Page 1


CONTENTS P.14

VERTICAL SOLUTION

a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video door phone, home automation and other fields relevant to electronic security.

ISSN 1997-6267

中華郵政北台字第 1571 號 執照登記為雜誌交寄 John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher Editorial

Universities Adopt Ivy League of Security Amid ION

CAUT

Growing Concerns With safety and security concerns on post-secondary campuses being highlighted in light of world events, adopting the best security system is crucial to keeping students and faculty safe.

P.20 P.24

Tech Trends Make Universities Smarter Integration Turns PA Systems Into Campus Security Solutions

General Press Jill Lai Alf Chang Emily Lin William Pao

Editor-in-Chief Senior Consultant Executive Editor Senior Reporter

Art Design

Gaven Lee Executive Designer gaven.lee@newera.messefrankfurt.com Mao Chang Senior Designer mao.chang@newera.messefrankfurt.com Circulation

Michelle Shih Officer

Lisa Hsu Sr Media Mktg Coordinator lisa.hsu@newera.messefrankfurt.com Corporate Management

Thomas Pin Account Manager Chihung Lee IT Manager

More and more, end-user organizations are deploying multimodal biometrics, which have certain advantages over unimodal solutions.

asmag.com

Jessica Yang Project Manager jessica.yang@newera.messefrankfurt.com Secutech

Peggy Wu Veronica Chen Jason Cheng Michelle Chu

Trade Fair Manager Group Manager Project Manager Event Marketing Manager

peggy.wu@newera.messefrankfurt.com veronica.chen@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com michelle.chu@newera.messefrankfurt.com

International Advertising [Headquarters]

Carolina Pattuelli Evris Consolos Adis Hodzic Manish Gandhi Iris Lai Carol Guan Y. C. Suh Takashi Komori Nguyen Thu Ha Ekaterina Shapovalova Mariusz Kucharski

israel.gogol@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

P.28

Koreans Strive for Excellence — Part 2 It has been quite obvious in the market that Korean companies are preparing for their next big move toward some new applications for video surveillance technologies.

www.asmag.com

Europe (Italy) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia Poland

produzione@ethosmedia.it evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com carol.guan@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn shapovalovey@ru-bezh.ru mariusz.kucharski@aspolska.pl

Messe Frankfurt New Era Business Media Ltd.

INDUSTRY REPORT

2

thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

[Branches & Representatives]

Double Your Door Security With Multimodal Biometrics

P.50

michelle.shih@newera.messefrankfurt.com

Marketing

Israel Gogol Manager Audrey Fang Officer

PRODUCT EXPLORATION

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com

Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard, Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.newera.tw.messefrankfurt.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China and a&s Taiwan (above published in Chinese). a&s Adria, a&s India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2018 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices


EDITOR’S NOTE a&s Refocuses on Convergent Technologies In the past year, we saw a surge of interest in artificial intelligence (AI) from all industries. Video/image and audio recognition technologies have evolved with AI, producing various innovations. According to Grand View Research, AI’s main vertical markets include healthcare, law, retail, advertising and media, automotive and transportation, agriculture, manufacturing, risk assessment, research and others. AI, as well as other developments in IoT and big data, has contributed to convergent technologies. This will eventually create the alliance of different industries, such as security and ICT, for these verticals. Future industry development is also pushing a&s to refocus its editorial content, in order to reach new readership. We intend to explore how these technologies — video, audio, identity management and different sensing technologies — can be used for security, automation and business intelligence; and in the meantime, how the megatrends of AI, IoT and big data are influencing these technologies. In terms of verticals, our new focus will be on smart buildings, factories and automotive. We predict that these verticals will quickly develop with the convergent technologies in the year ahead. With this new editorial content, a&s can provide you with more valuable resources and new perspectives to make better and informed business decisions.

KEEP IN TOUCH WITH...

SOCIAL MEDIA www.facebook.com/ asmagglobal

twitter.com/ asmagglobal

www.linkedin.com/ company/ asmagglobal

EDITOR-IN-CHIEF JILL LAI

jill.lai@newera.messefrankfurt.com

EDITORIAL TEAM

Global Security News Media Platform FOLLOW US:

SENIOR REPORTER WILLIAM PAO

EXECUTIVE EDITOR EMILY LIN

Globally, hospitality is a booming industry on the back of increased tourist arrivals. But this is also putting more competitive pressures on hotel operators in the face of more lodging facilities that are being built. Against this backdrop, hotel operators seek to differentiate themselves by offering cutting-edge services to guests. More and more, this can be done with the Internet of Things.

Cyberthreats and attacks continue to rise in number and magnitude, resulting in business losses and data privacy violations. It is vital for the whole chain — manufacturers, installers, integrators, users, etc. — to shoulder the responsibility of minimizing vulnerabilities and ensuring that their systems are secure. After all, a chain is only as strong as its weakest link.

6

www.asmag.com


Products of the Month

Outdoor Home Security Cameras Getting Smart R and Sharp Ring Floodlight Cam

If you want to keep an eye on what is happening at home without fretting over the cost of a full-fledged home security system, investing in a Wi-Fi connected camera is a good start. Home security cameras can be divided into indoor cameras and outdoor cameras, both playing an important role in keeping one’s family and property safe. Nowadays, with the availability of features such as facial recognition and motion detection, outdoor security cameras are getting smarter.

Nest Cam IQ Outdoor

N

est Cam IQ is weatherproof, tamper-resistant and seriously sharp, allowing users to know about a break-in before it happens. This outdoor security camera can detect a person up to 50 feet away, then alerts users with a photo of who is there. With Nest Aware, it can even recognize a familiar face. Nest Cam IQ has a close-up tracking view — when it sees a person, its special algorithms automatically zoom in and follow the action in the app. With a 4K sensor, the camera can zoom in up to 12x and enhance for a crisp picture, allowing users to keep a close eye on somewhere specific. Its daytime HDR combines multiple 4K images to even out challenging lighting conditions, so that details do not get blown out or lost in the shadows.

ing Floodlight Cam is a motion-activated security camera with built-in floodlights, a siren alarm and two-way audio. These features allow users to see, hear and speak to anyone on their properties from anywhere. With object and facial detection, Floodlight Cam has advanced motion sensors in home security. Its 270° field-ofview will enable users to detect motion around corners and monitor all their blind spots. Floodlight Cam easily replaces existing wired floodlights and connects to standard junction boxes. With the app, users can flash the lights, sound the alarm and zoom-in to focus on their most important areas. Key Features • Crystal-clear HD video • 110-decibel siren alarm • Dual sensors with object and facial detection • Ultra wide-angle motion sensors • Customizable motion zones and scheduling • Motion-activated camera and floodlights

Supplier: Ring URL: www.ring.com

Key Features • Weatherproof IP66 rating • Powerful built-in speaker and mic, with noise and echo suppression • High-power infrared LEDs for clear, even night vision • A hidden power cord plugs into an indoor outlet for 24/7 security • Multi-axis 360° rotation

Supplier: Nest URL: www.nest.com

remo+ DoorCam

r

emo+ DoorCam monitors any entry way with a wire-free, over-the-door smart HD camera with built-in motion sensor, two-way talk and night vision. DoorCam can be self-installed within seconds by hanging over any residential door without damaging property. The camera has superior connectivity in that the antenna and Wi-Fi chipset are placed inside the user’s home to limit Wi-Fi connection interference from thick building materials. DoorCam operates on three D-type batteries that last for up to 12 months until batteries need to be replaced.

Key Features • HD video: Streams HD videos with 160° wide angle view • Two-way audio: Speak and listen to visitors with full duplex audio using the free remo+ app • Cloud recording: Access all videos within last 30 days from one’s phone, including missed activities • PIR sensor: Customize motion sensor sensitivity to detect relevant activities in real time • Night vision: See motion and answer calls with infrared night vision

Supplier: remo+ URL: www.remoplus.co

8

www.asmag.com


Arlo Pro 2

A

rlo Pro 2 comes with 1080p HD, allowing the user to see everything that goes on at home in more brilliant detail than ever before. If an intruder were to break into one’s home, Arlo’s clear video quality can help one better identify the suspect. The camera has the flexibility to go wire-free thanks to its rechargeable battery, or stay plugged into power. When plugged in to an indoor power outlet, its advanced features like activity zones and optional 24/7 continuous video recording will be unlocked. The IP65-certified Arlo Pro 2 is weather-resistant to stand watch for the user from anywhere, indoors or out, rain or shine.

