a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video door phone, home automation and other fields relevant to electronic security.
中華郵政北台字第 1571 號 執照登記為雜誌交寄 John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher Editorial
Universities Adopt Ivy League of Security Amid ION
Growing Concerns With safety and security concerns on post-secondary campuses being highlighted in light of world events, adopting the best security system is crucial to keeping students and faculty safe.
Tech Trends Make Universities Smarter Integration Turns PA Systems Into Campus Security Solutions
General Press Jill Lai Alf Chang Emily Lin William Pao
Editor-in-Chief Senior Consultant Executive Editor Senior Reporter
Gaven Lee Executive Designer email@example.com Mao Chang Senior Designer firstname.lastname@example.org Circulation
Michelle Shih Officer
Lisa Hsu Sr Media Mktg Coordinator email@example.com Corporate Management
Thomas Pin Account Manager Chihung Lee IT Manager
More and more, end-user organizations are deploying multimodal biometrics, which have certain advantages over unimodal solutions.
Jessica Yang Project Manager firstname.lastname@example.org Secutech
Peggy Wu Veronica Chen Jason Cheng Michelle Chu
Trade Fair Manager Group Manager Project Manager Event Marketing Manager
email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org
International Advertising [Headquarters]
Carolina Pattuelli Evris Consolos Adis Hodzic Manish Gandhi Iris Lai Carol Guan Y. C. Suh Takashi Komori Nguyen Thu Ha Ekaterina Shapovalova Mariusz Kucharski
Koreans Strive for Excellence — Part 2 It has been quite obvious in the market that Korean companies are preparing for their next big move toward some new applications for video surveillance technologies.
Europe (Italy) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia Poland
email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com
Messe Frankfurt New Era Business Media Ltd.
[Branches & Representatives]
Double Your Door Security With Multimodal Biometrics
Israel Gogol Manager Audrey Fang Officer
firstname.lastname@example.org email@example.com firstname.lastname@example.org email@example.com firstname.lastname@example.org
Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard, Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.newera.tw.messefrankfurt.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China and a&s Taiwan (above published in Chinese). a&s Adria, a&s India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at email@example.com Copyright© 2018 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
EDITOR’S NOTE a&s Refocuses on Convergent Technologies In the past year, we saw a surge of interest in artificial intelligence (AI) from all industries. Video/image and audio recognition technologies have evolved with AI, producing various innovations. According to Grand View Research, AI’s main vertical markets include healthcare, law, retail, advertising and media, automotive and transportation, agriculture, manufacturing, risk assessment, research and others. AI, as well as other developments in IoT and big data, has contributed to convergent technologies. This will eventually create the alliance of different industries, such as security and ICT, for these verticals. Future industry development is also pushing a&s to refocus its editorial content, in order to reach new readership. We intend to explore how these technologies — video, audio, identity management and different sensing technologies — can be used for security, automation and business intelligence; and in the meantime, how the megatrends of AI, IoT and big data are influencing these technologies. In terms of verticals, our new focus will be on smart buildings, factories and automotive. We predict that these verticals will quickly develop with the convergent technologies in the year ahead. With this new editorial content, a&s can provide you with more valuable resources and new perspectives to make better and informed business decisions.
KEEP IN TOUCH WITH...
SOCIAL MEDIA www.facebook.com/ asmagglobal
www.linkedin.com/ company/ asmagglobal
EDITOR-IN-CHIEF JILL LAI
Global Security News Media Platform FOLLOW US:
SENIOR REPORTER WILLIAM PAO
EXECUTIVE EDITOR EMILY LIN
Globally, hospitality is a booming industry on the back of increased tourist arrivals. But this is also putting more competitive pressures on hotel operators in the face of more lodging facilities that are being built. Against this backdrop, hotel operators seek to differentiate themselves by offering cutting-edge services to guests. More and more, this can be done with the Internet of Things.
Cyberthreats and attacks continue to rise in number and magnitude, resulting in business losses and data privacy violations. It is vital for the whole chain — manufacturers, installers, integrators, users, etc. — to shoulder the responsibility of minimizing vulnerabilities and ensuring that their systems are secure. After all, a chain is only as strong as its weakest link.
Products of the Month
Outdoor Home Security Cameras Getting Smart R and Sharp Ring Floodlight Cam
If you want to keep an eye on what is happening at home without fretting over the cost of a full-fledged home security system, investing in a Wi-Fi connected camera is a good start. Home security cameras can be divided into indoor cameras and outdoor cameras, both playing an important role in keeping one’s family and property safe. Nowadays, with the availability of features such as facial recognition and motion detection, outdoor security cameras are getting smarter.
Nest Cam IQ Outdoor
est Cam IQ is weatherproof, tamper-resistant and seriously sharp, allowing users to know about a break-in before it happens. This outdoor security camera can detect a person up to 50 feet away, then alerts users with a photo of who is there. With Nest Aware, it can even recognize a familiar face. Nest Cam IQ has a close-up tracking view — when it sees a person, its special algorithms automatically zoom in and follow the action in the app. With a 4K sensor, the camera can zoom in up to 12x and enhance for a crisp picture, allowing users to keep a close eye on somewhere specific. Its daytime HDR combines multiple 4K images to even out challenging lighting conditions, so that details do not get blown out or lost in the shadows.
ing Floodlight Cam is a motion-activated security camera with built-in floodlights, a siren alarm and two-way audio. These features allow users to see, hear and speak to anyone on their properties from anywhere. With object and facial detection, Floodlight Cam has advanced motion sensors in home security. Its 270° field-ofview will enable users to detect motion around corners and monitor all their blind spots. Floodlight Cam easily replaces existing wired floodlights and connects to standard junction boxes. With the app, users can flash the lights, sound the alarm and zoom-in to focus on their most important areas. Key Features • Crystal-clear HD video • 110-decibel siren alarm • Dual sensors with object and facial detection • Ultra wide-angle motion sensors • Customizable motion zones and scheduling • Motion-activated camera and floodlights
Supplier: Ring URL: www.ring.com
Key Features • Weatherproof IP66 rating • Powerful built-in speaker and mic, with noise and echo suppression • High-power infrared LEDs for clear, even night vision • A hidden power cord plugs into an indoor outlet for 24/7 security • Multi-axis 360° rotation
Supplier: Nest URL: www.nest.com
emo+ DoorCam monitors any entry way with a wire-free, over-the-door smart HD camera with built-in motion sensor, two-way talk and night vision. DoorCam can be self-installed within seconds by hanging over any residential door without damaging property. The camera has superior connectivity in that the antenna and Wi-Fi chipset are placed inside the user’s home to limit Wi-Fi connection interference from thick building materials. DoorCam operates on three D-type batteries that last for up to 12 months until batteries need to be replaced.
Key Features • HD video: Streams HD videos with 160° wide angle view • Two-way audio: Speak and listen to visitors with full duplex audio using the free remo+ app • Cloud recording: Access all videos within last 30 days from one’s phone, including missed activities • PIR sensor: Customize motion sensor sensitivity to detect relevant activities in real time • Night vision: See motion and answer calls with infrared night vision
Supplier: remo+ URL: www.remoplus.co
Arlo Pro 2
rlo Pro 2 comes with 1080p HD, allowing the user to see everything that goes on at home in more brilliant detail than ever before. If an intruder were to break into one’s home, Arlo’s clear video quality can help one better identify the suspect. The camera has the flexibility to go wire-free thanks to its rechargeable battery, or stay plugged into power. When plugged in to an indoor power outlet, its advanced features like activity zones and optional 24/7 continuous video recording will be unlocked. The IP65-certified Arlo Pro 2 is weather-resistant to stand watch for the user from anywhere, indoors or out, rain or shine.
