a&d Middle East No.6

Page 1

www.asmideast.com

Interview Georges Tannous Genetec

November/December 2023

Feature Story Cyber Security Behind the Front Lines

Bridging Security and Progress Drives

Saudi Arabia’s Vision 2030

6


THINKING OUTSIDE “THE BOX” 2

www.techman-solutions.com www.asmideast.com


Connected access for smarter working Incedo™ Cloud. Flexible, convenient, simple.

Download the Solution Guide:

www.asmideast.com

3


6

Issue

32

Cyber Security Behind the Front Lines

With the transition to the digital era, cyber security has found itself on the digital front lines, the borders of which are today stretched along satellite networks, swarms of drones, and even surveillance camera installations COLUMN

MARKETS

EVENTS

14 HE. Khalifa Ibrahim Al Saleis, CEO, SIRA Threat and Risk Landscapes Are Evolving

22 Security 50 A security industry reshuffling in the cards?

50 Intersec Saudi Arabia Incredible Growth of Intersec Saudi Arabia Marks Successful Return to Live Events

INTERVIEW

PRODUCTS & SYSTEMS

16 Georges Tannous, Area Vice President of Sales in the UK, Ireland, Middle East and Africa, Genetec

44 R iello Elettronica Group AVS Electronics Unveils ULTRA: The Pinnacle of Integrated Security Solutions

52 20 Years of ISE ISE 2024 Highlights Key Technologies for Building Automation and Security Solutions

38 Intersec Insights Ayad (Ed) Sleiman: Balancing Security, Regulation and Innovation Will Enhance Cyber Resilience in the Middle East

4

www.asmideast.com

46 M onitoreal Secure Guard App: A Comprehensive Surveillance Solution on the Go 48 A SSA ABLOY A CLIQ Go Key System Simplifies Access Control For Small Businesses

54 Intersec Dubai 2024 25-Year Milestone Edition With A Record Number Of Exhibitors 56 Adria Security Summit 2023 Soaring on Dragon’s Wings to Success


10,000 Faces on the Edge FD9387-FR-v2 Key Features 1. 10,000 Faces + 99 % Accuracy 10,000 faces profile with build-in SD Card 2. Mask/ Age/ Gender: OK to Recognize Support recognition with mask, gender and age estimation 3. Fully Integrated Trigger DO Alarm and Optical Setting 4. NDAA Compliant: Hardware and Software

Camera to Camera Synchronize

Learning Mode

Maximum 5 cameras

Automatic enroll stranger for repeat visitor database

Facial Recognition Source

Receiver 1

Receiver 2

Receiver 3

Receiver 4

Suitable Applications

Recurring shoplifting recognition

Enroll VIP customers

For enquiry, please contact: Hasan Kiran - hasan.kiran@vivotek.com

www.asmideast.com

5


EDITOR‘S WORD

Professional media for complete security solutions Management Mahir Hodžić, General Manager mahir.hodzic@asmideast.com Adis Hodžić, CEO adis.hodzic@asmideast.com

Managing Middle East’s Security through a Broader Lens Welcome to the sixth edition of a&s Middle East, a magazine that traverses the frontiers of the security industry, delving into its transformative innovations and in-

Editorial Staff Mahir Hodžić, Editor-in-Chief mahir.hodzic@asmideast.com

trinsic challenges within the Middle East. This issue is a treasure trove of exclusive

Orhan Hadžagić, Associate Editor orhan.hadzagic@asmideast.com

layers of the security domain in the ME and beyond.

Emily Lin, Contributing Editor Emily.Lin@taiwan.messefrankfurt.com

Our journey begins with an exclusive tête-à-tête with Georges Tannous, the Area

Mirza Bahić, Journalist editorial@asmideast.com Nermin Kabahija, Journalist editorial@asmideast.com

interviews, insightful analyses, and thought-provoking narratives that peel back the

Vice President of Sales in the UK, Ireland, Middle East, and Africa at Genetec. Tannous unveils the pivotal role of cutting-edge security solutions in propelling Saudi Arabia’s Vision 2030 and sheds light on Genetec’s technologies fueling the

Art Staff Sanel Palislamović, Art&Design Editor sanel.palislamovic@asmideast.com

emergence of future-centric Smart Cities.