Key Features • Motion and sound detection: Get instant notifications sent to one’s smartphone or email • Two-Way audio: Listen in and talk through the camera from one’s smartphone • Night vision: Turns on automatically in low light so one can see clearly • 130° viewing angle: Wide-angle PIR motion sensor n no movement slips through without notice • Embedded in the base station, the 100+ decibel makes sure smart security siren can be controlled from anywhere

Supplier: Arlo URL: www.arlo.com

Netatmo Presence Outdoor Security Camera

P

resence enables users to know instantly about what happens outside their home. At night, one can either watch discreetly with Presence’s infrared night vision or switch the camera’s floodlight on. The smart floodlight can be switched on manually in the app or set to switch on when it detects a person, car or animal. It helps users find their way safely at night and deters any unwanted visitors. Simply replacing any existing outdoor light fixture, Presence is specifically designed for outdoor use and can withstand the elements, thanks to HZO technology — an innovative thin-film coating solution. With Presence, one receives customized notifications that match one’s needs. The Alert-Zones feature allows users to select specific areas for alerts. Key Features • The aluminum body gives Presence a timeless design and at the same time makes it extremely durable • Records only when something happens • Videos are recorded in excellent Full HD quality • Able to detect people, cars or animals up to 20 m/65 ft • Bank-level and end-to-end encryption is used for the highest level of protection

Logitech Circle 2

Supplier: Netatmo URL: www.netatmo.com

C

ircle 2 is built to handle rain, snow, heat and cold. Whether plugged into the wall or wire-free (powered by a rechargeable battery that can last between a few days and three months, depending on usage), every Circle 2 security camera works indoors and outdoors. Its easy-to-use mobile and web apps let users stream and download unlimited numbers of 1080p HD videos from anywhere effortlessly. Smart Alerts intelligently analyzes motion to make sure users only get relevant alerts on their mobile devices. Users can also customize alert frequency or sensitivity from the Circle mobile app. Key Features • Integrates seamlessly with Amazon Alexa, Apple HomeKit and Google Assistant • Ultra-wide angle lens with up to 180-degree field-of-view • Night vision that is clear as day and visible up to 15 feet • Secured digitally by a unique identification process to prevent unauthorized access • The Circle app is available on desktop, mobile and Android TV

Supplier: Logitech URL: www.logitech.com

Bosch Eyes Outdoor Camera

T

he Eyes outdoor camera enables users to combine reliable property surveillance with atmospheric exterior lighting. Wherever users are, the Eyes outdoor camera keeps them posted on what is happening around their home. The smart, high-resolution camera can be easily installed in place of an exterior light. Once installed, it keeps an eye on the surroundings and provides users with high quality videos through the Bosch Smart Camera app. The camera’s intelligent sensors ensure that it does not react to movements of trees or pets but only records events that are actually significant. The camera can also be used as an intercom.

Key Features • Connected to smartphone by the Bosch Smart Camera app • Only records relevant events thanks to integrated motion sensors • Provides Full HD color images within a range of 10 meters, 24/7 • Serves simultaneously as intercom and exterior light • Enhances the look of the house wall with its design and integrated sensors

Supplier: Bosch Smart Home URL: www.bosch-smarthome.com

9


News Feature

Building the Physical Security Business Through Merger and Acquisition Mergers and acquisitions have been used as a strategy for Western major players in the physical security industry to fend off Chinese manufacturers, whose market share has grown larger than ever. BY Memoori

B

ased on M&A data collected over the last 17 years on the physical security industry, our annual report, “The Physical Security Business 2017 to 2022, Access Control, Intruder Alarm & Video Surveillance,” shows a general upward trend in consolidation of the industry over this period. In 2017 mergers and acquisitions (M&A) at US$6.2 billion looks like the start of a new wave of growth. The structure of the industry is still very fragmented with hundreds of small companies finding it increasingly difficult to compete. It looks inevitable that the general trend line of value and volume of mergers and acquisitions will continue upwards over the next five years. There is also a need for the leading Western players in the video surveillance industry to go for scale and quickly. Merger and acquisition is the most appropriate strategy to achieve this. The reasons for this are both to fight off Chinese manufactures that are

now much larger and are winning share in developed markets; and also to meet the longer term trend of commoditization of IP network cameras. In 2016/2017 deals over $100 million that we believe will strengthen the physical security business included: FLIR’s acquisition of Point Grey Research, for approximately $253 million in cash. Advent (Oburthur’s) acquisition of Safran’s Card Systems and Identity divisions for $2.4 billion. Advent International, a global private equity fund aims to bring together Safran I&S with Oberthur Technologies to create a global player in the domain of identity technologies strongly rooted in France. Gemalto acquired 3M’s identity management business for $850 million. There are three key components included in 3M’s portfolio that will become part of Gemalto’s Government Programs business: the biometric offerings that came to 3M following the

“The motivation to extend geographical coverage has declined significantly in 2017. Acquisition was driven by the need to acquire leading technology and innovative products.” Cogent acquisition, a document reader line and 3M’s internal secure identity materials business. Together the three areas generate $215 million annually. FLIR Systems acquired Prox Dynamics AS, a developer and manufacturer of nano-class unmanned aerial systems for military and para-military intelligence, surveillance and reconnaissance applications. HID Global acquired Mercury Security, an OEM supplier of controllers and management software for physical access control for an estimated $250 million. VIVOTEK, one of the largest remaining independent video surveillance manufacturers, has

APPLICATION CASES Corporate ORACLE REMOVES WORKFLOW BARRIERS WITH HID SEAMLESS ACCESS CONTROL As speed is everything for a technology-based business such as Oracle, ironically, employees traveling from one facility to the next couldn’t get through the front door. One card wouldn’t do the trick, and not all Oracle cards looked alike. Security system administrators at Oracle began to specify the ISOProx card and ProxPro reader access control system by HID Global, redesigning the entire access control system for the headquarters facility and upgrading all of their domestic offices to the same system. Oracle also implemented HID’s Corporate 1000 Format, which is owned and controlled by the end user, but HID tracks card numbers to make sure card duplication never occurs. The centralized system has brought efficiency and better security. Now there is also one standardized corporate employee identification/security card. No longer does one Oracle card look different from the cardholder database managed at Oracle’s headquarters.

10

www.asmag.com

received an offer to become majority owned by Delta Group, a Taiwan conglomerate. Bain sold Uniview to Hangzhou Jiaozhi Technologies, owned by China Trans Info, and the price paid for Uniview was $535.5 million. We assume that Bain would have approached a number of Western companies to make a bid. Cross border acquisitions accounted for 32 percent of the deals carried out this year compared with 48 percent in 2016. Therefore the motivation to extend geographical coverage has declined significantly in 2017. Acquisition was driven by the need to acquire leading technology and innovative products.

36,248 In 2015, 36,248 criminal offenses were reported on US university and college campuses.

Source: U.S. Department of Education


a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.

How Blockchain Helps With Identity Management Blockchain, without the limitations of conventional identity management solutions, can keep personal data from being altered and would be instrumental for many verticals. BY William Pao

I

dentity management has become an important element in the operations of various end-user organizations such as enterprises, banks and government agencies. However, conventional technologies can be quite limiting, especially due to the presence of a central server that can be hacked or tampered with. This is where blockchain comes in, whose ability to keep personal data from being altered or deleted makes it a great identity management solution for various verticals. That was the point raised by ShoCard, developer of a blockchain-based identity management platform. “The strengths of this platform are: user-privacy, increased-security, ease-of-use, cross-border/industry viability and extensibility into existing mobile apps and services,” said Ali Nazem, VP of Business Development at ShoCard. According to him, conventional security technologies like RFID have proven effective in many regards but are still limited by a number

of factors, one of them being reliance on central databases, physical cards, readers and scanners, rendering them susceptible to fraud, theft and continuous breaches. Blockchain, on the other hand, overcomes those limitations. “Blockchain plays a pivotal role in solving the human identification problems that RFIDs lack. When it comes to digital identification across disparate entities, the combination of the blockchain, mobile technologies and biometrics offers unique possibilities that simply didn’t exist before, and that are able to provide more secure digital proof of identity, over traditional identity measures like ID cards,” Nazem said. The ShoCard solution is ideal for any vertical market where identity management is critical. These include the financial, government, travel, healthcare and mobile network operators (telco) verticals, Nazem said. One use case mentioned by Nazem is credit report sharing. “Credit reports are often limited to a particular country and cannot be shared across borders because each country has its own unique credit reporting systems with different laws regulating them,” he said. “Using the ShoCard IM Platform, a credit reporting company may certify a users’ credit score and related information on the blockchain. This means the certification will be bound to that specific user. The user can now present her credit information to any third party, anywhere in the world.”

