A&S #I235 SEP.2018

Page 1


September 2018

Vertical Solution

Contents IoT

How to Protect Yourself Against IP Camera Hacks?

P.40

Ever since video cameras migrated to the network, security has become a top issue facing both manufacturers and end users.

Industry Report

What’s Trending in the Fire Alarms and Evacuation Market?

With the rapid rise in popularity of building automation systems, the integration of fire alarms and evacuation systems is seeing a strong rise in demand.

P.44 We take a look at the requirements in mall security and the need for integrated solutions to ensure it.

21

8 Editor’s Note 12 Application Cases 50 SMAhome 60 New Products 62 Show Calendar 63 Companies in This Issue

WEBSITE ARTICLES https://www.asmag.com Marketing for Systems Integration? How’s That Done? “There are many possible applications of Dahua’s facial recognition solution that fully activates the big data gathered and thus spawns a great number of creative applications in terms of security and business, resulting indeed into a ‘Safer Society and Smarter Living,’ as has always been envisioned by Dahua Technology.” Dahua’s Facial Recognition Solution Enhances Safety & Business Intelligence, p. 58

4

www.asmag.com

With an increase in competition, systems integrators should be able to market themselves well to reach their customers.

Are You Into Smart Factories? Here is What’s Trending Now Recent trends highlight the rapid move towards Industry 4.0 where information and operational technology converge to increase efficiency.


Editor’s Note Smart Lighting with Surveillance Creates New Opportunities in Smart Cities In the past three years, we saw security companies branching out their businesses into smart homes. Relying on video streaming technologies, these companies found their new market in the home sector. Now, through the high penetration of IoT devices, many industries are gradually understanding the benefits of IoT solutions, which also provided security companies with new opportunities for growth. One megatrend we found is smart street lighting, which is usually recognized as the first step in moving toward a smart city. The main reason is that city governors found smart street lighting to be capable of largely reducing energy costs, carbon emissions and maintenance costs. US cities, like Baltimore, San Diego and Kansas City, have become among the first to convert their entire street lighting systems. Chicago is also planning to replace 270,000 city lights over the next four years with LED. In addition to saving costs, smart lighting can also be a backbone of a large range of applications, such as traffic management, parking, public safety, environmental monitoring and communications. For example, through the cooperation of the city of Los Angeles with Philips Lighting and ENE-HUB, the city aims to turn 110,000 street lights into multiple “SmartNodes,” which will include Wi-Fi detectors, microphones, surveillance cameras, speakers and etc. Many business opportunities will come from a light pole, which may provide security companies a way to enter the ICT field.

KEEP IN TOUCH WITH...

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal

EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

Editorial Team

Global Security News Media Platform FOLLOW US:

SENIOR REPORTER WILLIAM PAO

EXECUTIVE EDITOR EMILY LIN

Intrusion and cyberattacks on network cameras that have design flaws, backdoors and other security issues have become quite rampant lately. As a result vendors have endeavored to harden their devices against threats and attacks. However, cybersecurity is a two-way street, whereby users themselves also need to take actions to secure their devices. Find out how in this issue’s IoT column.

As the industry continues to move toward actionable intelligence, it becomes increasingly critical for edge devices to have the proper storage capabilities to not only store valuable data, but also allow for functionalities such as analytics. Choosing the right SD card for surveillance cameras is a vital step in this process to reap the full potential of the harvested data.

8

www.asmag.com


Products of the Month

Integrated Smart Parking Solutions to Elevate Efficiency Smart parking solutions have become more popular due to recent enhancements in management. Now, data on vehicle status, carpark availability and usage rate can be integrated and synchronized with billing system services, from the edge to the control center, via a centralized monitoring system. Complex environments like smart city public parking and building private parking lots can benefit from the use of in-ground sensor nodes, which presents with long transmission ranges and high accuracy.

Nedap SENSIT Wireless Parking Occupancy Detection

S

ENSIT system monitors real-time occupancy information on individual parking spaces and tracks parking duration. A SENSIT Gateway communicates with the SENSIT sensors, relay nodes and the SENSIT Interface Software, which collects, filters and evaluates all data generated by the parking sensor network. This cloud software enables easy network segmentation, calibration and sensor configuration for comprehensive parking lot management. Key Features • Fully wireless to suit both on-street parking spaces and upper decks of parking facilities • Nedap’s SENSIT P-Guide app is completely customizable to fit different parking services • With long-life wireless vehicle sensor network to monitor carpark availability • Car-finder option in smartphone app

Supplier: Nedap Identification Systems URL: www.nedapidentification.com

Arivo Business Parking Management

W

elcome the guests with a parking invitation so they will never waste time in the parking lot! With the Arivo Business Parking Management, business users can provide app invitation in three clicks, and the visitors can benefit from license plate recognition for direct access. The online management portal enables simple access authorization and provides intruder alerts or guest arrival notification.

Key Features • Reads license plate 20 times per second • Reads all EU license plates • Anti-passback function to ensure only one registered license plate can enter per parking space • History data overview can be found and analyzed on live dashboard • Available for online booking of carpark rental

Supplier: Accessio URL: www.arivo.co

Smart Parking Off-Street Solution

B

acked by user-friendly SmartRep parking management software, the Smart Parking Off-Street Solution gathers real-time parking information to guide car drivers and maximize space- and time-efficiency. Car drivers can check their smartphone app for directions in advance, or simply follow the instructional signage for available park spaces. And SmartEye, the smart in-ground vehicle sensor, reports information of individual payment, compliance and space management to the center.

Key Features • Integrates with overhead guidance LED indicator • With SmartSpot Gateway to accommodate additional services such as public broadband, video surveillance, lighting control and more • Over-the-air software provisioning, configuration management and firmware updates • Direct synchronization between carpark and payment

Supplier: Smart Parking URL: www.smartparking.com

10

www.asmag.com


ParkHelp Indoor Camera-Based Parking Guidance System

P

arkHelp camera-based parking guidance system detects image and license plate number. Installed in the central area of the aisle, ParkHelp All-in-One Sensors, which include LED lighting and camera, are able to supervise spots on both sides of the hallway, giving detailed real-time information on the rotation, occupancy rates and infringements in the parking lot. All information provided by each sensor unit can be collected and completely controlled by the ParkManager software platform to enhance safety and management.

n

PNI PlacePod IoT Smart Parking Sensor

Key Features • All-in-One Sensor with built-in LPR • Spot video surveillance • Integrates mobile payment and find-my-car functions • Manages VIP, employees, black list, etc.

Supplier: ParkHelp URL: www.parkhelp.com

W

ith in-ground or surface-mount variants, PlacePod is a smart parking sensor that communicates with LoRa gateway or Sigfox base station to provide real-time parking data and vehicle detection. PlacePod includes PNI’s RM3100 geomagnetic sensor, which incorporates proprietary magneto-inductive technology. This technology enables PlacePod to accurately detect parking events in dense urban environments, and filter out electromagnetic interference such as direct current from overhead power lines or transient magnetic signatures from passing traffic to eliminate false triggers.