Nelmedin Kolubara, DTP&Art Design dino.kolubara@asmideast.com

stalwart in the IT industry with over 38 years of expertise. As the former Head of

Sales Amar Pap, Business Development Manager amar.pap@asmideast.com

Information Security at King Abdullah University of Science and Technology (KA-

International Sales Israel Gogol, International Sales Director Israel.Gogol@taiwan.messefrankfurt.com International Associates Qatar – Mirsad Selimović, mirsad@techman.qa a&s Middle East offers the latest news and insights on video surveillance, access control, intrusion detection, fire alarm, mechanical protection, man guarding, cyber security, artificial intelligence, IoT, big data, smart homes and buildings, industrial automation, information, communication technology to Middle East region professional channel players. a&s Middle East is part of the media network of the Messe Frankfurt Ltd – Taiwan Branch, which offers several media platforms — asmag.com and a&s magazines, published in English, traditional Chinese, and three other languages, providing the most comprehensive industry trends, product, and supply chain information. The total annual circulation is approximately 515,000 copies around the globe. a&s Middle East is published 6 times a year, Jan/Feb, March/ April, May/June, July/August, Sept/Oct, and Nov/Dec. Payment Instructions Annual subscriptions are payable in USD, EUR, or AED. Subscription inquiries per your request. EUR: AE340400000653005131002 Account No. 0653005131002 USD: AE070400000653005131003 Account No. 0653005131003 AED: AE610400000653005131001 Account No. 0653005131001 Copyright Statement © Copyright by Privus Agency Ltd. All rights reserved. Any republication, copying, redistribution, or reproduction of the magazine in any form, including electronic, without the prior written consent of the publisher, is prohibited. Advertisers are solely responsible for the content of advertising material. The publisher bears no responsibility regarding possible legal, patent, content, or brand disputes of the advertiser. Legal disclaimer The information in this magazine has not undergone any formal testing by Privus Agency Ltd. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While this information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Corporate Address Privus Agency FZ-LLC JT010006, Al Shohada Road, Ras Al Khaimah, UAE Tel: +971 58 983 4258 Web: www.asmideast.com Marketing: marketing@asmideast.com

6

www.asmideast.com

Continuing this expedition is an enlightening interview with Ayad (Ed) Sleiman, a

UST), Sleiman delves deep into the evolving landscape of cybersecurity in the ME. Speaking of cybersecurity, we will venture into the digital frontier of modern warfare, exploring its current role in ongoing conflicts like Ukraine, which serves as the main testing ground for new technologies and approaches. Going beyond cybersecurity, this issue unfurls the tapestry of 2022’s security panorama, dissecting the trends, challenges, and metamorphoses shaping the industry. By analyzing the Security 50 list of the best market players, we decode the industry’s response to economic shifts and geopolitical tensions, exploring their impact on global security dynamics amid a world inching toward recovery from the pandemic. Our sixth edition of a&s Middle East invites you to embark on an odyssey through the ever-evolving security landscape. Immerse yourself in these compelling stories and insightful analyses, unlocking the secrets that define the shifting tides of the security domain within the Middle East and beyond.

Mahir Hodžić, General Manager

WANT TO RECEIVE THE MAGAZINE AT YOUR DOORSTEP? Please visit our official website www.asmideast.com and select ‘Subscribe Now’ option under THE MAGAZINE menu. Subscription includes all six editions. Digital edition is FREE and readily available at the official website.


Smarter against fire AVIOTEC 8000i IR The IP camera with built-in video analytics that detects flames and smoke in seconds directly at the source. Ideally for challenging environments where traditional detection finds limitations. Visit our booth #2-D21 at Intersec Saudi Arabia to experience and learn more about the benefits of the newest generation. Find out more at www.boschsecurity.com

www.asmideast.com

7


NEWS

DUBAI TAXI CONTROL CENTRE INITIATES SUPERVISION OF VEHICLES BY AI Dubai Taxi Corporation (DTC) started to implement AI as a way of supervising and overseeing the driver’s performances and their various vehicles. Ammar Al Braiki, the Director of Fleet Operations at the DTC, said to Roads & Transport Authority that the Dubai Taxi Corporation aims to demonstrate the Control Centre’s work and inform the public and road users about how DTC utilises new technologies and smart systems to monitor and track 7,200 vehicles. The performance of 14,500 is being overseed. The centre ensures that the taxi fleet is sorted per demand and availability. Additionally, the centre oversees driver behaviour and their adherence to vehicle monitoring guidelines for a fleet consisting of 400 limousines, 1,000 commercial buses, and 600 delivery motorbikes. Furthermore, it monitors vehicle routes to ensure the safety of transportation operations.