City Surveillance HOW THE CITY OF DETROIT REDUCED CRIME BY 50 PERCENT In Detroit, Michigan, city officials looked at occurrences of crime and found that in the first half of 2015, nearly a quarter of the city’s violent crimes happened within 500 feet of a gas station after 10 pm. The Detroit Police Department (DPD) then partnered with eight gas stations that had high definition Axis video surveillance equipment set up around their facilities. The police department and the city also assigned staff to receive, monitor and analyze video feeds from the various partnering locations. The connected video platform is the Genetec Stratocast cloud-based video surveillance solution. By leveraging Microsoft Azure, it is able to provide a highly flexible solution for DPD to easily scale the available storage capacity of their surveillance system and eliminate the need to invest in additional servers.

How Location Data Can Benefit Various Vertical Markets Location data avoids the costs and biases of traditional surveys based on questionnaires and samples. BY William Pao

I

n the age of IoT, more data than ever has been generated to be analyzed for management and operational purposes. Among these data are location-based data that offer insights into a particular area, which can help end users with related planning, marketing and decision-making objectives. That was the point raised by Marion Choppin, Marketing Director at Intersec, which offers a solution called GeoInsight. “Especially in the smart cities area, there are lots of demands calling upon geo-intelligence and capacity to deliver results in a very limited timeframe. Functionalities are linked to the effectiveness of public safety, carbon reduction emissions, smart lighting, parking lots management, traffic regulation, optimization of city staff’s rounds and areas refurbishing,” she said. “Geo-analytics also highlight relevant insights before users invest billions of dollars on huge projects. As new infrastructure investments — new train lines and new highways — will account for more than US$40 trillion in OECD countries in the next 20 years according to a recent OECD report, companies or governments are keen on validating their decision with indisputable facts regarding location, layout and dimensioning.” She cited some other vertical markets that can benefit from this type of solutions. “This tool provides great value to transportation companies, to retailers willing to understand customers’ journey in a mall, as well as to public institutions’ alerting purposes and public safety matters,” she said. The hardware-software combination for the solution is rather simple, Choppin said. “All you need is a couple of servers and our software. The solution then connects to any type of source of data, whatever the vendor and format, through a large library of connectors. Its fast data capability using in-memory caching enables to collect, filter and correlate huge data streams without any risk of overflooding,” she said. “When probes are lacking to provide accurate location data, Intersec supplies an exclusive ‘Geosensor’ that retrieves in real time all necessary location data from the core network.”

11


Vertical Solution

With safety and security concerns on post-secondary campuses being highlighted in light of world events, adopting the best security system is crucial to keeping students and faculty safe. BY Eifeh Strom, Freelancer

Adop N O I T U CA

14

www.asmag.com

Gr


T

here have already been several shootings at US universities in 2018. Events such as these have become an unfortunate reality on post-secondary campuses around the world. This has only highlighted the need for enhanced security measures. The global school and campus security market is forecast to reach nearly US$2.5 billion by the end of 2023, at a CAGR of 19.7 percent during the forecast period 2017 to 2023, according to a report by Market Research Future. North America continues have the largest market share; however, APAC is expected to grow at a fast pace. While video surveillance and access control are obvious components of any

security system, an increase in adoption of both by university campuses globally has been observed. Alone these systems can only do so much; however, in tandem with the latest technologies and integration capabilities, campus security operators are on their way to making campuses safer than ever.

Increased Awareness Driving Security Needs

The primary mission of higher education institutions is to deliver quality education to students; yet, they face the challenge of balancing between a highly secure facility and one that supports open interaction. “Educational institutions face an increasing and constantly evolving risk environment. Recent high-profile incidents emphasize these risks and magnify the vulnerabilities that educational facilities face. This has led to more public demand for improved security solutions across campuses,” said Brandon Reich, Business Leader for Video Surveillance at Pivot3. Jumbi Edulbehram, Regional President of the Americas at Oncam, explained, “Over the last decade, educational facilities all over the world have evolved into what we call ‘soft targets’ for those who wish to do great harm, such as active shooters or vandals. As a result, more robust and comprehensive security

Universities opt Ivy League of Security Amid

rowing Concerns Steve Birkmeier, VP, Sales and Business Development, Arteco

Jumbi Edulbehram, Regional President, Americas, Oncam

James Marcella, Director, Industry Associations, Axis Communications

Thomas Schulz, Marketing and Communications Director, Digital and Access Solutions, ASSA ABLOY EMEA

Terry Schulenburg, Business Development Manager, Education, Genetec

15


Vertical Solution

Tech Trends Make Universities Smarter Students nowadays are more tech savvy than ever. As a result, it only seems right that universities are adopting the latest and most advanced in technologies and security. BY Eifeh Strom, Freelancer

20

www.asmag.com

Julie Brown, Institutional Market Leader, North American Building Solutions, Johnson Controls

W

Brandon Reich, Business Leader, Video Surveillance, Pivot3

James Somerville-Smith, EMEA Programs Leader, Security and Fire, Honeywell Home and Building Technologies

hen it comes to adopting new trends and technologies, universities are often up to the challenge; however, budgetary restrictions can get in the way. Nowadays, though, students expect a certain level of tech savvy and convenience from their educational institution. With this in mind, investing in such technologies is all the more worthwhile if it means higher student enrollment. A recent survey conducted by Wakefield Research for Ellucian, a technology solutions and services provider, found that 87-percent of students considered the tech savvy of colleges when picking an institution. This only further highlights the importance of staying up-to-date on current technology trends. From a security standpoint, these trends can often be integrated into security applications. By listening to and adopting popular technology trends, universities can not only keep students happy, but make campuses safer and smarter.


Tech Trends Driving Security

There is no doubt about it, this generation of students expect digital solutions. When it comes to security, this translates into things like smart cards and mobile apps. Mechanical, analog systems are seen as old and even inconvenient: Why use a physical key when one smart card can open your dorm room, be used to buy food and check out books at the library? “The modernization of systems across campuses are resulting in the repurposing of technologies. For example, smart cards, which once might only have been used as an access control solution, can now be used to attain campus services such as the library or dining commons,” said James Marcella, Director of Industry Associations at Axis Communications. Julie Brown, Institutional Market Leader for North American Building Solutions at Johnson Controls, pointed to several trending technologies being adopted by university campuses. “In response to recent tragic active shooter incidents, gunshot detection solutions are being integrated with systems like video and access control to support emergency preparedness response in the event of an active shooter. Drones continue to be an increasing area of technology enabling the ability to provide security to remote areas, provide additional coverage and detect and disarm unauthorized drones.” All of these trends, however, point to the explosion of data generated by surveillance cameras and other security software on a daily basis, said Brandon Reich, Business Leader for Video Surveillance at Pivot3. “Not only are schools collecting massive amounts of information, but the data obtained is more important than ever before. Modern organizations can no longer tolerate video loss, system downtime or the inability to access live or recorded video. Data loss can lead to major liabilities, and therefore more significance is placed on server and storage infrastructure.”