Key Features • Sensors and algorithms are finely tuned for ultra-low power consumption • Simplified provisioning and management using Bluetooth Low Energy for wireless software updates • Works in both on-street and off-street, municipal and private parking management • RM3100 geomagnetic sensor requires no temperature calibration or current set-and-reset pulses before measurement

Supplier: PNI Sensor URL: www.pnicorp.com

Genetec Security Center AutoVu

A

s part of the Genetec Security Center, the AutoVu automatic license plate recognition (ALPR) system automates license identification, making it easier for municipal and commercial organizations to locate vehicles and control access. With the support of either SharpV or SharpX camera systems, ALPR reads are augmented with context images, time stamps and GPS coordinates, and can include wheel images for strict time-limited parking enforcement.

Key Features • AutoVu Managed Services hosts ALPR system on Microsoft Azure cloud • AutoVu SharpV is an all-in-one ALPR device which combines two high-definition cameras with edge processing • Supporting up to four cameras with one single external processing unit, the SharpX extends coverage and sharp recognition • Unified security platform to configure ALPR event-triggered actions and alarms

Supplier: Genetec URL: www.genetec.com

Atoll Solutions Smart Parking

C

onsisting of the IoT gateway and parking sensors, Atoll Solutions Smart Parking is a cloud-based wireless solution for multi-level car parks, buildings and cities. The gateway and sensors utilize very low standby power at the same time to offer mesh network for acquiring parking slot status in real time and relaying it over to the cloud/host application. Atoll Solutions Smart Parking also offers options to integrate billing systems. Key Features • With availability to extend to additional smart city applications like automated lighting, waste management and more • Usage statistics and monitoring • Mobile application-enabled

Supplier: Atoll Solutions URL: www.atollsolutions.com

11


News Feature

What are Ways to Address IoT Security Issues? IoT security issues have become more rampant, and addressing them requires the efforts of vendors and users alike. BY William Pao

W

ith the popularity of the Internet of Things (IoT), security issues have also arisen, affecting various devices connected to the web. These include security devices as well. According to Quan Heng Lim, Director of Cyber Operations at Horangi Cyber Security, common vulnerabilities in IoT devices include legacy systems that are not designed to run outside of a restricted/closed network; susceptibility to denial of service by traffic flooding; the use of weak encryption algorithms; handshake or non-use of encryption in communication traffic; and hardcoded authentication keys/ passwords. “Over the past years, issues have stemmed from hardcoded (unchangeable) or default administrative passwords. Some manufacturers have taken measures to enable secure default configuration and recommendations. Vendors are aware of this, but we still see incidents and successful malware designs that utilize simple attack patterns targeted at security devices and IoT devices in general,” Lim said. According to him, cybersecurity is a two-way street, a responsibility that should be shared by both the device manufacturer and end user.

For vendors, they need to ensure there are appropriate guidelines provided to segment networks for the type of product, be it physical or virtual, Lim said. “They should also secure deployment locations, regularly update software and make sure that vulnerability management measures have been implemented,” he added. “Subsequently, vendors need to focus on their own cybersecurity. Attackers might not consider targeting the devices themselves, but rather go after the developer’s networks in hope of obtaining maintenance access credentials or other forms of sensitive data that can give them an edge when targeting specific products such as consumer-grade safes or biometric door locks.” He further mentioned that encryption should be enforced both for data at rest and in transit. “Authentication, authorization and accountability should always be designed appropriately, to support functional groups of users if access is required and at the same time, maintain the confidentiality, integrity and availability of information within the company,” he said. As for users, Lim provided the following suggestions:

“Cybersecurity is a two-way street, a responsibility that should be shared by both the device manufacturer and end user.” • Run penetration tests on the products, especially if they are IoT-enabled. • Ensure security patches related to all equipment used are regularly and diligently implemented. • Closely monitor and track all maintenance access points and time tables. • Ensure proper security of all data transmissions from their surveillance systems. • If operating in an air-gapped environment, beware of unscheduled maintenance and ensure all brought equipment is properly scanned for malicious applications. As for setting passwords, Lim notes that periodic password

APPLICATION CASES Transportation HID STREAMLINES BHUTAN’S DRIVER LICENSE ISSUANCE The Road Safety and Transport Authority of Bhutan (RSTA) sought a more secure and durable card issuance solution for the country’s growing population of road users. After RSTA selected Ugen Trading House (UTH), the local authorized dealer of HID Global solutions, the RSTA selected HID’s FARGO HDP5000 high definition printers/ encoders and deployed the new system in its offices to manage the driver’s license issuance process. The ID printer and encoder leveraged the retransfer print technology. By printing a reverse image on an intermediate film, then transferring the film to the card surface, this results in greater image quality that is long-lasting and more resistant to wear and tear. The new driver licenses also feature a multitude of security features. The dual lamination module allows for efficient lamination of the cards on both side in one pass.

12

www.asmag.com

change and complexity requirements have been relaxed, as previous rules often led to weak passwords. “Passwords can be complex with periodic changes, but this can be easily supported by a robust password management system,” he said. Lim offered some password tips: • Screen new passwords against commonly used ones and compromised passwords. • Ensure accounts are separated per user, and non-repudiation can be ensured. • Passwords are not to be shared across different accounts, especially for those of different criticality. • Passwords should not be reused, or follow a pattern, e.g., P@ssw0rd1, P@ssw0rd2.

8 Global online casino market to grow 8% CAGR by 2023.

Source: Research And Markets


a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.

Transportation a Key Element in Smart Cities Smart transportation is an important component that has been implemented by nearly all major smart cities in the world. BY William Pao

A

mong the many issues facing metropolises amid rapid urbanization, transportation ranks in the top, prompting officials to look for smart solutions to address various transportation challenges. That was one of the points raised by Charles Huang, Deputy Secretary General of Taipei Computer Association (TCA), in a recent seminar. According to him, smart transportation encompasses many components including smart parking, intelligent transportation systems, autonomous vehicles/buses, vehicle sharing and mobility-as-a-service. Most of these utilize Internet of Things (IoT) devices as well as the data they produce to enable automation, efficiency and intelligence. Smart parking Smart parking employs parking sensors or video surveillance cameras to detect empty

parking spaces. The data is then transmitted to a backend system which then relays parking information to road digital signage boards or the user’s mobile devices. A startup called ParkHere is collaborating with cities in Europe in installing their parking sensors that are based on energyharvesting, whereby the weight of the vehicle produces a current that activates the sensor. Traffic Management Sensors, radars and license plate recognition (LPR) cameras, for example, can combine to detect and recognize those speeding or running red lights, enabling municipal operators to issue tickets or make related penalty measures. Surveillance cameras can also count vehicles passing through different areas and automate traffic light systems to better control traffic. One case study cited by Huang was Beijing, which aimed to crack down on honking. Vehicles that honk will be detected by a sound recognition system, which is combined with an LPR camera to allow the police to issue tickets. MaaS The mobility-as-a-service (MaaS) concept allows the integration of different modes of transportation on one account, allowing the user to get them and pay for them all from their smart device. Whim, a service of MaaS Global based in Helsinki, Finland, presented a more affordable alternative to car ownership, allowing users to take a mode of transportation according to their preference, for example, taxi or public transport, and pay a one-off fee or a monthly plan. Huang concluded by saying that smart city projects present huge business opportunities for solutions providers. Taiwan, being very advanced in hardware, should now focus more on software and solutions amid this trend, he said.