Tracking school buses is of major significance, as the DTC focuses on providing a safe mode of transport for students. The progress of journeys is monitored, as well as student details, and the behaviour of the driver, and in case it is necessary, it provides a prompt safety alert.

BOSCH SELLS ITS THREE BUSINESS UNITS Bosch is realigning its Building Technologies division: in the future, the division is to focus on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. The company plans to sell most of the Building Technologies division’s product business. This includes the Video, Access and Intrusion, and Communica-

8

www.asmideast.com

tion business units, and affects some 4,300 associates at more than 90 locations worldwide. Bosch is now looking for a buyer who will take on all three business units together with their associates and locations. The product business with fire alarm systems, by contrast, is not to be sold. Because of its importance for systems integration, it is to be merged with the

According to the RTA, the centre monitors the 5,200 taxis to ensure consistent high-quality service. It takes into account driver needs, provides information about high-demand areas, and collects daily vehicle movement data, all aimed at meeting customer requirements. Finally, the DTC aims to enhance its automation, utilize big data analysis, and deploy smart systems for top-quality transportation services while maintaining global safety standards, according to RTA. n

integrator business and continued. “We are confident we will be able to find a buyer who will take over all three business units, and who will further strengthen the business and give it a secure future,” said Christian Fischer, Deputy Chairman of the Bosch Board of Management. He explained that, for strategic reasons, Bosch does not intend to develop this business further. Thomas Quante, the President of Bosch Building Technologies, added: “The product business is excellently positioned for a promising future under a new owner: innovative products, highly skilled associates, and a market environment with attractive opportunities for growth.” The Bosch Building Technologies division is a leading global supplier of security, safety, and communications products and systems. About 10,900 associates generated sales of 2.5 billion euros in 2022. Protecting lives, buildings, and assets is the major aim. The product portfolio includes video security, intrusion detection, fire detection, voice evacuation systems, access control and management systems, as well as professional audio and conference systems. n


www.asmideast.com

9


NEWS

DOORBIRD TAKES FIRST PLACE IN SMART HOME SOLUTIONS PROVIDER CATEGORY The quality of products and services is an essential factor for success for companies because it impacts how they are perceived and are therefore a major criteria when making purchasing decisions. On this basis, the F.A.Z. Institute (a company owned by the Frankfurter Allgemeine Zeitung publishing group) had data on more than 15,000 companies analyzed for the “Highest Quality 2023” study. One of the quality champions: DoorBird. The manufacturer of high-quality, exclusive IP video door stations took first place this year among smart home solution providers and is thus one of the top brands in Germany. To determine the rankings in the 363 categories, 7.4 million nominations were collected from more than 100 million online sources and analyzed using artificial intelligence while focusing on the aspects of quality, product

and service, customer satisfaction, innovation, ecological sustainability and recommendation rate. DoorBird was also surveyed and analyzed with regard to the following: quality characteristics,

returns and complaints, quality controls, service reachability, service processing, solution of the issue, service quality, quality certificates, quality management and increasing quality. n

BULLET CAMERAS PROVIDE SURVEILLANCE AT 2 MP/4 MP RESOLUTION A new series of bullet cameras was announced by Axis Communication: AXIS Q18 Series. Apart from two powerful cameras, it offers an immaculate image quality of up to 4 MP at 90 fps with an optical zoom of 32x. The cameras offer opportunities for analytics based on deep learning. AXIS Q1805-LE provides excellent image quality in 2 MP while the AXIS Q1806LE offers 4 MP. With OptimizedIR, they provide clear footage in darkness up to 100 meters without the need for lighting. The Lightfinder 2.0 and Forensic WDR play a crucial part in delivering real colors and details even in near-complete darkness. AXIS

10

www.asmideast.com

Q1805-LE has an OIS – optical image stabilization – made to stabilize images in low-light situations. The cameras include a deep learning processing unit, as they are built on ATPEC 8. This enables the collection and analysis of more data than before, as well as delivering important metadata, providing quick, convenient, and effective forensic search functionalities. AXIS Object Analytics makes it possible to detect and categorize moving objects. The cameras are easy to install and feature IDC network connectors, along with a special back box for safe cable organization. They can handle temperatures ranging from -40°C to 60 °C. Axis Edge Vault acts as a safeguard on the device and provides secure key storage with FIPS 140-2 level 2 certification. n