IoT, Big Data and Cloud

The terms IoT, big data and cloud have spread like wildfire over the last few years, and for good reason. “The IoT and big data trends have benefited campus security systems by increasing interconnectivity and interoperability like never before,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. “The more detail and pieces of information available about a certain event, the quicker the resolution, and the ability for devices to connect via the cloud makes the sharing of this relevant data swift and seamless.” Terry Schulenburg, Business Development Manager for Education at Genetec, noted, “IoT will continue to grow over the next 20 years. There are so many applications for college campuses that can provide extra security, and extra freedom.” Schulenburg pointed out how currently many campuses are tracking important equipment and as well as inventory management using IoT technologies. One example is how a specific university hospital delivery research wing is providing matching wristbands to new mothers and their babies. If the bands are separated by too far of a distance, alarms go off, cameras activate and doors quickly lock down, he explained. Despite how widespread IoT is now, James Somerville-Smith, EMEA Programs

Hyperconverged Infrastructure for Surveillance Storage

What is a hyperconverged infrastructure and how can it help with a campus’ surveillance storage? Brandon Reich, Business Leader for Video Surveillance at Pivot3 explains. ” The increase in data generation and the growing importance of video and integrated security solutions has resulted in a technology shift from closed, proprietary systems to more a mission-critical application that is often hosted inside of a data center and managed by an IT department,” Reich explained. “This evolution is important to note because IT departments will often turn to traditional technologies for video and data storage infrastructure.” However, according to Reich, traditional infrastructure, such as standard servers or SAN storage, is not well suited for video surveillance environments and can lead to underperformance. Hyperconverged infrastructure (HCI) is a new entry into the video surveillance storage market. In fact, the HCI market was valued at US$796.1 million in 2015, according to a report by MarketsandMarkets. It is forecast to reach $12.6 billion by 2022, at a CAGR of 43.6 percent during the forecast period 2016 and 2022. The report states: “The ability of hyperconverged infrastructure systems is to unify the server, storage, networking and virtualization resources on a single commodity server rather than deploying over separate

hardware components. This, in turn, reduces the overall or total cost of ownership (TCO) of systems and offers highly scalable solutions, which are some of the key driving factors for the growth of this market.” According to Reich, “HCI solutions can be optimized to meet the unique needs of video surveillance, offering far more functionality to schools than traditional IT infrastructure. As more educational facilities look to adopt advanced technologies, such as panoramic cameras, more traditional IT storage solutions will be challenged by the write-intensive nature of surveillance.” “It eliminates complexity and cost, and brings enterprise-class technology and benefits at a more affordable price point than traditional server-based systems,” he added.

21


Vertical Solution

Integration Turns PA Systems Into Campus Security Solutions Public address systems are commonplace on university campuses. As a mature technology, advancements may not be groundbreaking; however, integrating it with other security and safety systems could give it new life. BY Eifeh Strom, Freelancer

24

www.asmag.com


O

n a vast university campus, a public address or announcement (PA) system is used to make campuswide announcements. We don’t often think of the safety or security implications of such a system, but integrated with alarm, video surveillance, access control, etc., a PA system has the potential to be much more; it could give campus security operators the ability to turn it into an integral part of a holistic safety and security solution. PA systems are included as part of the public safety and security market, which Research and Markets expects will grow from US$277 billion in 2017 to $532.4 billion by 2022, at a CAGR of 14 percent during the forecast period. Meanwhile, the average price of PA systems has been on a gradual decline in the last three years, according to research by IBISWorld. This a result of heavy market competition and the falling cost of component parts. Even with prices on a slow and steady decline, IBISWorld notes PA systems still only present a moderate total cost of ownership to end users. Regardless of cost, budgets across verticals are getting tighter, and end users want to maximize their return on investment (ROI). This generally requires systems to go beyond just their intended use. By integrating existing and new PA systems with security and safety systems campus security operators may be able to find the ROI they’re looking for.

PA Systems Going IP

In today’s security world, almost every system, if not all, can be connected to a network. A PA system is no different. “The PA over IP solutions have been improved,” said Bob Mesnik, President of Kintronics. “The latest IP amplifiers provide more power and the intercoms include full duplex sound. The software now supports IP cameras, and voice-over-IP (VoIP) phone interfaces as well as special automation that provides if-then responses to certain inputs.” Despite the increased benefits of a

An effective PA system can help efficiently evacuate a building.

Bob Mesnik, President, Kintronics

PA-over-IP system, cost could be an inhibitor — the cost of an IP system can be higher than some standard central analog systems, Mesnik pointed out. However, the ease of installation could help to balance out any cost concerns. “The IP paging solution is easier to install since the wiring is easier. The amplifiers and intercom units all connect to the network. The lower power models use power over Ethernet (PoE), so are very easy to install. In many cases, the ease of installation and the ability to provide many zones provide benefits that justify the increased cost,” he explained.

Integration With Video Surveillance

In general IP paging and intercom systems are used to direct people in emergencies, control doors and control other situations such as crowd control, according to Mesink. However, integrating such systems with others leaves the door open to new uses and can push a technology to its full potential. For example, integrating a campus’ PA system with security systems such as video surveillance could give campus security operators more control over emergency communication. “Paging can be integrated with IP camera systems. There are paging and intercoms that can be attached directly to IP cameras. This can work if the cameras have audio in and out,” Mesnik explained. “Small amplifiers are used to power speakers that can be used with the cameras.” It is also important that the video management software (VMS) supports the audio. “Some VMS will provide an alert if they detect a button activation from the IP camera. The VMS then allows the security person to see what is happening and then talk to the person near the IP camera,” he explained. Alternatively, paging can operate by itself and assist an IP camera security system. “For example, the Digital Acoustic intercom system is independent of the VMS and

25


Product Exploration

Double Your Door Secu

Multimodal Biom More and more, end-user organizations are deploying multimodal biometrics, which have certain advantages over unimodal solutions. Fingerprint readers alone, for example, can’t read people with broken or wrinkled skin. Multimodal readers combining two biometrics, be they fingerprint and face or fingerprint and finger vein, offer greater flexibility and security, suiting the end user’s access control needs. BY William Pao

T

ypically, access control entails the use of any of the three authentication factors, namely cards/tokens (what you have), passwords (what you know) and biometrics (what you are). Increasingly, biometrics, or the “what you are” factor, have become more and more common as the user’s identity can’t be lost, stolen or forgotten as compared to the other factors. “The majority of customers still use metal keys or cards or badges to secure their doors. If those same customers haven’t yet experienced a break-in due to misuse or loss of keys/cards, then they’d be hard-pressed to invest in new technology, for example fingerprint and face readers,” said Larry Reed, CEO of ZKAccess. “But for new installations, it becomes a no brainer. Biometrics is far more secure and convenient than keys and cards because you cannot forget, lose or have stolen your

28

www.asmag.com


"If the user needs a higher security level they can use multiple modes of identification. The person may scan their fingerprint and face to gain access."

curity With

metrics biometric credential.” In the very beginning, unimodal biometrics taking just one biometric from the user, be it finger, face, iris or palm, was common. However, increasingly users have found unimodal biometric technology limiting. In terms of fingerprint, for example, there will always be a certain percentage of people whose fingerprint can’t be read. Face readers, meanwhile, normally don’t perform that well when installed outdoors or exposed to bright sunlight. Adding a second biometric thus becomes a viable option. In fact, the growth potential of multimodal biometrics is not to be ignored. In a report, the research institute Technavio forecast that globally, multimodal biometric solutions would grow at a compound annual growth rate of 15 percent between 2016 and 2020.

Advantages of Multimodal Biometrics

There are various benefits of multimodal biometrics. One is enhanced security at the end-user organization, who can authenticate staff/people via two biometrics instead of one. “The benefit is that they provide

multiple authentication. If the organization requires a higher security level they can use multiple modes of identification,” said Bob Mesnik, President of Kintronics. “For example, the person may scan their fingerprint and face to gain access.” “The fusion of complementary biometric modalities yields higher match performance; that is, fewer false match, false non-match and failureto-enroll rates,” said David Benini, VP of Marketing and Product at Aware. “Conditions may exist where a particular modality cannot be satisfactorily captured, or where a user prefers one over the other. In this case, only one modality is chosen over the other, but this also in a way improves performance and security because capture of poor data and failure-to-enroll is reduced.” “Having multimodel hybrid biometrics improves security, since customers can ‘layer’ the security by using multifactor authentication. For instance, you can implement two-factor authentication which forces users to present a valid fingerprint plus face prior to the device granting them door access,” said Reed. “Some of our hybrid-biometric models have up to four biometric sensors, a card reader and a keypad. The possibilities for security and convenience become endless when considering the use of multimodal biometric technology.” In fact, according to the aforementioned Technavio report, during 2015, North America dominated the multimodal biometrics market and accounted for close to 39 percent of the market share in terms of revenue primarily due to security issues. “The

29


IoT — Hospitality

The hospitality industry is getting more competitive than ever. Against this backdrop, hotels are seeking to differentiate themselves by offering cutting-edge service to guests. With the arrival of IoT, hotel operators are now able to use connected devices and the data they generate to maximize the guest experience, at the same time achieving further operational efficiency and energy savings.