Retail AXXONSOFT PROTECTS SOUTH AFRICAN MALL The new Ballito Junction Regional Mall in South Africa, deployed a surveillance system that can keep the public and their belongings safe. The AxxonSoft’s Axxon Next platform enabled the use of a large variety of ONVIF cameras as well as integrated cameras. This solution uses a variety of camera brands, including panoramic cameras in certain areas with multiple entrances and exits. Axxon Next allows the full functionality of the Panomorph lens as a digital PTZ, access to create views with multiple areas selected and a full 360˚ view. Using Axxon Next analytics to monitor fire escapes allows the mall management to set a line-crossing alarm on doorways that primarily function as fire escapes. 176 channels are active on site with one server. The operators each have a station running Axxon Next 4.0 Professional with 16 monitors allowing for multiple views at any time.

How to Know If Your Surveillance Camera is Hacked Since the cybersecurity of surveillance cameras is becoming an increasingly common problem, it is important for customers to be able to realize when their device has come under attack. BY Prasanth Aby Thomas, Freelancer

A

amir Lakhani, Senior Security Strategist at Fortinet, said, “In many cases, it is very difficult. Because of the number of cameras and how many vulnerabilities exist, a customer may not have a good way of telling. In many cases, the system will be running or responding slowly. In corporate environments, systems such as intrusion prevention devices and anomaly-based traffic analysis can give a great clue and early detection if a camera system is being attacked or has been compromised by attackers.” Alon Levin, VP of Product Management at VDOO Connected Trust, expanded on this. As IoT malware is normally crafted to go undetected, there is no easy way to know for sure. Any suspicious change to the device may indicate the existence of a botnet malware on your device. This may include the following: the password is no longer working; device settings have been modified; and a spike in network traffic. “Many people just forget the basics which include disabling default usernames and passwords,” Lakhani said. “Use usernames and passwords that are complex. Enable 2-factor authentication if available, and limit management from specific networks or management workstations. Another extremely important step is to always check for, and ensure, you are running the latest operating systems and firmware on the camera. Many attacks are discovered every day and manufacturers often need to release new camera firmware to fix the vulnerabilities. Lastly, segmentation is very important. Run cameras, as well as other IoT devices, if possible on their own isolated networks, not alongside your other devices and computers. In that case, if there is a compromise, attackers may be limited in what they can see, and the attack may be limited.” Levin further added, “Protection needs to start from security by design, embedding security when designing, architecting and developing the product. Manufacturers need to employ essential techniques that will make it hard for attackers to utilize design flows to gain access to connected devices. On top of that, we believe that cameras, similar to other higher-end connected devices, like routers, can use thirdparty security components, dedicated security agent, integration with security services in order to complement their secured design in order to be protected on an on-going basis from all types of attacks.”

13


Product Exploration

Mobile Biometric Devices Provide Authentication on the G significant growth. Its ability to provide a convenient and secure way to identify persons at anytime, anywhere is not only contributing to public safety and security, but is also increasing effectiveness and efficiency.

Mobile biometric devices are making it easier for law enforcement and border patrol agents to identify and authenticate persons in the field and on the go. BY Eifeh Strom, Freelancer

M

obile biometrics has become a norm in today’s world. With all major smartphone manufacturers incorporating fingerprint scanners into their phones now, society has gotten used to using biometric data for identification and authentication on a daily basis. Yet, when it comes to law enforcement or border control using biometric data the discussion gets more complicated. Still, the mobile biometrics market is quickly expanding and it is forecast to reach US$49.3 billion by 2022, according to a report by MarketsandMarkets. Growth is attributed to the growing penetration of mobile devices and increase in mobile transactions. Additionally, advances in battery and camera technology are also contributing to the development of better mobile biometric devices. For law enforcement and border control agencies, the use of mobile biometric devices is experiencing

16

www.asmag.com

How It’s Being Used

Rémi Guidet, Marketing Director, Identification Solutions, Gemalto

John Hinmon, VP, Global Marketing, Crossmatch

Today, more and more people are on the move. Mass migrations as a result of geopolitical instability and economic hardships, increased tourism, and more globally integrated business models are highlighting the need for more effective and efficient identity management solutions. Identity management is being made easier with the deployment of biometric electronic documents and biometric databases such as automated fingerprint identification systems (AFIS) and automated biometric identification systems (ABIS). “The biometric verification is now accessible in mobility, this is for electronic ID document


Multimodal Mobile Biometrics Increase Efficiency in the Field

The use of one biometric identifier to authenticate a person’s identity generally yields a high accuracy. Using multimodal biometrics further improves accuracy as well as security.

Go control and/or to perform biometrics verification to the AFIS/ABIS,” said Rémi Guidet, Marketing Director for Identification Solutions at Gemalto. The usefulness of being able to identify persons on the spot is even more evident on the border where there are multiple border points of entry covering sea, land and air. “Not all border locations are conducive to disembarkation, have appropriate fix screening infrastructure or are set up for volume surges,” said John Hinmon, VP of Global Marketing at Crossmatch. “And for law enforcement, in-field forensics can enhance effectiveness, while budgetary pressures demand more efficient working procedures.” It is in instances such as these that mobile biometric devices come in handy. “They enable people’s identities to be captured and verified fast and accurate at any location. This improves and speeds up the work and efficiency of these authorities,” said Gunther

The use of fingerprints by law enforcement and border control to identify and authenticate persons has become a norm. But for a more accurate and secure method, these agencies are now starting to use multimodal biometrics. “The use of multimodal biometric handheld devices is currently one of the most important trends in the industry,” said Gunther Mull, CEO of Dermalog. “Simultaneous checking of several biometric features increases the accuracy of biometric systems. By now, numerous devices can perform a multimodal identification.” Fingerprint and facial recognition is the common combination for multimodal biometric authentication. This is mostly due to the fact that biometric databases most often collect fingerprint and face data. In terms of mobile devices, “Most of the time, mobile biometric devices offer fingerprint capture and facial recognition using the camera autofocus of the device and specific facial recognition algorithms,” added Jacky Lecuivre, CEO of Coppernic. In the field, the use of multimodal biometric devices greatly benefits both law enforcement and border control agents. “In law enforcement, for example anti-narcotics, it has proven useful to incorporate multiple modalities to facilitate the processing of subjects,” explained John Hinmon, VP for Global Marketing of Crossmatch. “A drug house is raided and 20 individuals are detained, virtually all with no or falsified documentation. Officers can quickly fingerprint and take mugshots of each using a multimodal device, creating a comprehensive digital record for each subject for reference.” Hinmon also explained how multimodal biometric devices can be used for border control. “Rather than taking time to unload a coach or train at the border, a handheld device could be used by border agents as they move through the coach or car,” he said. “If they encounter something suspicious, they may require a fingerprint for exception processing. While the smart device being utilized could contain a camera, it may not be utilized in the workflow. It would be more likely that the device would incorporate or have a peripheral MRZ reader to process the passport.”

Mull, CEO of Dermalog. “Also, mobile solutions are often cheaper to purchase than stationary solutions.” “With mobile identification, officers can fingerprint individuals without proper ID documents in the field rather than spending hours taking the subject to the station for fingerprinting. This increases productivity so that officers can spend more time on the street protecting communities,” said Shelley Luster, Marketing Manager at Fulcrum Biometrics. “Another use case involves mobile ID ensuring warrants are served on the right individuals. This protects departments from litigation stemming from wrongful arrest.”

17


Vertical Solution

Overcoming Mall Vulnerabilities Malls and shopping centers have long taken on the role of the town square, for a community, district, entire town or city. This makes them a popular place not only to shop and engage various services, but also as an end destination to meet, congregate, exercise and be entertained.