Key Features • Motion and sound detection: Get instant notifications sent to one’s smartphone or email • Two-Way audio: Listen in and talk through the camera from one’s smartphone • Night vision: Turns on automatically in low light so one can see clearly • 130° viewing angle: Wide-angle PIR motion sensor n no movement slips through without notice • Embedded in the base station, the 100+ decibel makes sure smart security siren can be controlled from anywhere
Supplier: Arlo URL: www.arlo.com
Netatmo Presence Outdoor Security Camera
resence enables users to know instantly about what happens outside their home. At night, one can either watch discreetly with Presence’s infrared night vision or switch the camera’s floodlight on. The smart floodlight can be switched on manually in the app or set to switch on when it detects a person, car or animal. It helps users find their way safely at night and deters any unwanted visitors. Simply replacing any existing outdoor light fixture, Presence is specifically designed for outdoor use and can withstand the elements, thanks to HZO technology — an innovative thin-film coating solution. With Presence, one receives customized notifications that match one’s needs. The Alert-Zones feature allows users to select specific areas for alerts. Key Features • The aluminum body gives Presence a timeless design and at the same time makes it extremely durable • Records only when something happens • Videos are recorded in excellent Full HD quality • Able to detect people, cars or animals up to 20 m/65 ft • Bank-level and end-to-end encryption is used for the highest level of protection
Logitech Circle 2
Supplier: Netatmo URL: www.netatmo.com
ircle 2 is built to handle rain, snow, heat and cold. Whether plugged into the wall or wire-free (powered by a rechargeable battery that can last between a few days and three months, depending on usage), every Circle 2 security camera works indoors and outdoors. Its easy-to-use mobile and web apps let users stream and download unlimited numbers of 1080p HD videos from anywhere effortlessly. Smart Alerts intelligently analyzes motion to make sure users only get relevant alerts on their mobile devices. Users can also customize alert frequency or sensitivity from the Circle mobile app. Key Features • Integrates seamlessly with Amazon Alexa, Apple HomeKit and Google Assistant • Ultra-wide angle lens with up to 180-degree field-of-view • Night vision that is clear as day and visible up to 15 feet • Secured digitally by a unique identification process to prevent unauthorized access • The Circle app is available on desktop, mobile and Android TV
Supplier: Logitech URL: www.logitech.com
Bosch Eyes Outdoor Camera
he Eyes outdoor camera enables users to combine reliable property surveillance with atmospheric exterior lighting. Wherever users are, the Eyes outdoor camera keeps them posted on what is happening around their home. The smart, high-resolution camera can be easily installed in place of an exterior light. Once installed, it keeps an eye on the surroundings and provides users with high quality videos through the Bosch Smart Camera app. The camera’s intelligent sensors ensure that it does not react to movements of trees or pets but only records events that are actually significant. The camera can also be used as an intercom.
Key Features • Connected to smartphone by the Bosch Smart Camera app • Only records relevant events thanks to integrated motion sensors • Provides Full HD color images within a range of 10 meters, 24/7 • Serves simultaneously as intercom and exterior light • Enhances the look of the house wall with its design and integrated sensors
Supplier: Bosch Smart Home URL: www.bosch-smarthome.com
Building the Physical Security Business Through Merger and Acquisition Mergers and acquisitions have been used as a strategy for Western major players in the physical security industry to fend off Chinese manufacturers, whose market share has grown larger than ever. BY Memoori
ased on M&A data collected over the last 17 years on the physical security industry, our annual report, “The Physical Security Business 2017 to 2022, Access Control, Intruder Alarm & Video Surveillance,” shows a general upward trend in consolidation of the industry over this period. In 2017 mergers and acquisitions (M&A) at US$6.2 billion looks like the start of a new wave of growth. The structure of the industry is still very fragmented with hundreds of small companies finding it increasingly difficult to compete. It looks inevitable that the general trend line of value and volume of mergers and acquisitions will continue upwards over the next five years. There is also a need for the leading Western players in the video surveillance industry to go for scale and quickly. Merger and acquisition is the most appropriate strategy to achieve this. The reasons for this are both to fight off Chinese manufactures that are
now much larger and are winning share in developed markets; and also to meet the longer term trend of commoditization of IP network cameras. In 2016/2017 deals over $100 million that we believe will strengthen the physical security business included: FLIR’s acquisition of Point Grey Research, for approximately $253 million in cash. Advent (Oburthur’s) acquisition of Safran’s Card Systems and Identity divisions for $2.4 billion. Advent International, a global private equity fund aims to bring together Safran I&S with Oberthur Technologies to create a global player in the domain of identity technologies strongly rooted in France. Gemalto acquired 3M’s identity management business for $850 million. There are three key components included in 3M’s portfolio that will become part of Gemalto’s Government Programs business: the biometric offerings that came to 3M following the
“The motivation to extend geographical coverage has declined significantly in 2017. Acquisition was driven by the need to acquire leading technology and innovative products.” Cogent acquisition, a document reader line and 3M’s internal secure identity materials business. Together the three areas generate $215 million annually. FLIR Systems acquired Prox Dynamics AS, a developer and manufacturer of nano-class unmanned aerial systems for military and para-military intelligence, surveillance and reconnaissance applications. HID Global acquired Mercury Security, an OEM supplier of controllers and management software for physical access control for an estimated $250 million. VIVOTEK, one of the largest remaining independent video surveillance manufacturers, has
APPLICATION CASES Corporate ORACLE REMOVES WORKFLOW BARRIERS WITH HID SEAMLESS ACCESS CONTROL As speed is everything for a technology-based business such as Oracle, ironically, employees traveling from one facility to the next couldn’t get through the front door. One card wouldn’t do the trick, and not all Oracle cards looked alike. Security system administrators at Oracle began to specify the ISOProx card and ProxPro reader access control system by HID Global, redesigning the entire access control system for the headquarters facility and upgrading all of their domestic offices to the same system. Oracle also implemented HID’s Corporate 1000 Format, which is owned and controlled by the end user, but HID tracks card numbers to make sure card duplication never occurs. The centralized system has brought efficiency and better security. Now there is also one standardized corporate employee identification/security card. No longer does one Oracle card look different from the cardholder database managed at Oracle’s headquarters.
received an offer to become majority owned by Delta Group, a Taiwan conglomerate. Bain sold Uniview to Hangzhou Jiaozhi Technologies, owned by China Trans Info, and the price paid for Uniview was $535.5 million. We assume that Bain would have approached a number of Western companies to make a bid. Cross border acquisitions accounted for 32 percent of the deals carried out this year compared with 48 percent in 2016. Therefore the motivation to extend geographical coverage has declined significantly in 2017. Acquisition was driven by the need to acquire leading technology and innovative products.
36,248 In 2015, 36,248 criminal offenses were reported on US university and college campuses.
Source: U.S. Department of Education
a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.
How Blockchain Helps With Identity Management Blockchain, without the limitations of conventional identity management solutions, can keep personal data from being altered and would be instrumental for many verticals. BY William Pao
dentity management has become an important element in the operations of various end-user organizations such as enterprises, banks and government agencies. However, conventional technologies can be quite limiting, especially due to the presence of a central server that can be hacked or tampered with. This is where blockchain comes in, whose ability to keep personal data from being altered or deleted makes it a great identity management solution for various verticals. That was the point raised by ShoCard, developer of a blockchain-based identity management platform. “The strengths of this platform are: user-privacy, increased-security, ease-of-use, cross-border/industry viability and extensibility into existing mobile apps and services,” said Ali Nazem, VP of Business Development at ShoCard. According to him, conventional security technologies like RFID have proven effective in many regards but are still limited by a number
of factors, one of them being reliance on central databases, physical cards, readers and scanners, rendering them susceptible to fraud, theft and continuous breaches. Blockchain, on the other hand, overcomes those limitations. “Blockchain plays a pivotal role in solving the human identification problems that RFIDs lack. When it comes to digital identification across disparate entities, the combination of the blockchain, mobile technologies and biometrics offers unique possibilities that simply didn’t exist before, and that are able to provide more secure digital proof of identity, over traditional identity measures like ID cards,” Nazem said. The ShoCard solution is ideal for any vertical market where identity management is critical. These include the financial, government, travel, healthcare and mobile network operators (telco) verticals, Nazem said. One use case mentioned by Nazem is credit report sharing. “Credit reports are often limited to a particular country and cannot be shared across borders because each country has its own unique credit reporting systems with different laws regulating them,” he said. “Using the ShoCard IM Platform, a credit reporting company may certify a users’ credit score and related information on the blockchain. This means the certification will be bound to that specific user. The user can now present her credit information to any third party, anywhere in the world.”