36

www.asmag.com


Making Hotels More Hospitable With TEMPERATURE

RESTAURANT

IoT

LUGGAGE

LAMP

PERSONNEL

BY William Pao

G

lobally, hospitality is a booming industry on the back of increased business and leisure travelers. And hoteliers have reasons to be optimistic, as the uptick in tourist arrivals is expected to continue. The World Tourism Organization under the United Nations forecast that international tourist arrivals would reach 1.8 billion by 2030 and grow at a steady rate of 3.3 percent every year between 2010 and 2030, translating into an average 43 million additional international tourists joining the tourism marketplace annually. However, while this growth is good news for hoteliers, the industry is seeing increased competition, given more and more new hotels are being built. Travelport Hotelzon, a hotel solutions provider, wrote in a 2017 blog post that Berlin was expected to add about 3,700 hotel rooms within the next two years, and London was set to open 8,000 new rooms by the end of 2017 alone. Budapest, meanwhile, has quickly become a hotspot with an additional 2,600 rooms to open across 2017 and 2018, the post said. In the midst of this trend, retaining old

Steve Dunn, CEO and Founder, LEAPIN Digital Keys

Jack He, VP, HDL Automation

customers and attracting new ones has become more important than ever for hotel operators who seek to sustain growth and ensure profits. To that end, operators are turning to IoT and big data for help. “IoT in hospitality has been steadily growing, where it’s becoming available outside of traditional luxury deployments,” said Bill Lally, President of Mode:Green. “Hotels have been using technology to accomplish a specific goal, such as sustainability, but are now incorporating technology as an addition to their branding to differentiate themselves.” “New, digital customer values are being driven by millennials. They want authenticity, personalization, co-creation, social and emotional connection, seamlessness, convenience, control, speed and precision. In this regard, data is king,” said Shovan Sengupta, VP of Hotel Segment at Schneider Electric. “Data around guest interests and patterns informs service design, drives potential partner relationships and becomes the primary asset of hotel chains.” In fact, IoT deployment in hotels is in keeping with the smart home trend, as

37


Special Feature

GD PR Impacts Global Security Supply Chain

With the GDPR looming, privacy and data protection have become even more of a hot topic in the physical security sector. The entire supply chain has to abandon its silo-based approach and collaborate more closely with each other. While system providers and integrators are working to make their products and solutions GDPR-compliant, end users also need to raise their awareness of and take action to ensure data security, since they are the ones who shoulder the majority of the burden of protecting individual privacy. BY Sophie Wu

T

he EU General Data Protection Regulation (GDPR), which goes into effect on May 25 of this year, introduces a series of requirements all organizations that control or process personal data related to EU citizens must comply with, regardless of where the organization is headquartered. The regulation, intended to improve personal data security and increase accountability for data breaches, brings with it fines for non-compliance of up to four percent of annual turnover or 20 million euros (US$24.5 million), whichever is greater. As defined by the GDPR, “personal data” means any information relating to an identifiable natural person (“data

42

www.asmag.com

subject”), including name, location, photo, biometric data, financial as well as medical details and online identifiers such as IP address or device ID, etc. Under the regulation, “data controllers” — organizations that collect personal data for their own use and “data processors” — organizations that process data on behalf of data controllers, such as cloud service providers, bear the responsibility to handle personal data in a secure manner, especially in the areas of management, encryption and pseudonymization. To this end, the GDPR increases liabilities of data processors while making data controllers responsible

for the protection of individuals’ rights and the actions of the processors they engage. Processors and controllers need to know not only what personal information exists within their organizations, but also where and how it is being accessed and used. The GDPR also requires data controllers to report breaches within 72 hours of their discovery, keep records of data processing activities, appoint data protection officers, and conform to individuals’ rights to be forgotten.

End Users Not Ready

Even though the rights of individuals with regard to their personal data are fundamental to the GDPR, consumers


Genetec Offers GDPR-Compliant Solutions

Genetec said that it can guide organizations toward GDPR compliance with both its on-premises and software-as-a-service (SaaS) solutions.

According to a Genetec blog post, Security Center, its unified security platform with connectivity to the cloud, blends IP security systems within a single interface to combine access control, video surveillance and automatic license plate recognition to communications, intrusion detection and analytics. Within Security Center, the KiwiVision Privacy Protector real-time video anonymization module has been re-certified with the European Privacy Seal (EuroPriSe), which certifies that IT products and IT-based services are GDPR-ready. “KiwiVision Privacy Protector allows for originally plain video to be cryptographically encrypted and recorded in the background and then later decrypted by authorized personnel. Data controllers can apply Privacy Protector to only those cameras that are involved in high-risk processing and can choose the ideal level of anonymization for every situation. With only a few clicks, they can either pixelate, blur or completely obscure individuals and objects in a camera’s field of view,” stated the Genetec white paper titled “What the GDPR means for video surveillance.”

do not necessarily take adequate steps to secure themselves. Instead, 62 percent believe businesses holding their data are responsible for its security, according to a Gemalto survey. Especially with the implementation of the GDPR, organizations are now forced to comply with data security protocols, otherwise they will face not only financial consequences but also legal action from consumers. However, research firm Gartner estimates over 50 percent of companies affected by the GDPR will fail to be in full compliance with its requirements by the end of 2018. An Imperva survey of cybersecurity professionals shows similar results, in which half of the respondents said that no one was pushing GDPR preparations within their organizations. According to a Gemalto and Ponemon Institute study on cloud security, a vast majority of global companies (95 percent) have adopted cloud services for data storage. While 53 percent

of respondents said their organizations use multi-factor authentication to secure data access, only 36 percent said their organization encrypts or tokenizes sensitive data in the cloud. Half of global respondents believe that payment information and customer data are at risk when stored in the cloud. Furthermore, 57 percent think using cloud services run the risk of violating privacy laws.

Implications for Video Surveillance

Of all the types of personal data covered by the GDPR, data gathered by video surveillance applications might be among the most sensitive, given its intrusive nature. According to a white paper released by Genetec, privacy, under the GDPR, must be by design, instead of an in addition. “The privacy by design obligation in the GDPR requires an approach to systems engineering in which data protection principles, such as encryption and the

anonymization of video footage, for example, are included from the outset in any system design,” the report stated. It continued: “In addition, data controllers will also be responsible for ensuring that, by default, the minimum amount of data is collected. Video surveillance systems that record constantly and store images indefinitely will be in breach of this provision; as a result, data controllers will need to adopt video surveillance systems with a feature-rich interface that offers flexibility in video recording operations that would enable them to control how long images are retained.” Stanley Convergent Security Solutions, from the perspective of a systems integrator, suggested in its white paper that data controllers remain educated and aware of the ever-changing cyberthreats to their video data and implement a prevention and response program. Data controllers, according to the paper, should ask their security integrators to conduct

43


Viewpoint

Security Technology Trends: A Look Back and Forward Trends don’t start and stop simply as one year ends and a new one starts, and many if not all of the topics in 2017 will still have an impact in 2018. But no doubt new trends and issues will emerge in 2018, from edge computing to virtual assistants to blockchain’s application beyond cryptocurrency. And, of course, the data privacy implications as GDPR comes into effect will be something all organizations will need to deal with. BY Johan Paulsson, CTO, Axis Communications

Trends That Defined the Industry in 2017

As 2018 begins, we look forward to what the year might hold for the security sector. But while looking forward is obviously important in planning for success, it’s also worthwhile to look back at the past year and see which trends emerged that we either anticipated, or appeared unforeseen.

Cybersecurity, the Perennial Issue

In many ways, we can’t really call cybersecurity a trend: it’s now a constant concern for security professionals. Cybercriminals are ever more sophisticated and well-resourced, and tirelessly look to exploit vulnerabilities in technology across all industry sectors. The proliferation of devices connected to the network — the now familiar Internet of Things (IoT) — means that billions of new network access points have been created, each of which, to the cybercriminal, represents an opportunity. Throughout the year, we have highlighted many cybersecurity issues and the ways that businesses can defend themselves against threats, and as we move into 2018, all organizations will need to be vigilant and have ongoing processes in place to ensure the highest levels of cybersecurity.