A

ccording to Jeff Whitney, VP of Marketing at Arecont Vision Costar, malls and shopping centers typically include some mix of large open spaces such as concourses, atriums, parking lots and structures, greenspace, and loading docks, all with multiple access

points. “Unfortunately, all of these beneficial items can lead malls and shopping centers to become a magnet for criminal activity, for everything from stock slippage by employees to slip and fall fraud, and to organized crime, robbery and assault,” Whitney said. “In extreme cases, malls and shopping centers can become potential soft targets for terrorism, such as active shooters or bomb threats.” Indeed, it is the very nature of malls that makes it the most vulnerable. Lynne Woodgates, Business Development Manager at Hanwha Techwin Europe, said that malls are designed to be easily accessible and welcoming places with multiple entrances and exits. They are therefore a potential target for terrorists who might seek to inflict maximum damage in a crowded environment. As economic concerns rise, there will be other risks too. “In a tough economic environment, the tenants of malls are likely to see an increase in theft by opportunists as well as organized criminal gangs,” Woodgates said. “Dealing with

22

www.asmag.com

Feng Cai, Vertical Solutions Manager, Hikvision Digital Technologies

Keith Drummond, Senior Director, Sales and Marketing, IDIS America


anti-social behavior, often due to alcohol or drug abuse, is a constant challenge for malls.” Feng Cai, Vertical Solutions Manager at Hikvision Digital Technologies, added another point. Given the large area of a shopping mall, it consumes a significant amount of electricity, and with flammable substances, chances of fire breakout that could lead to loss of assets and injuries to people are high. Of course, these need to be seen in the wider business context. According to Billy Hopkins, Senior Technical Manager, IDIS Europe, all retail operations are under pressure from online competition and changing consumer habits. “Consequently, they are working to find new ways to compete and attract customers,” Hopkins said. “Shopping centers are evolving, and many are being styled as leisure destinations offering a customer experience that is as much about entertainment as it is about shopping. Against this background, security and safety become even more important.”

How Malls Deal With Emergency Situations

The need for the buildings to be aesthetically pleasing creates inherent hiding places which can make designing a security system a hurdle of sorts for consultants and SIs. „

The security departments at malls and shopping centers have largely been responsible for typical retail security challenges, ranging from loss prevention, policing the concourses, parking structures and other public areas. However, in recent times, their responsibilities have risen to include response to emergencies like fire, active shooters, armed robbery and terrorist issues. “Increasing visibility of security is key to better responding to emergencies and to ensure that customers and mall workers feel safe,” Whitney said. “This includes increasing the number of uniformed guards visible at entrances/exits and in public areas, as well as adding overt and highly visible security cameras in the same areas. Both will increase actual security and the comfort of customers and mall staff. Discreet surveillance in other areas will help increase situational awareness without seeming omnipresent. Improving access control to limit where the public and employees can roam without permission will also help.” He suggested that hiring an experienced security consultant to review the facility and its security plan is a good first step — Engaging with local law enforcement, the fire department and local ambulance services to update their emergency and disaster plans and ensure two-way communications are in place for when an incident does occur is critical. However, despite having certain security management systems in place, malls may lack the technological capabilities to deal with an emergency, according to Cai. For example, it is necessary to integrate the distributed subsystem of video surveillance, alarm, access control and fire control into one monitoring center to establish a unified management system for the emergency command. Malls cannot afford to have security solutions that operate independently of each other anymore.

23


Product Review

W

hen monitoring a wide area, be it a warehouse, airport or parking lot, a single IP camera may become quite constraining as it has a narrow field of view, thus leaving various blind spots uncovered. In this regard, a multisensor camera can be an ideal and cost-effective option as the user only needs to purchase one single device rather than three to four individual cameras. Installation and maintenance can be made simpler as well. “Multisensor cameras are easier to install. They have only one network connection. Since most video recording systems require only one license for all the cameras in the unit, it makes the IP system more economical,” said Bob Mesnik, President of Kintronics. “The power and data connection to the camera can be run in a single cable, making installation quicker and

more efficient. Because the camera is located by a single IP address you can save costs on VMS device licensing by registering four cameras using only one device license,” said Russell Morris, Lead Engineer at NW Security Group. However, there are still caveats when installing these devices in wide open areas. “It is important to note that the positioning must take into consideration possible obstructions from existing structures and moving vehicles. Open areas usually have a challenge with mounting positions with some cases having to have additional support poles installed. These poles can themselves become obstructive, and sometimes unsightly, if too many of them are installed,” said Archie Makore Shumba with Business Development at Stratus Projects. “On the other hand, available structural mounting positions usually become repetitive as they are, in some cases, on one side of the site.”

What to Consider

Before making a purchase, it is better to know that there are two types of multisensor cameras — those with lenses that are fixed, offering 180-degree panoramic views, and those with lenses that can be adjusted and repositioned, offering more flexibility in different use scenarios. In addition, the user should look at the camera’s specs and consider if they meet their needs and requirements. Typically what the user should look for are summarized as follows:

Resolution and Bandwidth

Depending on the brand and model, each sensor in a multisensor camera comes with a resolution of between 2MP and 11MP. Note that the maximum resolution listed on the datasheet is usually the sum of the resolutions of the sensors. “Do not be fooled by marketing blurb; most

When it comes to surveilling large, open areas, multisensor cameras stand as an ideal choice. Each comes with multiple lenses all packed in one device, in the process reducing cost and simplifying installation and maintenance. Yet what should the user look for when purchasing a multisensor camera? How should it be installed? In this article we asked some systems integrators to address those questions. We also looked at multisensor camera models from different brands to help users pick the right device. BY William Pao

SIs Share Tips and Experience With Top

Multisensor Brands Camera 28

www.asmag.com


companies will sell their camera as ‘8MP’ or ‘20MP,’ but in reality they take a sum of the resolution of all sensors and market the camera as something which is much higher in resolution than each individual sensor,” Morris said. Bandwidth utilization is another issue that the user needs to consider. “Remember that because a multisensor camera is multiple cameras in one, it will utilize more bandwidth and storage than a single camera. For example an Axis P3707-PE contains four HD 1080p cameras so this will utilize the same amount of network bandwidth and storage as four separate cameras,” Morris said. Performance is another key feature that needs to be examined. “Some cameras will only offer full frame-rate video across all sensors when a lower resolution is selected. Always check before specifying and make sure the

29


Technology

Choosing the Right

SD Card for

Surveillance Cameras

Choosing the best SD card for security cameras is a critical part of ensuring the reliability of a surveillance solution. Now with edge storage on security cameras becoming the primary storage solution, knowing what to look for in an SD card has become vital. BY Eifeh Strom, Freelancer

E

dge storage in surveillance cameras has made building a surveillance solution more flexible and more affordable; however, the reliability of edge storage has been questioned in the past. A big part of these concerns was due to the insufficient abilities of standard retail SD cards. As a result, it has made choosing the right Secure Digital memory card (SD card) for security cameras a critical component of an effective surveillance solution. Without the right

SD or microSD card to store and write video data, the reliability of a surveillance system could be extremely compromised. Globally, the SD card market is forecast to surpass US$8.9 billion in revenue by 2022, according to a report by Persistence Market Research. Advancements in NAND technology are expected to drive the applications of SD memory cards. These advancements are also helping manufacturers develop SD cards better suited to the needs of video surveillance. We talked to some of the leading SD card manufacturers to ask them what makes a good SD card for security cameras.