City Surveillance HOW THE CITY OF DETROIT REDUCED CRIME BY 50 PERCENT In Detroit, Michigan, city officials looked at occurrences of crime and found that in the first half of 2015, nearly a quarter of the city’s violent crimes happened within 500 feet of a gas station after 10 pm. The Detroit Police Department (DPD) then partnered with eight gas stations that had high definition Axis video surveillance equipment set up around their facilities. The police department and the city also assigned staff to receive, monitor and analyze video feeds from the various partnering locations. The connected video platform is the Genetec Stratocast cloud-based video surveillance solution. By leveraging Microsoft Azure, it is able to provide a highly flexible solution for DPD to easily scale the available storage capacity of their surveillance system and eliminate the need to invest in additional servers.
How Location Data Can Benefit Various Vertical Markets Location data avoids the costs and biases of traditional surveys based on questionnaires and samples. BY William Pao
n the age of IoT, more data than ever has been generated to be analyzed for management and operational purposes. Among these data are location-based data that offer insights into a particular area, which can help end users with related planning, marketing and decision-making objectives. That was the point raised by Marion Choppin, Marketing Director at Intersec, which offers a solution called GeoInsight. “Especially in the smart cities area, there are lots of demands calling upon geo-intelligence and capacity to deliver results in a very limited timeframe. Functionalities are linked to the effectiveness of public safety, carbon reduction emissions, smart lighting, parking lots management, traffic regulation, optimization of city staff’s rounds and areas refurbishing,” she said. “Geo-analytics also highlight relevant insights before users invest billions of dollars on huge projects. As new infrastructure investments — new train lines and new highways — will account for more than US$40 trillion in OECD countries in the next 20 years according to a recent OECD report, companies or governments are keen on validating their decision with indisputable facts regarding location, layout and dimensioning.” She cited some other vertical markets that can benefit from this type of solutions. “This tool provides great value to transportation companies, to retailers willing to understand customers’ journey in a mall, as well as to public institutions’ alerting purposes and public safety matters,” she said. The hardware-software combination for the solution is rather simple, Choppin said. “All you need is a couple of servers and our software. The solution then connects to any type of source of data, whatever the vendor and format, through a large library of connectors. Its fast data capability using in-memory caching enables to collect, filter and correlate huge data streams without any risk of overflooding,” she said. “When probes are lacking to provide accurate location data, Intersec supplies an exclusive ‘Geosensor’ that retrieves in real time all necessary location data from the core network.”
With safety and security concerns on post-secondary campuses being highlighted in light of world events, adopting the best security system is crucial to keeping students and faculty safe. BY Eifeh Strom, Freelancer
Adop N O I T U CA
here have already been several shootings at US universities in 2018. Events such as these have become an unfortunate reality on post-secondary campuses around the world. This has only highlighted the need for enhanced security measures. The global school and campus security market is forecast to reach nearly US$2.5 billion by the end of 2023, at a CAGR of 19.7 percent during the forecast period 2017 to 2023, according to a report by Market Research Future. North America continues have the largest market share; however, APAC is expected to grow at a fast pace. While video surveillance and access control are obvious components of any
security system, an increase in adoption of both by university campuses globally has been observed. Alone these systems can only do so much; however, in tandem with the latest technologies and integration capabilities, campus security operators are on their way to making campuses safer than ever.
Increased Awareness Driving Security Needs
The primary mission of higher education institutions is to deliver quality education to students; yet, they face the challenge of balancing between a highly secure facility and one that supports open interaction. “Educational institutions face an increasing and constantly evolving risk environment. Recent high-profile incidents emphasize these risks and magnify the vulnerabilities that educational facilities face. This has led to more public demand for improved security solutions across campuses,” said Brandon Reich, Business Leader for Video Surveillance at Pivot3. Jumbi Edulbehram, Regional President of the Americas at Oncam, explained, “Over the last decade, educational facilities all over the world have evolved into what we call ‘soft targets’ for those who wish to do great harm, such as active shooters or vandals. As a result, more robust and comprehensive security
Universities opt Ivy League of Security Amid
rowing Concerns Steve Birkmeier, VP, Sales and Business Development, Arteco
Jumbi Edulbehram, Regional President, Americas, Oncam
James Marcella, Director, Industry Associations, Axis Communications
Thomas Schulz, Marketing and Communications Director, Digital and Access Solutions, ASSA ABLOY EMEA
Terry Schulenburg, Business Development Manager, Education, Genetec
Tech Trends Make Universities Smarter Students nowadays are more tech savvy than ever. As a result, it only seems right that universities are adopting the latest and most advanced in technologies and security. BY Eifeh Strom, Freelancer
Julie Brown, Institutional Market Leader, North American Building Solutions, Johnson Controls
Brandon Reich, Business Leader, Video Surveillance, Pivot3
James Somerville-Smith, EMEA Programs Leader, Security and Fire, Honeywell Home and Building Technologies
hen it comes to adopting new trends and technologies, universities are often up to the challenge; however, budgetary restrictions can get in the way. Nowadays, though, students expect a certain level of tech savvy and convenience from their educational institution. With this in mind, investing in such technologies is all the more worthwhile if it means higher student enrollment. A recent survey conducted by Wakefield Research for Ellucian, a technology solutions and services provider, found that 87-percent of students considered the tech savvy of colleges when picking an institution. This only further highlights the importance of staying up-to-date on current technology trends. From a security standpoint, these trends can often be integrated into security applications. By listening to and adopting popular technology trends, universities can not only keep students happy, but make campuses safer and smarter.
Tech Trends Driving Security
There is no doubt about it, this generation of students expect digital solutions. When it comes to security, this translates into things like smart cards and mobile apps. Mechanical, analog systems are seen as old and even inconvenient: Why use a physical key when one smart card can open your dorm room, be used to buy food and check out books at the library? “The modernization of systems across campuses are resulting in the repurposing of technologies. For example, smart cards, which once might only have been used as an access control solution, can now be used to attain campus services such as the library or dining commons,” said James Marcella, Director of Industry Associations at Axis Communications. Julie Brown, Institutional Market Leader for North American Building Solutions at Johnson Controls, pointed to several trending technologies being adopted by university campuses. “In response to recent tragic active shooter incidents, gunshot detection solutions are being integrated with systems like video and access control to support emergency preparedness response in the event of an active shooter. Drones continue to be an increasing area of technology enabling the ability to provide security to remote areas, provide additional coverage and detect and disarm unauthorized drones.” All of these trends, however, point to the explosion of data generated by surveillance cameras and other security software on a daily basis, said Brandon Reich, Business Leader for Video Surveillance at Pivot3. “Not only are schools collecting massive amounts of information, but the data obtained is more important than ever before. Modern organizations can no longer tolerate video loss, system downtime or the inability to access live or recorded video. Data loss can lead to major liabilities, and therefore more significance is placed on server and storage infrastructure.”