The Re-Birth of Video Analytics

We saw increased use and sophistication of video analytics during 2017. Video surveillance has previously been purely focused on security-driven applications, but today the analysis of visual data from modern network cameras supports a wide range of functions. Whether used in retail for store optimization and enhancement of the customer experience, in planning smart cities, as a drive toward more sustainable business, or even protecting endangered rhinos in South Africa, the greater ability to analyze the feed of data from network cameras will affect all sectors in the future.

46

www.asmag.com


In addition, using new, non-visual sensors, the view will become multidimensional, providing a richness of data — with the appropriate analytics — that will enable for more rapid and accurate assessment of situations and, therefore, faster escalation, the activation of an appropriate response and the minimization of false alarms.

Smart City Growth

The recent Smart City Expo World Congress, held in Barcelona, was a clear indication of the growing interest in using connected devices and data to improve and enhance the quality of life, safety and security in urban environments. Overall attendance at the event increased significantly and the breadth of organizational functions represented was striking. And while there still seems to be an inconsistent understanding of how to define a smart city, the number of actual cities exhibiting to showcase their smart city credentials shows that the effective use of connected devices and the data they create is becoming an important part of a city’s global reputation and marketing. However, it still seems that many functions within cities are acting in separate silos: it is only when data is shared seamlessly across all departments and functions that the true value and benefits to citizens will be realized.

Security as a Service

Over the last year, we have seen an increased momentum toward security as a service, with remote hosting and monitoring of video transmitted from a customer’s premises, and the solution managed by a sector-specific specialist. Such models remove a significant management burden, not only freeing up resource, but resulting in an improved level of service, better device management and strengthened cybersecurity. But even if we have seen uptake in the market in 2017, the real growth is yet to come.

A Move Toward Solutions, Not Product

The growth in analytics — and the added insight and value this delivers to organizations in specific sectors — is closely related to another of the trends we predicted at the end of 2016: a move toward integrated solutions rather than specific products. The retail sector is a great example, where we now talk to customers about solutions for store optimization (including specific elements like queue management) and loss prevention rather than specific products. It’s something we’re seeing across all sectors — from education to banking — a desire to solve key business issues and enhance operations, rather than buy a selection of hardware and, in doing so, improving the system reliability, performance and total cost of ownership (TCO).

The Potential for Deep Learning

In all sectors, one of the hot technology topics in 2017 has been artificial intelligence (AI) and machine learning. A related area where we saw some initial exploration of in the security sector, and which shows enormous potential, is deep learning. Currently related to the growth in analytics, and the vast amounts of additional data that this is creating. At a relatively basic level, deep learning applications will improve video motion detection, facial recognition, individual tracking and suppression of false alarms. It will aid system design, configuration, optimization and device management. Beyond this, as applications develop, there is significant opportunity for predictive analytics leading to incident prevention: from terrorist incidents to slip and fall accidents; from traffic issues to shoplifting. It is still early days, however. Development is currently fast and unpredictable, and the demands on processing power are massive, but the potential for deep learning, which may ultimately lead to autonomous systems, is huge.

6 Technology Trends That Will Dominate 2018 As existing technologies reach maturity, unforeseen developments arrive ever more quickly, and innovations make the leap from consumer applications to business (and vice versa). It’s imperative that we constantly seek to find those that have the potential to add value to our own business and those of our customers. I’ve been working with my colleagues to identify some trends that we think will have an impact on our business and industry.

A Move Toward the Edge

Two trends of recent years that have become familiar — cloud computing

and the Internet of Things — have delivered undeniable benefits to businesses and consumers alike. But they also come with implications: namely the huge increase in the amount of data being transferred from connected devices to the data center

47


Industry Report

{Part 2}

Koreans Strive for Excellence

It has been quite obvious in the market that Korean companies are preparing for their next big move toward some new applications for video surveillance technologies. In this issue, we talked to some Korean companies ready to provide systems for fleet management and in-vehicle security and safety. Some are getting some positive results in home security and smart home systems, and from integration of IoT devices. The following corporate stories provide valuable examples of how Korean security companies fight for their survival and sustainability in the market. BY Jill Lai

AUTOIT Seeks New Partners for Fleet Management Founded in 2014, AUTOIT focuses on mobile security systems for automobiles and smart factory solutions.

A

Kevin Kong, Deputy GM, Sales Team, AUTOIT

50

UTOIT is a professional company that develops mobile security systems for buses, taxis and heavy duty vehicles. The company provides a complete system for fleet management, both hardware and software; for the latter they have automobile central monitoring software (ACMS) for tracking services. Its ACMS can control real-time vehicle location and monitor live video streaming by using Google Maps and GPS. Its mobile security systems include digital video recorders (DVR), safety systems, multi-view cameras, monitors and around view monitoring systems (AVM), as well as driving assistance and www.asmag.com


VISION HITECH Looks for Niche Markets Based on its video surveillance expertise, VISION HITECH prepares for its next move in niche markets.

V

ISION HITECH is a professional security equipment provider, with a long-term reputation in providing high quality security systems, ranging from IP cameras, HD analog cameras, NVRs/DVRs and software. With an R&D center, and manufacturing, production and assembly lines, VISION HITECH has an efficient manufacturing system, which can flexibly tailor products to customers’ specific requirements. Hee-Jun Lee, Director of the Overseas Sales Department at VISION HITECH said, “That is why the company focuses on providing security equipment to some major clients, such as major telecoms and Hee-Jun Lee, Director, patrol monitoring Overseas Sales Department, VISION HITECH companies.” In terms of the product differentiation, Lee said the founder of VISION HITECH is one of the first two pioneers who introduced CCD technologies to Korea. With this strong technical background, the company is proud of its video tuning and video processing capability in manufacturing CCD and CMOS video imaging equipment. The company admitted that competition with Chinese companies is quite fierce. However, it is well prepared and has started to focus more on new and niche markets that need video surveillance equipment.

Alex Shin, Overseas Sales Team Manager, Innodep

Innodep IoT-Based VMS Ensures Full Integration

Depending on its VMS expertise in physical security, Innodep continues to explore new opportunities in IoT.

I

nnodep is one of the very few video management software (VMS) companies, based in Asia for physical security. Present in the market for 10 years, Innodep has provided hardware, software and installation and integration services for mainly the Korean government sector, working on such projects as city surveillance, public buildings and transportation. In recent years, the company has leveraged its experience in Korea to other Asian countries, by providing a diverse product portfolio that covers NVRs, matrixes, VMS, cloud solutions to intelligent software, such as license plate recognition and face recognition. Alex Shin, Overseas Sales Team Manager for Innodep, said, “In order to expand the overseas markets, we now provide the appliance, especially for the Dell OEM appliance, with preloaded VMS and we also adopt the Microsoft Azure Cloud software to develop our cloud solution, for clients.” What makes the company really stand out is not only its products, but its integration service. Shin highlighted, “We support our clients to ensure the full integration of the VMS with other systems. Now we have grown well in Malaysia, Thailand, Vietnam and then China.” Shin provided an example of a smart factory project in China, and said, “Our Korean partners there required a remote control system for the manufacturing machines. Then, we added cameras with our VMS system to it, to become a remote monitoring and control system for factories.” For city surveillance, Shin said, “In Korea, one of our safety systems designed for taxis, police cars, cash-in-transit, clients provided a dashboard system and integrated other transit buses, trucks and fleet and school buses. information together for city monitoring. So in the video Kevin Kong, Deputy GM of the Sales Team at AUTOIT surveillance side, we provided our video data to integrate said, “Currently, we have our major customers, like truck with the dashboard system. Besides video, they also companies, in Australia. We are also working with some big captured other information and displayed the smart city telecom companies and for government projects in Korea and dashboard together.” other countries, such as Malaysia, Vietnam and Indonesia. Finally, the company also mentioned it tries to grow Next, we are looking for some major customers in the U.S.” more business with integrating other connected systems With its recent developments in ACMS and AVM systems in the IoT ecosystems, such as controlling the cameras on for vehicles, AUTOIT hopes to grow substantially in this streetlights. Via partnering with more companies, Innodep niche market. expects to become an IoT-based VMS provider.