Security Camera Needs

Unlike other types of cameras, surveillance cameras have different storage requirements. From the different environments in which security cameras

36

www.asmag.com


“ Without the right SD or microSD card to store and write video data, the reliability of a surveillance system could be extremely compromised. „ are deployed to the need for 24/7, continuous data writing, security cameras require something more than the standard retail SD card can offer. “The vast majority of microSD cards available in the market today are intended for consumer use in digital still cameras (DSCs), car dash cams or home cameras; they are not designed for commercial and industrial edge storage in IP video surveillance cameras,”

explained Joey Lin, Senior Segment Marketing Manager at Micron Technology. “As a result, edge storage is viewed as ‘unreliable’ by many systems integrators and installers.” The majority of users do not understand that the lifespan and quality of SD cards used in edge recording can vary significantly depending on the quality of the card selected. Selecting the wrong quality SD card could therefore result in

costly field failures that may occur within months of deployment. “A common mistake today is the use of retail microSD cards in video surveillance deployments,” Lin said. He explained: “The example is that a 64 GB retail card will quickly wear out in a typical video surveillance system with a continuous 8 Mb/s bit rate. If recording to a retail microSD card for 12 or more hours a day, the retail memory card will likely fail within months of deployment.” Lin pointed to the following as the major differences between memory cards currently available in the market: the NAND

Robert Allen, Director, Marketing and Technical Services, EMEA, Kingston Digital

Joey Lin, Senior Segment Marketing Manager, Micron Technology

37


How to Protect Yourself Against IoT

IP Camera Hacks? Ever since video cameras migrated to the network, security has become a top issue facing both manufacturers and end users. More and more, reports on hacking and intrusion against network cameras have underscored their vulnerabilities and lent urgency to the concept of “securing your security device.” Indeed, doing so is a two-way street — it requires efforts from both vendors and users.

F

or the longest time, video cameras have performed the key role of surveilling and monitoring premises, keeping lives and properties secure. However, the security of the device itself is something that has often been neglected. And, as cameras migrate more and more to the network, they face the same kind of risk and cyber threats as other networked devices. In fact, a lot of IP cameras have fallen victim to intrusion and hacking. A

40

www.asmag.com

BY William Pao

recent baby cam hack, as told in a June 6 report on web portal CSO Online, occurred in South Carolina when a young mother found out that her baby cam moved on its own, pointing at her while she was breastfeeding her son. In another report by South China Morning Post, dozens of Canon IP cameras were hacked across Japan back in May, and in most cases a message that read “I’m Hacked. bye2” was left on their screens apparently by the hacker. According to a blog post by Jungle

Disk, in 2014 73,000 unsecured cameras were hacked and made available to the general public, and of that 11,064 cameras were in the US. Since then, reports of hacks against IP cameras and NVRs kept coming out. In October 2016, a series of coordinated cyberattacks were launched against Dyn, an internet performance management company based in New Hampshire, resulting in service disruptions across various famous sites including Airbnb, Amazon.com and


f

?

The Boston Globe. It was later found out a botnet of Internet of Things devices, including IP cameras and network video recorders, were used in the attack after being infected with the Mirai malware.

Camera Problems Today

These incidents speak volumes of the fact a lot of today’s IP cameras are still beset by vulnerabilities. Some have backdoors. Some employ default passwords that are easily searchable on the web. Some have other design flaws. These can all be exploited by hackers over the internet. “Backdoors are a major threat, and they exist due to negligence in designing a secure product in many of the connected cameras today,” said Alon Levin, VP of Product Management at VDOO. “However, backdoors are not the only threat we are seeing in cameras. Cameras also include design flaws, known vulnerabilities and zero-days vulnerabilities, which can only be handled by the manufacturers.” “Many technologies are built with limited security controls inherent in them. They are often created with poor coding practices or hardware vulnerabilities that make compromise quite easy. Like any technology, if the underlying camera operating technology is vulnerable to attack, and left with access to open networks like large data networks or the internet, they can be effected by the million or so new virus variations that are created every day,” said Dave Tyson, SVP of Cyber Security Consulting at Apollo Information Systems. “The biggest security problem with IP cameras is that they are not managed very well to achieve sustainable cyber hygiene. For example, default passwords remain on the camera, or camera firmware is not updated, or abnormal memory, storage, or bandwidth usage goes unnoticed,” said Bud Broomhead, CEO of Viakoo. As to why this is happening, experts point out that camera manufacturers place a stronger focus on the design and performance of their products. Security,

Bud Broomhead, CEO, Viakoo

Cheng Lai Ki, Cyber Operations Consultant, Horangi Cyber Security

then, becomes a lower priority. “Camera manufacturers operate within a specialized subsector, and much like other technology developers, their skills are geared towards improving the quality of their products. While it cannot be said for all manufacturers, security may not necessarily be aligned to their key business objectives,” said Cheng Lai Ki, Cyber Operations Consultant at Horangi Cyber Security. And needless to say, making devices more secure requires a certain amount of investment, and this goes against camera manufacturers’ interest in keeping costs down. “The race to be cheapest got them all in trouble. Many are just OEMing parts and codebase libraries which are flawed. Not many have taken the time to write their own code and then publish the third-party audits of their code security audits. As

Andrew Lanning, Co-Founder, Integrated Security Technologies

long as people keep buying this poor quality equipment, there is no incentive for the manufacturers to clean up their development,” said Andrew Lanning, Co-Founder of Integrated Security Technologies. “To also become experts in security, the manufacturers will have to double their in-house development budget. That doesn’t make sense from an economical perspective. In addition to economic considerations, it is also really hard to integrate a security team into an existing development team — it requires a ‘DNA change’ for the entire company,” Levin said. “Not only that, investment in security today is something that is hard for manufacturers to prove that they have done to the right level and use as a commercial advantage.” But this is not to say that manufac-

▲ A lot of cameras today come with backdoors, design flaws and other vulnerabilities that render them susceptible to cyberattacks.

41


Industry Report

What’s Trending in the Fire Alarms and Evacuation Market? With the rapid rise in popularity of building automation systems, the integration of fire alarms and evacuation systems is seeing a strong rise in demand. Here is a look at the current market trends, challenges and opportunities. BY Prasanth Aby Thomas, Freelancer

W

ith the increasing awareness on the need for safety and prevention, fire alarm and evacuation solutions continue to see higher market demand. According to a report from the research firm Technavio, the global emergency alarm and evacuation market is expected to reach US$5.3 billion by 2021, growing at a CAGR close to 7 percent. Increasing awareness, government regulations and end-user demands are expected to be the major reasons for this growth. The rising popularity of building automation solutions is also expected to fuel growth in this sector. However, Technavio pointed out that the current uncertainty over ideal wireless solutions and lack of awareness will hamper expansion for two more years. The market could see a rapid pick up after that. In the fire alarms solutions market alone, the industrial sector is expected to see the most growth because of government regulations becoming stringent in developed and developing economies. Technological advancements such as wireless sensors, advanced detection systems and human machine interface (HMI) solutions are also among the factors encouraging customers to adopt solutions and boost the market. Mass notification and evacuation systems are widely seen in the commercial sector. They make use of announcement systems, messages, emails and phone calls to provide real-time information in the event of an emergency. Some experts have pointed out that the recent developments in the field of the Internet of Things (IoT) have transformed the market, with the integration of business systems with emergency systems giving greater flexibility in operation. However, a major issue that still hurts the industry is the lack of standards for different structures that could lead to possible failure of control systems during an emergency. A technology close to this market, and imparting significant influence on its development, is the digital addressable lighting interface (DALI). DALI is a wireless protocol and software integration that makes the lighting systems digital. Its deployment complements fire and evacuation solutions, and has proved to be extremely useful during an emergency situation.