IoT, Big Data and Cloud
The terms IoT, big data and cloud have spread like wildfire over the last few years, and for good reason. “The IoT and big data trends have benefited campus security systems by increasing interconnectivity and interoperability like never before,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. “The more detail and pieces of information available about a certain event, the quicker the resolution, and the ability for devices to connect via the cloud makes the sharing of this relevant data swift and seamless.” Terry Schulenburg, Business Development Manager for Education at Genetec, noted, “IoT will continue to grow over the next 20 years. There are so many applications for college campuses that can provide extra security, and extra freedom.” Schulenburg pointed out how currently many campuses are tracking important equipment and as well as inventory management using IoT technologies. One example is how a specific university hospital delivery research wing is providing matching wristbands to new mothers and their babies. If the bands are separated by too far of a distance, alarms go off, cameras activate and doors quickly lock down, he explained. Despite how widespread IoT is now, James Somerville-Smith, EMEA Programs
Hyperconverged Infrastructure for Surveillance Storage
What is a hyperconverged infrastructure and how can it help with a campus’ surveillance storage? Brandon Reich, Business Leader for Video Surveillance at Pivot3 explains. ” The increase in data generation and the growing importance of video and integrated security solutions has resulted in a technology shift from closed, proprietary systems to more a mission-critical application that is often hosted inside of a data center and managed by an IT department,” Reich explained. “This evolution is important to note because IT departments will often turn to traditional technologies for video and data storage infrastructure.” However, according to Reich, traditional infrastructure, such as standard servers or SAN storage, is not well suited for video surveillance environments and can lead to underperformance. Hyperconverged infrastructure (HCI) is a new entry into the video surveillance storage market. In fact, the HCI market was valued at US$796.1 million in 2015, according to a report by MarketsandMarkets. It is forecast to reach $12.6 billion by 2022, at a CAGR of 43.6 percent during the forecast period 2016 and 2022. The report states: “The ability of hyperconverged infrastructure systems is to unify the server, storage, networking and virtualization resources on a single commodity server rather than deploying over separate
hardware components. This, in turn, reduces the overall or total cost of ownership (TCO) of systems and offers highly scalable solutions, which are some of the key driving factors for the growth of this market.” According to Reich, “HCI solutions can be optimized to meet the unique needs of video surveillance, offering far more functionality to schools than traditional IT infrastructure. As more educational facilities look to adopt advanced technologies, such as panoramic cameras, more traditional IT storage solutions will be challenged by the write-intensive nature of surveillance.” “It eliminates complexity and cost, and brings enterprise-class technology and benefits at a more affordable price point than traditional server-based systems,” he added.
Integration Turns PA Systems Into Campus Security Solutions Public address systems are commonplace on university campuses. As a mature technology, advancements may not be groundbreaking; however, integrating it with other security and safety systems could give it new life. BY Eifeh Strom, Freelancer
n a vast university campus, a public address or announcement (PA) system is used to make campuswide announcements. We don’t often think of the safety or security implications of such a system, but integrated with alarm, video surveillance, access control, etc., a PA system has the potential to be much more; it could give campus security operators the ability to turn it into an integral part of a holistic safety and security solution. PA systems are included as part of the public safety and security market, which Research and Markets expects will grow from US$277 billion in 2017 to $532.4 billion by 2022, at a CAGR of 14 percent during the forecast period. Meanwhile, the average price of PA systems has been on a gradual decline in the last three years, according to research by IBISWorld. This a result of heavy market competition and the falling cost of component parts. Even with prices on a slow and steady decline, IBISWorld notes PA systems still only present a moderate total cost of ownership to end users. Regardless of cost, budgets across verticals are getting tighter, and end users want to maximize their return on investment (ROI). This generally requires systems to go beyond just their intended use. By integrating existing and new PA systems with security and safety systems campus security operators may be able to find the ROI they’re looking for.
PA Systems Going IP
In today’s security world, almost every system, if not all, can be connected to a network. A PA system is no different. “The PA over IP solutions have been improved,” said Bob Mesnik, President of Kintronics. “The latest IP amplifiers provide more power and the intercoms include full duplex sound. The software now supports IP cameras, and voice-over-IP (VoIP) phone interfaces as well as special automation that provides if-then responses to certain inputs.” Despite the increased benefits of a
An effective PA system can help efficiently evacuate a building.
Bob Mesnik, President, Kintronics
PA-over-IP system, cost could be an inhibitor — the cost of an IP system can be higher than some standard central analog systems, Mesnik pointed out. However, the ease of installation could help to balance out any cost concerns. “The IP paging solution is easier to install since the wiring is easier. The amplifiers and intercom units all connect to the network. The lower power models use power over Ethernet (PoE), so are very easy to install. In many cases, the ease of installation and the ability to provide many zones provide benefits that justify the increased cost,” he explained.
Integration With Video Surveillance
In general IP paging and intercom systems are used to direct people in emergencies, control doors and control other situations such as crowd control, according to Mesink. However, integrating such systems with others leaves the door open to new uses and can push a technology to its full potential. For example, integrating a campus’ PA system with security systems such as video surveillance could give campus security operators more control over emergency communication. “Paging can be integrated with IP camera systems. There are paging and intercoms that can be attached directly to IP cameras. This can work if the cameras have audio in and out,” Mesnik explained. “Small amplifiers are used to power speakers that can be used with the cameras.” It is also important that the video management software (VMS) supports the audio. “Some VMS will provide an alert if they detect a button activation from the IP camera. The VMS then allows the security person to see what is happening and then talk to the person near the IP camera,” he explained. Alternatively, paging can operate by itself and assist an IP camera security system. “For example, the Digital Acoustic intercom system is independent of the VMS and
Double Your Door Secu
Multimodal Biom More and more, end-user organizations are deploying multimodal biometrics, which have certain advantages over unimodal solutions. Fingerprint readers alone, for example, can’t read people with broken or wrinkled skin. Multimodal readers combining two biometrics, be they fingerprint and face or fingerprint and finger vein, offer greater flexibility and security, suiting the end user’s access control needs. BY William Pao
ypically, access control entails the use of any of the three authentication factors, namely cards/tokens (what you have), passwords (what you know) and biometrics (what you are). Increasingly, biometrics, or the “what you are” factor, have become more and more common as the user’s identity can’t be lost, stolen or forgotten as compared to the other factors. “The majority of customers still use metal keys or cards or badges to secure their doors. If those same customers haven’t yet experienced a break-in due to misuse or loss of keys/cards, then they’d be hard-pressed to invest in new technology, for example fingerprint and face readers,” said Larry Reed, CEO of ZKAccess. “But for new installations, it becomes a no brainer. Biometrics is far more secure and convenient than keys and cards because you cannot forget, lose or have stolen your
"If the user needs a higher security level they can use multiple modes of identification. The person may scan their fingerprint and face to gain access."
metrics biometric credential.” In the very beginning, unimodal biometrics taking just one biometric from the user, be it finger, face, iris or palm, was common. However, increasingly users have found unimodal biometric technology limiting. In terms of fingerprint, for example, there will always be a certain percentage of people whose fingerprint can’t be read. Face readers, meanwhile, normally don’t perform that well when installed outdoors or exposed to bright sunlight. Adding a second biometric thus becomes a viable option. In fact, the growth potential of multimodal biometrics is not to be ignored. In a report, the research institute Technavio forecast that globally, multimodal biometric solutions would grow at a compound annual growth rate of 15 percent between 2016 and 2020.
Advantages of Multimodal Biometrics
There are various benefits of multimodal biometrics. One is enhanced security at the end-user organization, who can authenticate staff/people via two biometrics instead of one. “The benefit is that they provide
multiple authentication. If the organization requires a higher security level they can use multiple modes of identification,” said Bob Mesnik, President of Kintronics. “For example, the person may scan their fingerprint and face to gain access.” “The fusion of complementary biometric modalities yields higher match performance; that is, fewer false match, false non-match and failureto-enroll rates,” said David Benini, VP of Marketing and Product at Aware. “Conditions may exist where a particular modality cannot be satisfactorily captured, or where a user prefers one over the other. In this case, only one modality is chosen over the other, but this also in a way improves performance and security because capture of poor data and failure-to-enroll is reduced.” “Having multimodel hybrid biometrics improves security, since customers can ‘layer’ the security by using multifactor authentication. For instance, you can implement two-factor authentication which forces users to present a valid fingerprint plus face prior to the device granting them door access,” said Reed. “Some of our hybrid-biometric models have up to four biometric sensors, a card reader and a keypad. The possibilities for security and convenience become endless when considering the use of multimodal biometric technology.” In fact, according to the aforementioned Technavio report, during 2015, North America dominated the multimodal biometrics market and accounted for close to 39 percent of the market share in terms of revenue primarily due to security issues. “The
IoT â€” Hospitality
The hospitality industry is getting more competitive than ever. Against this backdrop, hotels are seeking to differentiate themselves by offering cutting-edge service to guests. With the arrival of IoT, hotel operators are now able to use connected devices and the data they generate to maximize the guest experience, at the same time achieving further operational efficiency and energy savings.