Open More with HID Mobile Access®

Open More with HID Mobile Access by using your smartphone or wearable as a credential to access doors, networks, services and more. From banking and finance, educational institutions, global corporate entities and more - we provide the solutions for a mobile-first world, giving you unrivaled convenience, enhanced security and privacy protection, and operational efficiency. hidglobal.com

© 2023 HID Global Corporation/ASSA ABLOY AB. All rights reserved.

www.asmideast.com

11


NEWS

SCOTT MCGINNIS ANNOUNCED HEALTHCARE SECTOR LEADER AT ISS Scott McGinnis, an expert in the industry, was announced on November 9th as Client Director – Healthcare Sector Leader by Intelligent Security Systems (ISS), according to the ISS article. ISS is a leading company in distributing video intelligence and data awareness solutions. It places a focus on next-generation video analytics. Specialists are required to properly understand the benefits of AI-powered video analytics. McGinnis, as an expert in the healthcare technology sector, provides invaluable experience and insights. Before making a deal with ISS,

he worked for Securitas Healthcare, in charge of the company’s real-time location system (RTLS) business practice. As stated in the article, McGinnis expresses his satisfaction with the move of combining his years of experience with ISS, as a way of building a healthcare vertical practice. McGinnis states that the SecurOS® Video Intelligence Platform plays a crucial role in protecting staff, patients, and visitors in different healthcare settings. The forefront of the platform is providing a safer environment in healthcare, as well as helping in the mitigation of acts of violence in the workplace.

Matt Powell, Managing Director for North America, stated further in the article that the platform is suited for the healthcare industry, combining video analytics, artificial intelligence, and decision management, all as a way of providing a new level of awareness. McGinnis is said to be the person for the job of focusing on the market and spreading the message of what SecurOS® offers, according to the article. n

MORO HUB AND CISCO PARTNER TO DRIVE UAE’S IOT REVOLUTION Cisco and Moro Hub have joined forces to revolutionize digital services in the UAE, marking a significant milestone in the realm of IoT technology. The collaboration, formalized during the GITEX Global 2023 event, positions Moro Hub to tap into Cisco’s wealth of experience in networking, IoT solutions, collaboration, and cybersecurity. This strategic alliance is anticipated to reshape service offerings across the region, promising an extensive range of advantages for customers while establishing a robust groundwork for a secure and forward-thinking digital landscape. “Our collaboration with Cisco represents a significant leap towards innovation and value creation,” said Mohammed Bin Sulaiman, CEO of Moro Hub. “Leveraging Cisco’s IoT solutions, we’re not only enhancing our offerings but also pioneering new possibilities to provide our customers with advanced, future-proof solutions that redefine excellence.”

12

www.asmideast.com

From his side, Abdelilah Nejjari, the Managing Director for the Gulf Region at Cisco, said, “We are pleased to embark on this journey with Moro. It confirms our shared commitment to achieving the

maximum benefit from digitalisation. Our goal is to recreate digital solutions to empower businesses and stimulate innovation to support the digital future of the UAE.” n


NEWS

SUPREMA UNVEILS BIOSTATION 2A, WORLD’S FIRST DEEP LEARNING-BASED FINGERPRINT RECOGNITION SOLUTION Suprema, a global leader in access control and biometrics, has launched ‘BioStation 2a’, the world’s first deep learning-based fingerprint recognition solution providing powerful access control features. Suprema has pioneered fingerprint recognition technology based on deep learning for the first time in the world. The cutting-edge AI algorithm based on deep learning is embedded in BioStation 2a. This innovation was achieved through Suprema’s expertise in creating a lightweight AI engine optimized for edge device. BioStation 2a is a high performance edge device that has adopted an AI processor, NPU(Neural Processing Unit), optimized for deep learning, delivering highly accurate and fast fingerprint recognition. Through deep learning, the ability to extract templates from lowquality fingerprints, such as those that are noisy or distorted has significantly improved by 30% in accuracy. Additionally, BioStation 2a has improved fingerprint recognition speed with a 1.5GHz Quad CPU(Processor) by supporting up to 50,000 users in 1:1 matching and 100,000 users in 1:N matching. “We are excited to unveil BioStation 2a to the market. This innovative solution represents the future of fingerprint recognition technology and empowers our customers to feel the power of AI within their fingers.” said Suprema Inc. CEO Hanchul Kim, “With