44

www.asmag.com

The Current Trends Seen in the Market

Bringing the fire alarm and evacuation systems under one technological roof and integrating them to work together seamlessly is the main trend that is seen in the market. According to Thomas Parrish, VP of Integrated Systems at Telgian, more and more fire systems are being installed with voice systems so that there is no need for two separate setups to be put in place. “We are seeing a lot of integrations,” Parrish said. “We are also seeing, in certain markets and verticals, the uptake of using the communication systems for other purposes like telephone, paging and background music.” In fact, the integration of mass notification systems with fire alarms is widely seen as the most significant trend by many in the market. Some suggest that the need for intelligibility and clarity is crucial in this regard to managing audible as well as visual notification systems. The role of mobile technology is also becoming more and more important. Features like Real Time Location Services (RTLS), widely found in smartphones these days, can be integrated with security systems to expand the reach and effectiveness. Rex Lam, Senior Consultant at Guardian Forest Security,

“The industrial sector is expected to see the most growth in fire alarms solutions because of government regulations becoming stringent in developed and developing economies. „


stressed that the change in trends is reliant, to a significant extent, on the regulatory policies of a region. Depending on how proactive a particular government is towards meeting the requirements in the field, the market demands and trends could change. Speaking specifically of major Asian markets like Hong Kong, Singapore and Mainland China, Lam said that he could not see much change over the years. “The trends have not been changing much because there are fire codes in different jurisdictions, regardless of where you are, may it be Hong Kong, Mainland China, Singapore, etc.,” Lam said. “This is because the fire system needs to be compatible with the local regulations first before other things can come into play. So, the trend has been to first meet the regulations and then try to integrate the solutions with building management systems. Of course, there are different ways to do this, there are several industry-wide protocols out there for you to integrate with other systems, but the key thing is before you apply the technology, you must understand what is the value of an integration. This will help the client understands why they are spending the money.” Speaking of developments in technology, Lam added that solutions are becoming more and more sophisticated than before in reducing false alarms. “Traditionally you would detect fire either by temperature or by smoke,” he said. “I have recently seen newer types of sensors that are also using CO as part of their detection technology in an effort to reduce false alarms. In any alarm system, false alarms are something that you are trying to avoid at all costs.” The importance of local regulations was also stressed by Paul Wijnstra and Mirre Veerman, Fire Safety Consultants at Royal HaskoningDHV, as they spoke about the market conditions in the Netherlands. In most cases in the country, fire alarms and sounders for evacuation are integrated into a single control panel. But the integration of voice alarm

systems is not permitted as per Dutch standards and hence has to be maintained on a separate control panel.

The Current Requirements in the Market

Needless to say, more and more verticals are interested in installing mass notification Rex Lam, Senior Consultant, Guardian Forest Security systems integrated with fire alarms. According to Parrish, sectors like healthcare were the early adopter of this but now establishments like schools are making it a requirement. There is also demand from other industries like the retail. “More demand from what we would consider non-traditional markets,” Parrish said. “[For instance] in large single-story Thomas Parrish, VP, Integrated buildings we would use systems Systems, Telgian that would be useful for both paging as well as for emergency communications.” According to Lam, the major requirement is to meet the government regulations. In many countries, regulators impose stringent checks on fire safety. Non-compliance with the rules could lead to problems for commercial as well as non-commercial establishments. Paul Wijnstra, Fire Safety Consultant, Royal HaskoningDHV Going a bit more in detail on this, Wijnstra and Veerman added that the Dutch standards NEN 2535 and NEN 2575 define the requirements for fire detection and evacuation systems in the Netherlands. “For the fire detection system in the recently published 2017 edition, it is now allowed to have digital mimic panels,” they said. “This is due to the recently proven reliability which the Dutch fire detection standard prescribes to. For evacuation systems, sounders with programmed messages are now available.”

Technological and Market Challenges

As solutions become increasingly sophisticated and their integration requires multifaceted expertise, challenges in their implementation are also prone to rise. According to Wijstra and Veerman, for an evacuation alarm system with sounders to function effectively, the sounders and detectors should be combined in the same loop. Everything depends

45


Industry Report

What’s in Demand in the Indian Security Market? Being a relatively new market, India offers a lot of opportunities for international security solution providers. However, given its fragmented and complex nature, many companies find it difficult to reach customers in this country. This is where a careful study of demands and needs becomes crucial. BY Prasanth Aby Thomas, Freelancer

G

iven the expanding nature of the Indian economy, it’s normal that the country’s security market remains positive on growth. With an economy that’s over US$2 trillion in size, India recently surpassed France to become the sixth biggest economy in the world. A recent Reuters’ poll showed that India is expected to remain the fastest-growing major economy in the world this fiscal year at 7.4 percent. To put this in perspective, the poll also showed China’s economy is expected to grow at 6.6 percent during the same period. Sudhindra Holla, Sales Director for India and SAARC at Axis Communications, pointed out that according to the research firm IHS, India’s market for network video cameras is estimated to reach $194.7 million by 2020. Separate reports published last year projects an 18 percent growth for the security devices market in the next five years. Going by these numbers alone, companies can get an idea of the skyrocketing demand in the country now. “We see a huge opportunity for IP cameras with the last five years seeing a paradigm shift with digital technology,” Holla said. “The segments with the highest requirement are government, defense, transportation, retail, banking and financial, critical infrastructure, and oil and gas sectors followed by upcoming sectors such as education and residential. India is at the cusp of a digital revolution with the government focusing on Digital India. Security is a growing concern and with increasing crime rates, the reconnaissance needs have turned into a need for everybody.” But one of the problems when studying a nascent market like India is that it is difficult to estimate what products are the most in demand. To be fair, India remains a very fragmented market, not just because of its developing nature but also due to the cultural and linguistic differences that make the country complex.

48

www.asmag.com

What’s the Market Looking For?

Many systems integrators (SIs) and consultants are limited to specific geographical regions and would find it difficult to provide a comprehensive picture of market demands in the country. But this shouldn’t deter foreign companies trying to enter the Pawan Desai, CEO, Mikat market. That there are already Advisory Services several international companies thriving in the country should be proof that Indian market is definitely penetrable. It’s all about investing in a careful study of the market and its nuances. MR Krishnan, Executive Director of Adtech Systems, said that while surveillance cameras continue to remain the most sought-after security product, there have been some signifSudhindra Holla, Sales Director, India & SAARC, Axis icant changes in the consumer Communications behavior. “Customers are standardizing the resolutions to 3 megapixels or above for commercial properties,” Krishnan said. “They have also started using branded products for commercial projects, with specific care to understand the security features in terms of preventing hacking of the


MR Krishnan, Executive Director, Adtech Systems

“India remains a very fragmented market because of its developing nature as well as cultural and linguistic differences that make the country complex. „ cameras itself.” He added that access control systems, for both people and vehicle access, are also on the rise in both the residential and commercial sector. In fact, access control solutions are becoming a standard for all new residential projects. However, biometrics is mostly still popular in time and attendance applications alone. “Systems like parking management solutions are limited to spaces within buildings,” Krishnan added. “Parking control systems in public roads are yet to get popular.” Vinayak Sane, Principal Consultant and Chief Technical Architect at Elmark Engineers, elaborated further on this, adding that parking management solutions are becoming popular in commercial properties like malls. These parking management solutions are interfaced to the smart mall concept where you can pre-book the parking slot. Once in, the presence is then integrated to the shopping master database for the stores to deliver a rich and personalized experience to the visitor. This is good news for security solution providers as entities like malls are increasing at a rapid rate in India. According to data from JLL India, the number of malls in the country has increased from nine in 2002 to 308 in 2017. Holla provided a manufacturer’s perspective on this. According to him, the major security products that Axis Communications is seeing growing demand and leading the way are technologies such as IP audio and facial recognition.