Making Hotels More Hospitable With TEMPERATURE
BY William Pao
lobally, hospitality is a booming industry on the back of increased business and leisure travelers. And hoteliers have reasons to be optimistic, as the uptick in tourist arrivals is expected to continue. The World Tourism Organization under the United Nations forecast that international tourist arrivals would reach 1.8 billion by 2030 and grow at a steady rate of 3.3 percent every year between 2010 and 2030, translating into an average 43 million additional international tourists joining the tourism marketplace annually. However, while this growth is good news for hoteliers, the industry is seeing increased competition, given more and more new hotels are being built. Travelport Hotelzon, a hotel solutions provider, wrote in a 2017 blog post that Berlin was expected to add about 3,700 hotel rooms within the next two years, and London was set to open 8,000 new rooms by the end of 2017 alone. Budapest, meanwhile, has quickly become a hotspot with an additional 2,600 rooms to open across 2017 and 2018, the post said. In the midst of this trend, retaining old
Steve Dunn, CEO and Founder, LEAPIN Digital Keys
Jack He, VP, HDL Automation
customers and attracting new ones has become more important than ever for hotel operators who seek to sustain growth and ensure profits. To that end, operators are turning to IoT and big data for help. “IoT in hospitality has been steadily growing, where it’s becoming available outside of traditional luxury deployments,” said Bill Lally, President of Mode:Green. “Hotels have been using technology to accomplish a specific goal, such as sustainability, but are now incorporating technology as an addition to their branding to differentiate themselves.” “New, digital customer values are being driven by millennials. They want authenticity, personalization, co-creation, social and emotional connection, seamlessness, convenience, control, speed and precision. In this regard, data is king,” said Shovan Sengupta, VP of Hotel Segment at Schneider Electric. “Data around guest interests and patterns informs service design, drives potential partner relationships and becomes the primary asset of hotel chains.” In fact, IoT deployment in hotels is in keeping with the smart home trend, as
GD PR Impacts Global Security Supply Chain
With the GDPR looming, privacy and data protection have become even more of a hot topic in the physical security sector. The entire supply chain has to abandon its silo-based approach and collaborate more closely with each other. While system providers and integrators are working to make their products and solutions GDPR-compliant, end users also need to raise their awareness of and take action to ensure data security, since they are the ones who shoulder the majority of the burden of protecting individual privacy. BY Sophie Wu
he EU General Data Protection Regulation (GDPR), which goes into effect on May 25 of this year, introduces a series of requirements all organizations that control or process personal data related to EU citizens must comply with, regardless of where the organization is headquartered. The regulation, intended to improve personal data security and increase accountability for data breaches, brings with it fines for non-compliance of up to four percent of annual turnover or 20 million euros (US$24.5 million), whichever is greater. As defined by the GDPR, “personal data” means any information relating to an identifiable natural person (“data
subject”), including name, location, photo, biometric data, financial as well as medical details and online identifiers such as IP address or device ID, etc. Under the regulation, “data controllers” — organizations that collect personal data for their own use and “data processors” — organizations that process data on behalf of data controllers, such as cloud service providers, bear the responsibility to handle personal data in a secure manner, especially in the areas of management, encryption and pseudonymization. To this end, the GDPR increases liabilities of data processors while making data controllers responsible
for the protection of individuals’ rights and the actions of the processors they engage. Processors and controllers need to know not only what personal information exists within their organizations, but also where and how it is being accessed and used. The GDPR also requires data controllers to report breaches within 72 hours of their discovery, keep records of data processing activities, appoint data protection officers, and conform to individuals’ rights to be forgotten.
End Users Not Ready
Even though the rights of individuals with regard to their personal data are fundamental to the GDPR, consumers
Genetec Offers GDPR-Compliant Solutions
Genetec said that it can guide organizations toward GDPR compliance with both its on-premises and software-as-a-service (SaaS) solutions.
According to a Genetec blog post, Security Center, its unified security platform with connectivity to the cloud, blends IP security systems within a single interface to combine access control, video surveillance and automatic license plate recognition to communications, intrusion detection and analytics. Within Security Center, the KiwiVision Privacy Protector real-time video anonymization module has been re-certified with the European Privacy Seal (EuroPriSe), which certifies that IT products and IT-based services are GDPR-ready. “KiwiVision Privacy Protector allows for originally plain video to be cryptographically encrypted and recorded in the background and then later decrypted by authorized personnel. Data controllers can apply Privacy Protector to only those cameras that are involved in high-risk processing and can choose the ideal level of anonymization for every situation. With only a few clicks, they can either pixelate, blur or completely obscure individuals and objects in a camera’s field of view,” stated the Genetec white paper titled “What the GDPR means for video surveillance.”
do not necessarily take adequate steps to secure themselves. Instead, 62 percent believe businesses holding their data are responsible for its security, according to a Gemalto survey. Especially with the implementation of the GDPR, organizations are now forced to comply with data security protocols, otherwise they will face not only financial consequences but also legal action from consumers. However, research firm Gartner estimates over 50 percent of companies affected by the GDPR will fail to be in full compliance with its requirements by the end of 2018. An Imperva survey of cybersecurity professionals shows similar results, in which half of the respondents said that no one was pushing GDPR preparations within their organizations. According to a Gemalto and Ponemon Institute study on cloud security, a vast majority of global companies (95 percent) have adopted cloud services for data storage. While 53 percent
of respondents said their organizations use multi-factor authentication to secure data access, only 36 percent said their organization encrypts or tokenizes sensitive data in the cloud. Half of global respondents believe that payment information and customer data are at risk when stored in the cloud. Furthermore, 57 percent think using cloud services run the risk of violating privacy laws.
Implications for Video Surveillance
Of all the types of personal data covered by the GDPR, data gathered by video surveillance applications might be among the most sensitive, given its intrusive nature. According to a white paper released by Genetec, privacy, under the GDPR, must be by design, instead of an in addition. “The privacy by design obligation in the GDPR requires an approach to systems engineering in which data protection principles, such as encryption and the
anonymization of video footage, for example, are included from the outset in any system design,” the report stated. It continued: “In addition, data controllers will also be responsible for ensuring that, by default, the minimum amount of data is collected. Video surveillance systems that record constantly and store images indefinitely will be in breach of this provision; as a result, data controllers will need to adopt video surveillance systems with a feature-rich interface that offers flexibility in video recording operations that would enable them to control how long images are retained.” Stanley Convergent Security Solutions, from the perspective of a systems integrator, suggested in its white paper that data controllers remain educated and aware of the ever-changing cyberthreats to their video data and implement a prevention and response program. Data controllers, according to the paper, should ask their security integrators to conduct
Security Technology Trends: A Look Back and Forward Trends don’t start and stop simply as one year ends and a new one starts, and many if not all of the topics in 2017 will still have an impact in 2018. But no doubt new trends and issues will emerge in 2018, from edge computing to virtual assistants to blockchain’s application beyond cryptocurrency. And, of course, the data privacy implications as GDPR comes into effect will be something all organizations will need to deal with. BY Johan Paulsson, CTO, Axis Communications
Trends That Defined the Industry in 2017
As 2018 begins, we look forward to what the year might hold for the security sector. But while looking forward is obviously important in planning for success, it’s also worthwhile to look back at the past year and see which trends emerged that we either anticipated, or appeared unforeseen.