BioStation 2a Suprema will enhance its position in the market as the global leader in AI-based biometric solutions setting new standards in the security industry.” n

BY STRENGTHENING AI INVESTMENTS UAE COMPANIES PLAN TO IMPROVE CYBERSECURITY Approximately 95% of UAE-based organizations plan to boost their investments in artificial intelligence to strengthen their cybersecurity framework. According to research conducted by Palo Alto Networks, 81% of CEOs in the UAE recognize the significance of AI as a vital enabler. They view this rapidly evolving technology as essential in their organization’s cybersecurity strategy. As organizations swiftly embrace new technologies, it becomes crucial for them to enhance their cybersecurity measures. In particular, improving their capacity to identify and react to threats immediately is crucial. Through the integration of AI into their cybersecurity approaches, businesses in the UAE and the broader region can enhance their defenses against a diverse spectrum of cyber threats. This includes shortened response times and attaining more comprehensive insights into their security readiness. When combined with cybersecurity measures like employee training, and strong policies, such advancements can contribute to a multi-layered security approach.

According to the study, a significant 94 percent of respondents in the UAE are well aware of the potential cyber risks. Additionally, 89 percent believe their organizations are well-prepared to tackle cyber threats. Nevertheless, 52 percent of the organizations surveyed reported a rise in cyberattacks within the last year.

Some of the largest cybersecurity breaches affected prominent UAE companies like Careem. Hackers illicitly obtained customer and driver data including email addresses, phone numbers, and trip history from the computer system. Fortunately, passwords and credit card details remained secure as they were encrypted and not subject to theft. n

www.asmideast.com

13


COLUMN

Current Trends

THREAT AND RISK LANDSCAPES ARE EVOLVING Criminals adapt quickly and so must the security industry, we all need to focus on anticipating future threats n By: HE. Khalifa Ibrahim Al Saleis, CEO, SIRA

In the past the security industry across the globe has been reactive, for instance, if a crime/incident has taken place, we add countermeasures to stop this recurring. Criminals adapt quickly and so must the security industry, we all need to focus on anticipating future threats. In this digital world, crime now has no geographical boundaries and we all must start thinking outside the box and look further into the future for the protection of critical infrastructure, assets, and data. As SIRA’s mission is to prepare the future landscapes and develop strategic and institutional plans, we have been working closely with other government agencies and international bodies sharing intelligence and expertise to ensure it has a positive impact on Dubai’s security landscape.

The Future of Security The past couple of years have been very difficult for several reasons, the COVID-19 pandemic, and now the cost-of-living crisis. However, the security industry is going well beyond the physical security arena as it continues to innovate and move into 2023 and will continue at some pace. Whether it’s Artificial Intelligence, machine learning or deep learning automation Artificial Intelligence (AI) is still the biggest buzzword and the future of security for many years to come, not only will these systems provide the security levels for today, but they will also start to provide businesses and police forces more

14

www.asmideast.com

usable data to help with tracking or even eventually predicting crime. The wide range of analytics available from smoke detection to people tracking this technology will ultimately help security managers and operators make more informed decisions. As the Security Industry Regulation Agency’s main aim/goal is to maintain Dubai’s reputation as one of the safest cities in the world, we are constantly reviewing new technology that will help in the prevention of crime bringing together physical security and information security, rather than having separate systems and strategies and will continually review the legislation in line with new technology.

In this digital world, crime now has no geographical boundaries and we all must start thinking outside the box and look further into the future for the protection of critical infrastructure, assets, and data

Ideal platform for security professionals Keeping up with new technology is one thing, how this technology can help the client is another matter entirely. Not all companies and businesses are the same and although the systems come with all the latest features, will they be used for the benefit that is intended? Intersec 2023 is an ideal platform for all security professionals to network, engage, and review all the latest technology from the leading manufacturers worldwide, to understand fully your requirements and what systems are best for today and of course the future. Our aim is that SIRA will develop further as a local agency with global capabilities, energy, and influence. Backed by our Government, Dubai society and business have the ability to use their knowledge and creative power to lead the world by example, in security practice. n


SECURITY INDUSTRY REGULATORY AGENCY Improve security standards through the implementation of laws, standards and international best practices in security systems as well as security management and guarding services.