What are the Trends in the Market?

According to Pawan Desai, CEO of Mikat Advisory Services, the Indian market is finally moving more towards

Vinayak Sane, Principal Consultant and Chief Technical Architect, Elmark Engineers

integration of security solutions now. Speaking specifically on the demands in the video surveillance sector, which he expects to be growing at 18-20 percent, Desai pointed out three major trends. 1. Analytics on Edge: Until recently, the market was more interested in analytics at the server level. But given concerns like false positives and bandwidth issues, centralized analytics never really caught on. Bandwidth would especially be a cause of concern here as infrastructure limitations continue to remain a severe problem in India. With cameras that provide analytics on edge, such issues can be dealt with. 2. Higher Resolution: As analytics on edge become popular, cameras with higher megapixels become a necessity. This, according to Desai, is creating a need for cameras that can capture higher quality videos. 3. Cybersecurity: This is, of course, a major concern worldwide now. Reports of vulnerabilities in surveillance equipment have heightened concerns and have brought attention to the cybersecurity of endpoint devices. Earlier, cybersecurity was limited to the server level. Now, the focus is on the cameras and other equipment as well. Speaking of analytics, Sane said that one of the problems that could be specific to the Indian market is that the foreign solution providers fail to understand the unique characteristics of the market. For instance, India does not have a standard format for license plates. Local languages font is predominant in many of the states. So, a license plate recognition system should be familiar with a number of possibilities to recognize the numbers. To sum it up, Sane added an interesting thought. Certain foreign companies that had entered the Indian market quite a while ago came in with the conviction that they would focus on government projects mainly because that was where the money was. However, this proved to be a mistake later as government projects in India take a long time to be implemented. Realizing this, they recently changed their focus to include commercial projects as well and has hence seen better performance. In short, this gives a basic starting point on how Indian market should be approached.

49


SMAhome

There are lingering concerns over connected healthcare solutions and technology in smart homes, especially for seniors. Either the solutions are too broad or difficult to understand or the elders are worried about after-sales problems and inconvenience. As technology continues to develop, there is growing awareness of the advantages that results from these services to elevate and smarten up remote home care.

T

he following service providers, who were once simply a telco, MSO, security guard and a company that repairs devices, have transferred their focus onto the smart home realm. One thing they have in common is the support they lend to enhancing elderly independent living with considerate services directly provided by experts.

Kbro and TWM Broadband Put New Techniques in Old TVs If an app interface proves too hard for older parents to handle, how about if we offered them a TV remote control? If a smartphone screen is too small for them to read any health data, how about a TV screen instead? Two Taiwanese multiple-system operators (MSOs) holds the solution to this. Kbro Broadband and TWM Broadband are MSO leaders that provide connected home care services based on their cable TV systems, named simply as “HealthCare.” Through a medical collaboration with Taipei Medical University Hospital, the

50

www.asmag.com

Service Providers Find New Business Models to Emphasize Independent Living two service providers are bringing easy yet convenient care into the homes of end users via monthly subscriptions. “After subscribing to this service, professional caretakers from Taipei Medical University Hospital will visit the users first to evaluate their health condition, and bring them qualified sensors for blood pressure or blood sugar. All the daily measurements are collected through Bluetooth by the gateway that connects to the TV and combines three emergency calls, offering round-the-cloud consultation to the hospital,” explained Sean Wang, Deputy Director for theProduct Development Division of Kbro Broadband. That is to say, Taipei Medical University Hospital is in charge of all medical health support, whereas Kbro and TWM Broadband provides the connection and platform services. The HealthCare platform has only started offering its services to users in the past few months so providers are looking forward to combine broader in-home services and more health sensor options in the coming future. According to Wang, seniors can

Data gateway and emergency call system of n HealthCare.

directly feel the benefits of the HealthCare platform through the user-friendly interface, as well as the thorough 24-hour remote care support from the hospital. “In these few months, our team is greatly encouraged by successful user cases as the health platform effectively kept their health in control. We see unlimited opportunities as we expand our HealthCare system with a growing number of services and integration


Sean Wang, Deputy Director, Product Development, Kbro Broadband n

with voice command,” shared Wang. “On our way to serve more home users, we not only target the original clients, which are more than a million TV subscribers, but the cooperation with other MSO counterparts.”

Setting up Senior Homes in One Day Is POSSIBLE for Puls Professional installation might not be special, but a same-day setup service for smart home connectivity and IoT devices is the highlight of Puls. Starting as a mobile phone repair service, Puls’ service now also covers smart TV mounting and smart home installations around the U.S. Users can first do an online consultation to get smart home device suggestions, and identify products that can work better with their planned smart home ecosystem. Later, through the simple service booking process on the Puls website, professional technicians can bring every necessary part to properly complete the smart home setup.

“We realize customization is important for every home, and believe that our service is what enables the smart home industry to continue growing,” commented Eyal Ronen, CEO and Co-Founder of Puls. “The elderly, for example, might need convenient control of their lighting and indoor temperature, and our

technicians can provide instant service to set up their lighting control and smart thermostat to make their living situation as comfortable as possible.” Puls is now the official partner of ANTOP, Google, Hisense, Lighthouse, Samsung SmartThings and SimpliSafe, bringing the service experience into the user’s smart home. “With experts really engaging in setting up your smart home systems, from the decision of device selection all the way to installation, we believe service is what enables this industry,” said Ronen. “In the coming future, every device will connect with each other, making smart living simple for everyone, and Puls will be the strong support for all the users.”

Taiwan Secom Puts MyCare Supports into Its Modular Home Service From government projects to residential communities, Taiwan Secom, the first security service provider in Taiwan, has now extended into connected home care services, linking the elderly independent living

Puls provides same-day smart home support and installation. n

51


New Products

asmag.com PRODUCT FOCUS To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact as-pr@newera.messefrankfurt.com

Fingerprint Identification Padlock With iKey MPL-2000

Midas Touch/Taiwan Key Features • Capacitive fingerprint sensor allows unlocking in under 0.7 seconds • No unreliable apps, bad connections and arcane lock/unlock procedures • Stores up to 30 sets of fingerprints for backup fingerprints and multiple users • Ultra-long battery life lasts 1200 uses, and the lock can be charged via USB, mobile power bank, etc • Adaptive algorithm: lock becomes faster and more accurate with each access Email: contact@midastouchinc.com

VisionView 180° Camera

PureTech Systems/U.S. Key Features • Multiple thermal sensors provide the ability to deliver wide-area monitoring in unfavorable lighting or weather conditions and at night • High-definition optical cameras with 1080p resolution to realize accurate visual identification of intruders • Ability to adjust side cameras to ensure a continuous horizon when installed at various heights • IP67, temperature rated housing for harsh environment installation • PoE connections allow ease of install Email: eric.olson@puretechsystems.com

