date: 2018/04/25—04/27 • Venue: Nangang Exhibition Hall, Taipei, Taiwan • Tel: +886-2-8729-1017 • Email: Kirstin.Wu@newera. messefrankfurt.com • URL: www.secutech.com
INTERNET OF THINGS WORLD
• Date: 2018/05/14—05/17 • Venue: Santa Clara Convention Center, Santa Clara, CA, U.S. • Tel: +1-646-616-7610 • Email: firstname.lastname@example.org • URL: tmt.knect365.com/iot-world
IFSEC PHILIPPINES • Date: 2018/05/30—06/01 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-03-2176-8788 • Email: Syamsul.Razak@ubm.com • URL: www.ifsec.events/philippines
• Date: 2018/06/19—06/21 • Venue: Excel, London, U.K. • Tel: +44 (0) 20-7921-5000 • Email: email@example.com • URL: www.ifsec.events/international
• Date: 2018/04/05—04/07 • Venue: Bombay Exhibition Centre, Mumbai, India • Tel: +886-2-8729-1099 Ext. 531 • Email: israel.gogol@newera. messefrankfurt.com • URL: www.secutechindia.co.in
• Date: 2018/06/26—06/28 • Venue: Marina Bay Sands, Singapore • Tel: +65-6233-6688 • Email: firstname.lastname@example.org • URL: www.communicasia.com
• Date: 2018/04/11—04/13 • Venue: Sands Expo Center, Las Vegas, U.S. • Tel: +1-203-840-5602 • Email: email@example.com • URL: www.iscwest.com
• Date: 2018/08/16—08/18 • Venue: Saigon Exhibition & Convention Center, Ho Chi Minh City, Vietnam • Tel: +886-2-8729-1099 ext. 768 • Email: stvn@newera. messefrankfurt.com • URL: www.secutechvietnam.com
Companies Advertiser Index in This Issue *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
PRODUCTS OF THE MONTH • Gemalto • Mobotix • Senetas • Shure • Symantec • Thales Security • VdoCipher
• AxxonSoft • Ayonix • Dahua Technology • Hikvision Digital Technology • NEC • Panasonic • Senstar
SECURITY 35 BOSCH SYSTEMS
apr. securitysystems@bosch. com
13 CYG WAYON
TECHNOLOGY INSIDE DAHUA FRONT CO., LTD. COVER, 1
FRAN OPTICS 45 FUJIAN CO., LTD.
3 TECHPOINT INC.
IoT — FACTORY
• Cisco • L&T Technology Services • Presenso • Real-Time Innovations
BACK HIKVISION DIGITAL COVER TECHNOLOGY CO., LTD. 7 RICOM
INSIDE TAMRON CO., LTD. BACK COVER
• ASSA ABLOY • Axis Communications • Bosch Security Systems • EVVA • Genetec • Hanwha Techwin • IDIS • Milestone Systems • Rasilient Systems • Suprema • Teleste • Vanderbilt Industries • VIVOTEK
Access Control Page No.
37 GIGA-TMS INC.
TECHNOLOGY — DEEP LEARNING • Avigilon • BriefCam • Verdigris Technologies
RFID MODULE / LOCK TAIWAN / READER
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
• AMAG Technology • BuildingIQ • Cisco Systems • Condeco-Americas • Honeywell Building Solutions • Johnson Controls
Next Issue 62
Vertical Solution | Safe Cities Technology | Key Components in Smart Cameras Product Exploration | Smart NVRs
Smart Buildings Integrate Automation With Security Systems