51


SMAhome

Google Home and Amazon Echo offer very similar use experience when it comes to home control. But Google’s edge lies in its more advanced language capability and AI in the cloud. The Google Home ecosystem is taking shape, and this may lead to greater smart home adoption in the next couple of years.

Google Home Gains Popularity and on Its Way to Dominate Smart Home Space

BY a&s SMAhome

G

oogle, Amazon and Apple are the biggest names in the still-developing smart home industry. The former two have launched speakers that can interpret human voice to turn on or off lights, thermostats, cameras and various smart devices at home. Amazon appears to lead the way with its Alexa smart platform, which currently dominates the market by dictating compatibility from the greatest number of home appliances on the market. The e-commerce giant has also introduced the most number of voicerecognition devices, namely the Echo series, to enable even more home control possibilities. It does not necessarily mean Amazon will rule the market ever after. Google offers almost exactly the same services. The Google Assistant platform is also a popular integration choice for smart home product makers. The Google Home speakers have very similar functions to Amazon Echo. They are both great choices to control home devices with voice command. Google Home and Amazon Echo offer very similar use experience when it

54

www.asmag.com

R n obert Thompson, Chief Enablement Architect, i.MX Applications Processors, NXP Semiconductors

“ When it comes to voice assistant, people want things that they are familiar with, that are compatible with their smartphones. And this may give Google Assistant an edge.”

Tom Leonard, VP, n Marketing and Product Management, Energy Management Controls and Automation Division, Leviton

“ While Amazon may own a lot of the space today, Google has major potential with its wealth of data and processing power.”

comes to home control. Device makers essentially go through the same process when making Google Assistant or Alexa compatible products. The needed software and hardware components are very much alike. Google, however, has an edge over Amazon. That is, the great number of Android system users. There are two billion active users of Android phones. Consumers might be more likely to purchase Google Assistant devices because they are already used to it compared with Alexa, according to Robert Thompson, Chief Enablement Architect for i.MX Applications Processors at NXP Semiconductors. For example, when consumers see a voiceenabled coffeemaker, they’ll choose the one that works with Google. “When it comes to voice assistant, people want things that they are familiar with, that are compatible with their smartphones,” Thompson said.

AdvAnced LAnguAge cApAbiLity Google is also many steps ahead in its language ability. While Alexa currently supports only English and German,


Google has a much larger language knowledge because Android is available in 80 languages. “As of today, Google Home is deployed in more languages than Amazon and it is possible to use the Google Assistant from a smartphone,” said Jérôme Leroy, VP Sales & Marketing at smart lighting manufacturer WiZ. Some companies have also pointed out that Google provides a more intuitive, more natural language exchange experience. “Google Home allows users to naturally ask for switching on or off the light. To dim at the right level of intensity,” Leroy added.

Ai in the cLoud In addition to its natural language ability, Google may also excel at cloud intelligence. Providing services and collecting data in many countries across the world, Google has accumulated vast amounts of data that can help it carry out analytics. The AI could be proven very useful in smart home applications. When a user talks to Google Home, the command will be sent to Google’s cloud, where the voice command is processed before the signal is passed to a home device.

“Really all the intelligence, such as asking a question or weather, goes on in the cloud, not the end devices,” NXP’s Thompson pointed out when asked to compare Alexa and Google Assistant from a home control perspective. Smart lighting solution company Leviton Manufacturing concurred. “While Amazon may own a lot of the space today, Google has major potential with its wealth of data and processing power,” said Tom Leonard, VP of

GK Lee, VP, mIoT n Strategic Business Unit, D-Link

“ Now without the (Google Home) integration you can’t seem to sell your products in Best Buy or Walmart. It wasn’t like this three or four years ago. And this helps the (smart home) ecosystem to take shape.”

Marketing and Product Management for Leviton’s Energy Management Controls and Automation Division. Google’s AI has drawn some attention in the industry. Startup company Lynky is making a Google Assistant-powered touchscreen speaker that looks similar to Amazon’s Echo Show. “We believe Google will lend its AI experience to help solve some vexing smart home challenges such as setup, automation creation, etc.,” said Lynky’s Product

CD Liu, PM Director, n Good Way Technology

“ Google Assistant access data from the cloud, and as such, may have latency, Internet stability and security issues. Intruders may break in to control home devices without authorization.”

55


New Products

asmag.com PRODUCT FOCUS To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact as-pr@newera.messefrankfurt.com

Conekt Mobile Credential Reader

MV-PD-030001-03 Portable Under Vehicle Inspection System

Hikvision Digital Technology/China Key Features • Plug and play • Customized software, supports ALPR • All-in-one, highly integrated • 2,048 x 12,000 maximum resolution • Vehicle speed matching • Illumination optimized for vehicle undercarriage Email: overseasbusiness@hikvision.com

Farpointe Data/U.S. Key Features • Multiple Conekt credentials can fit into a single smartphone wallet app • Installer adjustable read ranges can be excess of 15 feet • Compliant to Certified Common Criteria EAS5+ Computer Interface Standard • Increased hardware cybersecurity to resist skimming • Interface easily with control panels or other security management systems Email: support@farpointedata.com

BCPro Workstation

Johnson Controls/U.S. Key Features • Embedded with Metasys, Johnson Control’s smart building automation system technology • Simplified architecture, with all key functions for facility control programmed in central workstation • Open standard BACnet protocol compatible with MODBUS equipment • All new graphic user interface • Web-based user interface Email: be-sg-johnson.controls.marketing@jci.com

Quasar 4x2K Panoramic Security Camera

FLIR Systems/Australia Key Features • Features four, full high-definition BSI visible sensors • Seamless integrated with FLIR’s United VMS and a wide range of thirdparty VMS options • Field convertible 180/360degree field of view • True day/night camera with built-in infrared illumination and shutter WDR • Outdoor ready, vandal resistant Email: info@flir.com.au

PTZ1A225UIRA-N Starlight IR Network Positioning System

60

AV20585PM SurroundVideo G5 Series Panoramic Camera

Climatix C600 HVAC controllers Siemens Building Technology/Germany Key Features • Faster processor and more memory space for complex applications • Efficient refrigeration control with inbuilt electronic expansion valves drivers • Designed for complex applications comprising up to 8,000 objects • Easy cloud connection for digitalized services • Configurable on-board inputs and outputs Email: sales@siemens.com

Tamron/Japan Key Features • Support of generic interfaces — fast integration • At a low cost, suitable for price-sensitive applications • Contactless temperature monitoring of humans or equipment • No shutter noise • Uninterrupted video Email: custserv@tamron.com

www.asmag.com

Vicon Industries/U.S. Key Features • Day/night and IR illumination • 2 MP (TVI/AHD) and 700 TV lines (CVBS) • Digital noise reduction (DNR) • On-screen menus with innovative control make setup and operation easy • Wall or ceiling mounting • IP66 and IK10 rated Email: sales@vicon-security.com

Arecont Vision/U.S. Key Features • 20 MP • 180 degree panoramic view • Remote focus • True day/ night • Indoor/outdoor, IP66 rates • IK-10 impact resistant Email: support@arecontvision.com

Shutterless Thermal Camera

Dahua Technology/China Key Features • 1/2.8” 2 MP STARVIS CMOS • Powerful 25x optical zoom • Starlight technology • H.265 Encoding • Max 50/60 fps at 1080p • Auto-tracking and IVS Email: overseas@dahuatech.com

Global Bridge/Korea Key Features • Minimized signal interference by patented CDMA technology • Perfect for UHD 4K and FHD 1080p real-time video data transmission • Low power consumption • Max 10 km wireless video data transmission • Quick reconnection with the reset button Email: jk.lim@kmwsky.com

V672V-W312MIR Vandal Dome Camera

D-TECT Pet Immune Outdoor Detector

GJD Manufacturing/U.K. Key Features • Pet tolerant for animals up to 30 kg • Selectable range up to 15 m • Covert sensor module • Anti-masking technology • Dual PIR and microwave technology • Durable weather-proof, aesthetically pleasing design Email: info@gjd.co.uk