Cybersecurity, the Perennial Issue
In many ways, we can’t really call cybersecurity a trend: it’s now a constant concern for security professionals. Cybercriminals are ever more sophisticated and well-resourced, and tirelessly look to exploit vulnerabilities in technology across all industry sectors. The proliferation of devices connected to the network — the now familiar Internet of Things (IoT) — means that billions of new network access points have been created, each of which, to the cybercriminal, represents an opportunity. Throughout the year, we have highlighted many cybersecurity issues and the ways that businesses can defend themselves against threats, and as we move into 2018, all organizations will need to be vigilant and have ongoing processes in place to ensure the highest levels of cybersecurity.
The Re-Birth of Video Analytics
We saw increased use and sophistication of video analytics during 2017. Video surveillance has previously been purely focused on security-driven applications, but today the analysis of visual data from modern network cameras supports a wide range of functions. Whether used in retail for store optimization and enhancement of the customer experience, in planning smart cities, as a drive toward more sustainable business, or even protecting endangered rhinos in South Africa, the greater ability to analyze the feed of data from network cameras will affect all sectors in the future.
In addition, using new, non-visual sensors, the view will become multidimensional, providing a richness of data — with the appropriate analytics — that will enable for more rapid and accurate assessment of situations and, therefore, faster escalation, the activation of an appropriate response and the minimization of false alarms.
Smart City Growth
The recent Smart City Expo World Congress, held in Barcelona, was a clear indication of the growing interest in using connected devices and data to improve and enhance the quality of life, safety and security in urban environments. Overall attendance at the event increased significantly and the breadth of organizational functions represented was striking. And while there still seems to be an inconsistent understanding of how to define a smart city, the number of actual cities exhibiting to showcase their smart city credentials shows that the effective use of connected devices and the data they create is becoming an important part of a city’s global reputation and marketing. However, it still seems that many functions within cities are acting in separate silos: it is only when data is shared seamlessly across all departments and functions that the true value and benefits to citizens will be realized.
Security as a Service
Over the last year, we have seen an increased momentum toward security as a service, with remote hosting and monitoring of video transmitted from a customer’s premises, and the solution managed by a sector-specific specialist. Such models remove a significant management burden, not only freeing up resource, but resulting in an improved level of service, better device management and strengthened cybersecurity. But even if we have seen uptake in the market in 2017, the real growth is yet to come.
A Move Toward Solutions, Not Product
The growth in analytics — and the added insight and value this delivers to organizations in specific sectors — is closely related to another of the trends we predicted at the end of 2016: a move toward integrated solutions rather than specific products. The retail sector is a great example, where we now talk to customers about solutions for store optimization (including specific elements like queue management) and loss prevention rather than specific products. It’s something we’re seeing across all sectors — from education to banking — a desire to solve key business issues and enhance operations, rather than buy a selection of hardware and, in doing so, improving the system reliability, performance and total cost of ownership (TCO).
The Potential for Deep Learning
In all sectors, one of the hot technology topics in 2017 has been artificial intelligence (AI) and machine learning. A related area where we saw some initial exploration of in the security sector, and which shows enormous potential, is deep learning. Currently related to the growth in analytics, and the vast amounts of additional data that this is creating. At a relatively basic level, deep learning applications will improve video motion detection, facial recognition, individual tracking and suppression of false alarms. It will aid system design, configuration, optimization and device management. Beyond this, as applications develop, there is significant opportunity for predictive analytics leading to incident prevention: from terrorist incidents to slip and fall accidents; from traffic issues to shoplifting. It is still early days, however. Development is currently fast and unpredictable, and the demands on processing power are massive, but the potential for deep learning, which may ultimately lead to autonomous systems, is huge.
6 Technology Trends That Will Dominate 2018 As existing technologies reach maturity, unforeseen developments arrive ever more quickly, and innovations make the leap from consumer applications to business (and vice versa). It’s imperative that we constantly seek to find those that have the potential to add value to our own business and those of our customers. I’ve been working with my colleagues to identify some trends that we think will have an impact on our business and industry.
A Move Toward the Edge
Two trends of recent years that have become familiar — cloud computing
and the Internet of Things — have delivered undeniable benefits to businesses and consumers alike. But they also come with implications: namely the huge increase in the amount of data being transferred from connected devices to the data center
Koreans Strive for Excellence
It has been quite obvious in the market that Korean companies are preparing for their next big move toward some new applications for video surveillance technologies. In this issue, we talked to some Korean companies ready to provide systems for fleet management and in-vehicle security and safety. Some are getting some positive results in home security and smart home systems, and from integration of IoT devices. The following corporate stories provide valuable examples of how Korean security companies fight for their survival and sustainability in the market. BY Jill Lai
AUTOIT Seeks New Partners for Fleet Management Founded in 2014, AUTOIT focuses on mobile security systems for automobiles and smart factory solutions.
Kevin Kong, Deputy GM, Sales Team, AUTOIT
UTOIT is a professional company that develops mobile security systems for buses, taxis and heavy duty vehicles. The company provides a complete system for fleet management, both hardware and software; for the latter they have automobile central monitoring software (ACMS) for tracking services. Its ACMS can control real-time vehicle location and monitor live video streaming by using Google Maps and GPS. Its mobile security systems include digital video recorders (DVR), safety systems, multi-view cameras, monitors and around view monitoring systems (AVM), as well as driving assistance and www.asmag.com
VISION HITECH Looks for Niche Markets Based on its video surveillance expertise, VISION HITECH prepares for its next move in niche markets.
ISION HITECH is a professional security equipment provider, with a long-term reputation in providing high quality security systems, ranging from IP cameras, HD analog cameras, NVRs/DVRs and software. With an R&D center, and manufacturing, production and assembly lines, VISION HITECH has an efficient manufacturing system, which can flexibly tailor products to customers’ specific requirements. Hee-Jun Lee, Director of the Overseas Sales Department at VISION HITECH said, “That is why the company focuses on providing security equipment to some major clients, such as major telecoms and Hee-Jun Lee, Director, patrol monitoring Overseas Sales Department, VISION HITECH companies.” In terms of the product differentiation, Lee said the founder of VISION HITECH is one of the first two pioneers who introduced CCD technologies to Korea. With this strong technical background, the company is proud of its video tuning and video processing capability in manufacturing CCD and CMOS video imaging equipment. The company admitted that competition with Chinese companies is quite fierce. However, it is well prepared and has started to focus more on new and niche markets that need video surveillance equipment.
Alex Shin, Overseas Sales Team Manager, Innodep
Innodep IoT-Based VMS Ensures Full Integration
Depending on its VMS expertise in physical security, Innodep continues to explore new opportunities in IoT.
nnodep is one of the very few video management software (VMS) companies, based in Asia for physical security. Present in the market for 10 years, Innodep has provided hardware, software and installation and integration services for mainly the Korean government sector, working on such projects as city surveillance, public buildings and transportation. In recent years, the company has leveraged its experience in Korea to other Asian countries, by providing a diverse product portfolio that covers NVRs, matrixes, VMS, cloud solutions to intelligent software, such as license plate recognition and face recognition. Alex Shin, Overseas Sales Team Manager for Innodep, said, “In order to expand the overseas markets, we now provide the appliance, especially for the Dell OEM appliance, with preloaded VMS and we also adopt the Microsoft Azure Cloud software to develop our cloud solution, for clients.” What makes the company really stand out is not only its products, but its integration service. Shin highlighted, “We support our clients to ensure the full integration of the VMS with other systems. Now we have grown well in Malaysia, Thailand, Vietnam and then China.” Shin provided an example of a smart factory project in China, and said, “Our Korean partners there required a remote control system for the manufacturing machines. Then, we added cameras with our VMS system to it, to become a remote monitoring and control system for factories.” For city surveillance, Shin said, “In Korea, one of our safety systems designed for taxis, police cars, cash-in-transit, clients provided a dashboard system and integrated other transit buses, trucks and fleet and school buses. information together for city monitoring. So in the video Kevin Kong, Deputy GM of the Sales Team at AUTOIT surveillance side, we provided our video data to integrate said, “Currently, we have our major customers, like truck with the dashboard system. Besides video, they also companies, in Australia. We are also working with some big captured other information and displayed the smart city telecom companies and for government projects in Korea and dashboard together.” other countries, such as Malaysia, Vietnam and Indonesia. Finally, the company also mentioned it tries to grow Next, we are looking for some major customers in the U.S.” more business with integrating other connected systems With its recent developments in ACMS and AVM systems in the IoT ecosystems, such as controlling the cameras on for vehicles, AUTOIT hopes to grow substantially in this streetlights. Via partnering with more companies, Innodep niche market. expects to become an IoT-based VMS provider.