5 MP Vandal Resistant Dome Network Camera WV-S2550L

Panasonic Security System/Japan Key Features • 5-megapixel images up to 30 fps and H.265 smart coding • Super Dynamic 120dB for backlit situations involving headlights and shadows on night streets • Auto Shutter speed control for moving vehicles • Outstanding low light performance in true color with low noise for night time applications • Environmental durability : IP66, IK10, 50J compliant Email: panasonicwebcasesf@us.panasonic.com

Industrial PoE+ Media AXIS Q3518-LVE OutdoorConverter IMP-C100-XX Series Ready Fixed Antaira Technologies/U.S. Dome Key Features • Compliant with 802.3at standards which is backwards compatible with 802.3af. • Designed to fulfill industrial applications that require fiber optic distance extension while using minimal space • Link Fault Pass Through (LFP) and Far End Fault (FEF) function • Supports DIN-Rail and wall mountable orientations • Operating temperature range models in standard (STD) from -10 to 70°C and extended operating temperature (EOT) from -40 to 80°C Email: info@antaira.com

Synology/U.K. Key Features • Intel Atom C2538 Quad-core 2.4 GHz CPU • 2 GB DDR3 expandable up to 16 GB • Over 1,310 MBps sequential reading • Optional 10GbE add-on card • Compact chassis design capable of fitting in a 2-post rack • Designed to reliably store the data and backed by Synology‘s three-year hardware warranty Email: emmasmith@synology.com

60

www.asmag.com

Video Management System G-Scope 1500+

Dahua Technology/China Key Features • Supported by high-quality PIR sensor with sensitivity up to 10m • Supports H.265 compression • 24 x 7 all-around protection • Open to diversified video storage, such as SD card (up to 128 GB), NVR or cloud storage • Equipped with built-in motion activated spotlight and up to 110dB security siren Email: overseas@dahuatech.com

Geutebrück/Germany Key Features • Professional G-Core video engine • Outstanding performance due to GPU powered image processing and 64 bit architecture • Clear and structured user interface concept with context sensitive help function • Meets highest data protection requirements: HTTPS, privacy masking, tamper-proof database architecture, watermarking, extensive access rights definitions • Extended operating temperature range up to 50 °C selectable, depending on different equipment Email: info@geutebrueck.com

2M Mobile Vandal-Resistant Network Flat Camera

16 MP MEGApix Flex Multi-Sensor Camera

Lechange Active Deterrence Wi-Fi Camera LOOC

Hanwha Techwin Europe/U.K. Key Features • Max. 2-megapixel (1920 x 1080) resolution • Built-in 2.4mm fixed lens • H.265, H.264, MJPEG codec supported, multiple streaming • Tampering, loitering, directional detection, defocus detection, fog detection, audio detection, face detection, digital auto tracking and sound classification • Hallway view, PoE, LDC, M12 connector support Email: help.cctv@hanwha.com

VR20M-MF VR Mullion Card Readers RackStation RS1219+ NAS

Axis Communications/ Sweden Key Features • 4K video at full frame rate • Forensic WDR, Lightfinder, and OptimizedIR • Axis Zipstream technology • EIS and vandal resistance with IK10+ rating • Power with redundancy and configurable I/O ports Email: axis-sap@axis.com

Vanderbilt Industries/U.S. Key Features • Multicolor LED light frame • Auto dim in reduced light • OSDP or Wiegand connectivity • MIFARE card technology including EV1 and EV2 • IK class 08 and -40 to 70°C temperature • Card, card and pin, and pin only functionality Email: info@vanderbiltindustries.com

Digital Watchdog/U.S. Key Features • 16 MP 1/3” image sensors at real-time 30fps • 360° and 180° flexible panoramic view IP camera • True wide dynamic range (WDR) and PoE injector included • True day/night with mechanical IR cut filter • Four cameras in one installation and flexible sensor positioning with magnets • Smart DNR 3D digital noise reduction Email: joem@digital-watchdog.com

ConteraWS Web Services

ConteraCMR

ConteraIP Arecont Vision/U.S. Key Features ConteraWS • Cloud-based centralized management ConteraVMS MegaIP system • Avoids the pitfalls of cloud-based video storage by recording locally • Export video to the cloud to store and share using secure links • Connect from anywhere via full featured thick client, mobile apps, Apple TV app or multi-browser web client • Remote monitoring with instant notification of alarms, motion or system health to desktop or mobile devices Email: support@arecontvision.com ™

Cloud Managed Recorders

Megapixel IP Cameras

Cloud Managed Web Services

Megapixel IP Cameras

Video Management Software


Companies Advertiser Index in This Issue *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

Surveillance

PRODUCTS OF THE MONTH • Arivo • Atoll Solutions • Genetec • Nedap Identification Systems • ParkHelp • PNI Sensor • Smart Parking

Page No.

15 COMMAX CO., LTD. INSIDE DAHUA TECHNOLOGY FRONT CO., LTD. COVER, 1, 58, 59

PRODUCT EXPLORATION • Coppernic • Crossmatch • Dermalog • Fulcrum Biometrics • Gemalto

37 FUJIAN FRAN OPTICS BACK HIKVISION DIGITAL COVER TECHNOLOGY CO., LTD. 25 IDIS CO., LTD.

• Arecont Vision Costar • Bosch Security and Safety Systems • Hanwha Techwin Europe • Herta Security • Hikvision Digital Technologies • IDIS

• Allied Universal Security Systems • Kintronics • NW Security Group • Stratus Projects

Major Item

Country

Email

SURVEILLANCE

KOREA

pcy@commax.co.kr

SURVEILLANCE

CHINA

overseas@dahuatech.com

DOME COVER

CHINA

sales@fjsmt.com

SURVEILLANCE

CHINA

overseasbusiness@ hikvision.com

SURVEILLANCE

KOREA

sales@idisglobal.com

CHIP

KOREA

sales@nextchip.com

LENS

CHINA

sales@forecam.com

CAMERA

JAPAN

newbiz@tamron.co.jp

CHIPSET

USA

dma@techpointinc.com

SURVEILLANCE

CHINA

sales@tiandy.com

IP CAMERA / SOFTWARE / VIDEOSERVER

ITALY

info@videotec.com

Major Item

Country

Email

CO., LTD.

VERTICAL SOLUTION

PRODUCT REVIEW

Advertiser

5 NEXTCHIP CO., LTD. 33 RICOM INSIDE TAMRON CO., LTD. BACK COVER 9 TECHPOINT INC.

TECHNOLOGY

• Kingston Digital • Micron Technology

35 TIANDY 7 VIDEOTEC S.P.A.

IoT

• Apollo Information Systems • Horangi Cyber Security • Integrated Security Technologies • VDOO • Viakoo

INDUSTRY REPORT

• Adtech Systems • Axis Communications • Elmark Engineers • Guardian Forest Security • Mikat Advisory Services • Royal HaskoningDHV • Telgian

Next Issue

Access Control Page No.

Advertiser

19 GIGA-TMS INC.

RFID MODULE / LOCK / TAIWAN READER

promag@gigatms.com.tw

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

Vertical Solution | School Bus Security Industry Report | Cold Chain Product Exploration | Smart Locks

63


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.