SKYBRIDGE CDMA Wireless SR-100 Wireless Router

CNFE3TX2CXMS Series 4G LTE Cellular VPN Gateway ComNet/U.S. Key Features • Supports 802.1X authentication • HTTPS support for secure management • 4G LTE modem built in • OpenVPN • 1KV isolation for PoE PD port • Cellular antennas included Email: sales@comnet.net


Show Calendar PULSESTAR PSTR-i72-HV Infra-Red Illuminator Raytec/U.K. Key Features • High intensity – up to 660W lighting drive power • Easily link lighting pulse with camera shutter (TTL – 3.3-24V DC) • Platinum Elite twin-core SMT LEDs • Universal 100-230V AC PSU included (24V DC optional) • VARIO interchangeable lens system • Extreme long life and low maintenance Email: Sales@rayteccctv.com

M5054 PTZ Network Camera Axis Communications/Sweden Key Features • HDTV 720p/1 MP • 5x optical zoom with autofocus and WDR • Axis video motion detection 4 • Audio volume detection • Scream detection • Removed object detection Email: axis-sap@axis.com

WISE Surveillance Solution With Line Notification

ICP Das/Taiwan Key Features • One controller integrates with IP camera and I/O module • Records critical video and image to save storage • Two-way interaction between I/O and video • Seamlessly integrates with SCADA • One stop shopping/ service (controller/I/O module/IP camera/SCADA) Email: sales@icpdas.com

In-Vehicle Mini-PICe CANBus Module

Apacer Technology/Taiwan Key Features • Support 2-channel Individual protocols from RAW CAN 2.0 a/ b, OBDII, J1939, FMS interfaces, 1-Channel J1708 interface • CAN OPEN CIA 301/302/401/402 with full isolation for industrial automation, medical equipment applications • Integrated: gyroscope, 3D accelerometer, 3D magnetometer • Optional GNSS GPS board dead reckoning for continuous navigation during signal interruptions • Operation temperature -40 °C to +85 °C • SDK for quick systems integration Email: austin_kuo@apacer.com

FR33C2 Day and Night 12MP 360° Panorama Dome IR IP Camera

Merit LILIN/Taiwan Key Features • Full HD 12.0 megapixel CMOS image sensor • H.264 and Motion JPEG multi-profile video streaming • Support 360-degree field of imaging and an ROI video streaming output simultaneously • 360-degree entire scene from one camera and no mechanical PTZ (pan, tilt, zoom) motor needed • Up to 4 independent distortion-corrected view angles can be specified (dewarping) Email: sales@meritlilin.com.tw

LK-119 Wireless Autodialer

City Wall Enterprise/Taiwan Key Features • Easy to use: Simply press the remote and the call help dialer can make up to 8 calls to landlines or cellphones • Good for home care, emergency, robbery prevention and retailcounter safety • Easy installation • Manufactured in Taiwan with worldwide patent Email:citywall5@garrison.com.tw

WORLD SECURITY EXHIBITION DIRECTORY

Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_ events.aspx.

2 3

INTEGRATED SYSTEMS EUROPE • Date: 2018/02/06—02/09 • Venue: RAI Amsterdam, The Netherlands • Tel: +31-20-240-2424 • Email: office@iseurope.org • URL: www.iseurope.org

INTERNATIONAL HARDWARE FAIR COLOGNE

• Date: 2018/03/04—03/07 • Venue: Koelnmesse, Cologne, Germany • Tel: +49-221-821-0 • Email: info@koelnmesse.de • URL: www.eisenwarenmesse.com

SECON

ISC WEST • Date: 2018/04/11—04/13 • Venue: Sands Expo Center, Las Vegas, U.S. • Tel: +1-203-840-5602 • Email: inquiry@isc.reedexpo.com • URL: www.iscwest.com

SECUTECH INTERNATIONAL • Date: 2018/04/25—04/27 • Venue: Nangang Exhibition Hall, Taipei, Taiwan • Tel: +886-2-8729-1017 • Email: Kirstin.Wu@newera. messefrankfurt.com • URL: www.secutech.com

5

INTERNET OF THINGS WORLD

• Date: 2018/03/14—03/16 • Venue: Hall 4-5, KINTEX, Seoul, South Korea • Tel: +82-2-6715-5406 • Email: global@seconexpo.com • URL: seconexpo.com/2018/eng/ main.asp

• Date: 2018/05/14—05/17 • Venue: Santa Clara Convention Center, Santa Clara, CA, U.S. • Tel: +1-646-616-7610 • Email: desiree.mitcham@knect365. com • URL: tmt.knect365.com/iot-world

LIGHT + BUILDING

IFSEC PHILIPPINES

• Date: 2018/03/18—03/23 • Venue: Messe Frankfurt, Frankfurt Am Main, Germany • Tel: +49-69-75-75-0 • Email: lightbuilding@messefrankfurt.com • URL: www.light-building.com

INTERTRAFFIC AMSTERDAM • Date: 2018/03/20—03/23 • Venue: RAI Amsterdam, The Netherlands • Tel: +31 (0) 20-549-12-12 • Email: registration@rai.nl • URL: www.intertraffic.com/ amsterdam

4

SECUTECH INDIA

• Date: 2018/04/05—04/07 • Venue: Bombay Exhibition Centre, Mumbai, India • Tel: +886-2-8729-1099 Ext. 531 • Email: israel.gogol@newera. messefrankfurt.com • URL: www.secutechindia.co.in

• Date: 2018/05/30—06/01 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-03-2176-8788 • Email: Syamsul.Razak@ubm.com • URL: www.ifsec.events/philippines

6

IFSEC INTERNATIONAL

• Date: 2018/06/19—06/21 • Venue: Excel, London, U.K. • Tel: +44 (0) 20-7921-5000 • Email: ifseccustomerservice@ubm. com • URL: www.ifsec.events/international

COMMUNICASIA • Date: 2018/06/26—06/28 • Venue: Marina Bay Sands, Singapore • Tel: +65-6233-6688 • Email: enquiry@communicasia.com • URL: www.communicasia.com

61


Companies Advertiser Index in This Issue *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

Surveillance

PRODUCTS OF THE MONTH • Arlo • Bosch Smart Home • Logitech • Nest • Netatmo • remo+ • Ring

Page No.

VIEWPOINT

• Axis Communications

Major Item

Country

E-Mail

13 CYG WAYON

COMPONENTS

CHINA

wub@way-on.com

TECHNOLOGY INSIDE DAHUA CO., LTD. FRONT COVER, 1

SURVEILLANCE

CHINA

overseas@dahuatech.com

41 FOCTEK

LENS

CHINA

sales@foctek-lens.com

FRAN OPTICS 39 FUJIAN CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

BACK HIKVISION DIGITAL COVER TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness @hikvision.com

5 IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

LENS

CHINA

sales@forecam.com

CAMERA

JAPAN

newbiz@tamron.co.jp

3 TECHPOINT INC.

CHIPSET

USA

dma@techpointinc.com

7 TIANDY

SURVEILLANCE

CHINA

sales@tiandy.com

Major Item

Country

E-Mail

PRODUCT EXPLORATION • Aware • Kintronics • TimeTec Computing • ZKAccess

IoT — HOSPITALITY • Control4 • HDL Automation • LEAPIN Digital Keys • Mode:Green • Schneider Electric

23 RICOM

SPECIAL FEATURE

INSIDE TAMRON CO., LTD. BACK COVER

• Axis Communications • Genetec • Mobotix • Thales

VERTICAL SOLUTION

• Arteco • ASSA ABLOY EMEA • Axis Communications • Genetec • Honeywell Home and Building Technologies • Johnson Controls • Kintronics • Oncam • Pivot3

Access Control Page No.

Advertiser

35 GIGA-TMS INC.

INDUSTRY REPORT

RFID MODULE / LOCK TAIWAN / READER

promag@gigatms.com.tw

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

• AUTOIT • GES • Innodep • Truen • VISION HITECH • Wonwoo Engineering

Next Issue 62

Advertiser

Vertical Solution | Office Buildings Special Feature | Deep Learning Product Review | AI Cameras With Facial Recognition

www.asmag.com


A&S #I229 JAN/FEB.2018  

Universities Adopt Ivy League of Security Amid Growing Concerns

A&S #I229 JAN/FEB.2018  

Universities Adopt Ivy League of Security Amid Growing Concerns

Advertisement