Google Home and Amazon Echo offer very similar use experience when it comes to home control. But Google’s edge lies in its more advanced language capability and AI in the cloud. The Google Home ecosystem is taking shape, and this may lead to greater smart home adoption in the next couple of years.
Google Home Gains Popularity and on Its Way to Dominate Smart Home Space
BY a&s SMAhome
oogle, Amazon and Apple are the biggest names in the still-developing smart home industry. The former two have launched speakers that can interpret human voice to turn on or off lights, thermostats, cameras and various smart devices at home. Amazon appears to lead the way with its Alexa smart platform, which currently dominates the market by dictating compatibility from the greatest number of home appliances on the market. The e-commerce giant has also introduced the most number of voicerecognition devices, namely the Echo series, to enable even more home control possibilities. It does not necessarily mean Amazon will rule the market ever after. Google offers almost exactly the same services. The Google Assistant platform is also a popular integration choice for smart home product makers. The Google Home speakers have very similar functions to Amazon Echo. They are both great choices to control home devices with voice command. Google Home and Amazon Echo offer very similar use experience when it
R n obert Thompson, Chief Enablement Architect, i.MX Applications Processors, NXP Semiconductors
“ When it comes to voice assistant, people want things that they are familiar with, that are compatible with their smartphones. And this may give Google Assistant an edge.”
Tom Leonard, VP, n Marketing and Product Management, Energy Management Controls and Automation Division, Leviton
“ While Amazon may own a lot of the space today, Google has major potential with its wealth of data and processing power.”
comes to home control. Device makers essentially go through the same process when making Google Assistant or Alexa compatible products. The needed software and hardware components are very much alike. Google, however, has an edge over Amazon. That is, the great number of Android system users. There are two billion active users of Android phones. Consumers might be more likely to purchase Google Assistant devices because they are already used to it compared with Alexa, according to Robert Thompson, Chief Enablement Architect for i.MX Applications Processors at NXP Semiconductors. For example, when consumers see a voiceenabled coffeemaker, they’ll choose the one that works with Google. “When it comes to voice assistant, people want things that they are familiar with, that are compatible with their smartphones,” Thompson said.
AdvAnced LAnguAge cApAbiLity Google is also many steps ahead in its language ability. While Alexa currently supports only English and German,
Google has a much larger language knowledge because Android is available in 80 languages. “As of today, Google Home is deployed in more languages than Amazon and it is possible to use the Google Assistant from a smartphone,” said Jérôme Leroy, VP Sales & Marketing at smart lighting manufacturer WiZ. Some companies have also pointed out that Google provides a more intuitive, more natural language exchange experience. “Google Home allows users to naturally ask for switching on or off the light. To dim at the right level of intensity,” Leroy added.
Ai in the cLoud In addition to its natural language ability, Google may also excel at cloud intelligence. Providing services and collecting data in many countries across the world, Google has accumulated vast amounts of data that can help it carry out analytics. The AI could be proven very useful in smart home applications. When a user talks to Google Home, the command will be sent to Google’s cloud, where the voice command is processed before the signal is passed to a home device.
“Really all the intelligence, such as asking a question or weather, goes on in the cloud, not the end devices,” NXP’s Thompson pointed out when asked to compare Alexa and Google Assistant from a home control perspective. Smart lighting solution company Leviton Manufacturing concurred. “While Amazon may own a lot of the space today, Google has major potential with its wealth of data and processing power,” said Tom Leonard, VP of
GK Lee, VP, mIoT n Strategic Business Unit, D-Link
“ Now without the (Google Home) integration you can’t seem to sell your products in Best Buy or Walmart. It wasn’t like this three or four years ago. And this helps the (smart home) ecosystem to take shape.”
Marketing and Product Management for Leviton’s Energy Management Controls and Automation Division. Google’s AI has drawn some attention in the industry. Startup company Lynky is making a Google Assistant-powered touchscreen speaker that looks similar to Amazon’s Echo Show. “We believe Google will lend its AI experience to help solve some vexing smart home challenges such as setup, automation creation, etc.,” said Lynky’s Product
CD Liu, PM Director, n Good Way Technology
“ Google Assistant access data from the cloud, and as such, may have latency, Internet stability and security issues. Intruders may break in to control home devices without authorization.”
asmag.com PRODUCT FOCUS To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact firstname.lastname@example.org
Conekt Mobile Credential Reader
MV-PD-030001-03 Portable Under Vehicle Inspection System
Hikvision Digital Technology/China Key Features • Plug and play • Customized software, supports ALPR • All-in-one, highly integrated • 2,048 x 12,000 maximum resolution • Vehicle speed matching • Illumination optimized for vehicle undercarriage Email: email@example.com
Farpointe Data/U.S. Key Features • Multiple Conekt credentials can fit into a single smartphone wallet app • Installer adjustable read ranges can be excess of 15 feet • Compliant to Certified Common Criteria EAS5+ Computer Interface Standard • Increased hardware cybersecurity to resist skimming • Interface easily with control panels or other security management systems Email: firstname.lastname@example.org
Johnson Controls/U.S. Key Features • Embedded with Metasys, Johnson Control’s smart building automation system technology • Simplified architecture, with all key functions for facility control programmed in central workstation • Open standard BACnet protocol compatible with MODBUS equipment • All new graphic user interface • Web-based user interface Email: email@example.com
Quasar 4x2K Panoramic Security Camera
FLIR Systems/Australia Key Features • Features four, full high-definition BSI visible sensors • Seamless integrated with FLIR’s United VMS and a wide range of thirdparty VMS options • Field convertible 180/360degree field of view • True day/night camera with built-in infrared illumination and shutter WDR • Outdoor ready, vandal resistant Email: firstname.lastname@example.org
PTZ1A225UIRA-N Starlight IR Network Positioning System
AV20585PM SurroundVideo G5 Series Panoramic Camera
Climatix C600 HVAC controllers Siemens Building Technology/Germany Key Features • Faster processor and more memory space for complex applications • Efficient refrigeration control with inbuilt electronic expansion valves drivers • Designed for complex applications comprising up to 8,000 objects • Easy cloud connection for digitalized services • Configurable on-board inputs and outputs Email: email@example.com
Tamron/Japan Key Features • Support of generic interfaces — fast integration • At a low cost, suitable for price-sensitive applications • Contactless temperature monitoring of humans or equipment • No shutter noise • Uninterrupted video Email: firstname.lastname@example.org
Vicon Industries/U.S. Key Features • Day/night and IR illumination • 2 MP (TVI/AHD) and 700 TV lines (CVBS) • Digital noise reduction (DNR) • On-screen menus with innovative control make setup and operation easy • Wall or ceiling mounting • IP66 and IK10 rated Email: email@example.com
Arecont Vision/U.S. Key Features • 20 MP • 180 degree panoramic view • Remote focus • True day/ night • Indoor/outdoor, IP66 rates • IK-10 impact resistant Email: firstname.lastname@example.org
Shutterless Thermal Camera
Dahua Technology/China Key Features • 1/2.8” 2 MP STARVIS CMOS • Powerful 25x optical zoom • Starlight technology • H.265 Encoding • Max 50/60 fps at 1080p • Auto-tracking and IVS Email: email@example.com
Global Bridge/Korea Key Features • Minimized signal interference by patented CDMA technology • Perfect for UHD 4K and FHD 1080p real-time video data transmission • Low power consumption • Max 10 km wireless video data transmission • Quick reconnection with the reset button Email: firstname.lastname@example.org
V672V-W312MIR Vandal Dome Camera
D-TECT Pet Immune Outdoor Detector
GJD Manufacturing/U.K. Key Features • Pet tolerant for animals up to 30 kg • Selectable range up to 15 m • Covert sensor module • Anti-masking technology • Dual PIR and microwave technology • Durable weather-proof, aesthetically pleasing design Email: email@example.com
SKYBRIDGE CDMA Wireless SR-100 Wireless Router
CNFE3TX2CXMS Series 4G LTE Cellular VPN Gateway ComNet/U.S. Key Features • Supports 802.1X authentication • HTTPS support for secure management • 4G LTE modem built in • OpenVPN • 1KV isolation for PoE PD port • Cellular antennas included Email: firstname.lastname@example.org
Show Calendar PULSESTAR PSTR-i72-HV Infra-Red Illuminator Raytec/U.K. Key Features • High intensity – up to 660W lighting drive power • Easily link lighting pulse with camera shutter (TTL – 3.3-24V DC) • Platinum Elite twin-core SMT LEDs • Universal 100-230V AC PSU included (24V DC optional) • VARIO interchangeable lens system • Extreme long life and low maintenance Email: Sales@rayteccctv.com
M5054 PTZ Network Camera Axis Communications/Sweden Key Features • HDTV 720p/1 MP • 5x optical zoom with autofocus and WDR • Axis video motion detection 4 • Audio volume detection • Scream detection • Removed object detection Email: email@example.com
WISE Surveillance Solution With Line Notification
ICP Das/Taiwan Key Features • One controller integrates with IP camera and I/O module • Records critical video and image to save storage • Two-way interaction between I/O and video • Seamlessly integrates with SCADA • One stop shopping/ service (controller/I/O module/IP camera/SCADA) Email: firstname.lastname@example.org
In-Vehicle Mini-PICe CANBus Module
Apacer Technology/Taiwan Key Features • Support 2-channel Individual protocols from RAW CAN 2.0 a/ b, OBDII, J1939, FMS interfaces, 1-Channel J1708 interface • CAN OPEN CIA 301/302/401/402 with full isolation for industrial automation, medical equipment applications • Integrated: gyroscope, 3D accelerometer, 3D magnetometer • Optional GNSS GPS board dead reckoning for continuous navigation during signal interruptions • Operation temperature -40 °C to +85 °C • SDK for quick systems integration Email: email@example.com
FR33C2 Day and Night 12MP 360° Panorama Dome IR IP Camera
Merit LILIN/Taiwan Key Features • Full HD 12.0 megapixel CMOS image sensor • H.264 and Motion JPEG multi-profile video streaming • Support 360-degree field of imaging and an ROI video streaming output simultaneously • 360-degree entire scene from one camera and no mechanical PTZ (pan, tilt, zoom) motor needed • Up to 4 independent distortion-corrected view angles can be specified (dewarping) Email: firstname.lastname@example.org
LK-119 Wireless Autodialer
City Wall Enterprise/Taiwan Key Features • Easy to use: Simply press the remote and the call help dialer can make up to 8 calls to landlines or cellphones • Good for home care, emergency, robbery prevention and retailcounter safety • Easy installation • Manufactured in Taiwan with worldwide patent Email:email@example.com
WORLD SECURITY EXHIBITION DIRECTORY
Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_ events.aspx.
INTEGRATED SYSTEMS EUROPE • Date: 2018/02/06—02/09 • Venue: RAI Amsterdam, The Netherlands • Tel: +31-20-240-2424 • Email: firstname.lastname@example.org • URL: www.iseurope.org
INTERNATIONAL HARDWARE FAIR COLOGNE
• Date: 2018/03/04—03/07 • Venue: Koelnmesse, Cologne, Germany • Tel: +49-221-821-0 • Email: email@example.com • URL: www.eisenwarenmesse.com
ISC WEST • Date: 2018/04/11—04/13 • Venue: Sands Expo Center, Las Vegas, U.S. • Tel: +1-203-840-5602 • Email: firstname.lastname@example.org • URL: www.iscwest.com
SECUTECH INTERNATIONAL • Date: 2018/04/25—04/27 • Venue: Nangang Exhibition Hall, Taipei, Taiwan • Tel: +886-2-8729-1017 • Email: Kirstin.Wu@newera. messefrankfurt.com • URL: www.secutech.com
INTERNET OF THINGS WORLD
• Date: 2018/03/14—03/16 • Venue: Hall 4-5, KINTEX, Seoul, South Korea • Tel: +82-2-6715-5406 • Email: email@example.com • URL: seconexpo.com/2018/eng/ main.asp
• Date: 2018/05/14—05/17 • Venue: Santa Clara Convention Center, Santa Clara, CA, U.S. • Tel: +1-646-616-7610 • Email: desiree.mitcham@knect365. com • URL: tmt.knect365.com/iot-world
LIGHT + BUILDING
• Date: 2018/03/18—03/23 • Venue: Messe Frankfurt, Frankfurt Am Main, Germany • Tel: +49-69-75-75-0 • Email: firstname.lastname@example.org • URL: www.light-building.com
INTERTRAFFIC AMSTERDAM • Date: 2018/03/20—03/23 • Venue: RAI Amsterdam, The Netherlands • Tel: +31 (0) 20-549-12-12 • Email: email@example.com • URL: www.intertraffic.com/ amsterdam
• Date: 2018/04/05—04/07 • Venue: Bombay Exhibition Centre, Mumbai, India • Tel: +886-2-8729-1099 Ext. 531 • Email: israel.gogol@newera. messefrankfurt.com • URL: www.secutechindia.co.in
• Date: 2018/05/30—06/01 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-03-2176-8788 • Email: Syamsul.Razak@ubm.com • URL: www.ifsec.events/philippines
• Date: 2018/06/19—06/21 • Venue: Excel, London, U.K. • Tel: +44 (0) 20-7921-5000 • Email: ifseccustomerservice@ubm. com • URL: www.ifsec.events/international
COMMUNICASIA • Date: 2018/06/26—06/28 • Venue: Marina Bay Sands, Singapore • Tel: +65-6233-6688 • Email: firstname.lastname@example.org • URL: www.communicasia.com
Companies Advertiser Index in This Issue *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
PRODUCTS OF THE MONTH • Arlo • Bosch Smart Home • Logitech • Nest • Netatmo • remo+ • Ring
• Axis Communications
13 CYG WAYON
TECHNOLOGY INSIDE DAHUA CO., LTD. FRONT COVER, 1
FRAN OPTICS 39 FUJIAN CO., LTD.
BACK HIKVISION DIGITAL COVER TECHNOLOGY CO., LTD.
5 IDIS CO., LTD.
3 TECHPOINT INC.
PRODUCT EXPLORATION • Aware • Kintronics • TimeTec Computing • ZKAccess
IoT — HOSPITALITY • Control4 • HDL Automation • LEAPIN Digital Keys • Mode:Green • Schneider Electric
INSIDE TAMRON CO., LTD. BACK COVER
• Axis Communications • Genetec • Mobotix • Thales
• Arteco • ASSA ABLOY EMEA • Axis Communications • Genetec • Honeywell Home and Building Technologies • Johnson Controls • Kintronics • Oncam • Pivot3
Access Control Page No.
35 GIGA-TMS INC.
RFID MODULE / LOCK TAIWAN / READER
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
• AUTOIT • GES • Innodep • Truen • VISION HITECH • Wonwoo Engineering
Next Issue 62
Vertical Solution | Office Buildings Special Feature | Deep Learning Product Review | AI Cameras With Facial Recognition
Universities Adopt Ivy League of Security Amid Growing Concerns