KEY VALUES INSTITUTIONAL REPUTATION COMPLIANCE CUSTOMER HAPPINESS LEADERSHIP SUSTAINABILITY SIRA now has more than 60,000 members working within the Dubai security industry, with the agency’s laws and guidelines helping to ensure that standards are continuously kept high For more information, visit:

www.sira.gov.ae

www.asmideast.com

15


INTERVIEW

16

www.asmideast.com


INTERVIEW

Georges Tannous, Area Vice President of Sales in the UK, Ireland, Middle East and Africa, Genetec

GENETEC DRIVES SAUDI ARABIA’S VISION 2030 BY BRIDGING SECURITY AND PROGRESS In an exclusive interview with a&s Middle East Georges Tannous of Genetec shares insights into the transformative impact of cutting-edge security solutions in Saudi Arabia’s development and plans for the future n By: Orhan Hadžagić editorial@asmideast.com

cities and what sets it apart from the rest of the market?

a&s Middle East: Good day, Mr. Tannous. Thank you for joining us today. To start, could you introduce yourself and provide an overview of Genetec’s presence and experience in the Middle East?

Tannous: Our platform is a unified security tool that includes video access control, license plate recognition, and a vast variety of IoT connectors, all in

one single platform, which is a big differentiator for Genetec compared to the rest of the market. What this helps our customers do is have one single point of contact for all their security needs. When it comes to upgrading, training, purchasing, and innovation, one

Tannous: Certainly. My name is Georges Tannous, Vice President of Sales UK Ireland Middle East Africa for Genetec. We are at Intersec Saudi Arabia. Genetec has been participating in this show for several years now. We’ve been in the Middle East for close to 20 years. We have some of the largest references across the Middle East, Africa, and in fact globally, and we work with the best-of-breed partners, from system integration and distribution. Just as importantly, with the best-of-breed technology partners when it comes to the hardware that we connect to our platform. a&s Middle East: Genetec is known for its unified security platform. Can you delve into how this platform supports the emergence and enablement of smart

www.asmideast.com

17


INTERVIEW

Genetec has been successful in various markets. This includes the critical infrastructure and the transportation market, airports, trains, and ports. We’ve also done fantastic in the banking industry. And last but not least, oil and gas industry

company does it all, and more importantly, from a cybersecurity perspective, having a unified platform allows you to have tight control over your environment. There’s less friction between different types of software, and there’s less opportunity for vulnerabilities to be able to penetrate an environment.

18

www.asmideast.com

Genetec’s Collaborative Approach Rests on Customized Solutions That Fuel Saudi Arabia’s Progress a&s Middle East: Let’s shift our focus to public-private partnerships. Can you share some insights into Genetec’s collaboration with Saudi government agencies and private sector partners, and how these partnerships benefit Saudi Arabia’s growth and development? Tannous: We have done this not by pushing technology but by going into the customers’ environment, understanding what they need from us, sometimes identifying things that they don’t know that they need because of our wide experience across the globe, and being able to customize a solution that’s really going to address the problems that they’re trying to solve. Over and above this, once the security part has been configured, designed, and engineered, the value-add of Genetec, what our customers are investing in, is our ability to help them from an operations and intelligence perspective.

a&s Middle East: Can you provide specific examples of how Genetec has been successful in critical infrastructure markets, transportation, or other industries using this platform? Tannous: Genetec has been successful in various markets. This includes the critical infrastructure market and

the transportation market, and from a transportation perspective, we’re talking about airports, trains, and ports. This has been a very important segment for Genetec. We’ve also done fantastic in the banking industry as that segment has been upgrading its systems and is under new regulations. And last but not least, oil and gas. From an oil and gas


INTERVIEW

Our platform is a unified security tool that includes video access control, license plate recognition, and a vast variety of IoT connectors, all in one single platform, which is a big differentiator for Genetec compared to the rest of the market

perspective, we have some of the largest players that are using our product, and this is, you know, largely because of our ability to scale and solve problems that are unique to that market. a&s Middle East: How does Genetec’s experience in working with various indu-

stries contribute to making it a perfect fit for the Saudi Arabian market? Tannous: This is where the Saudi market becomes an extremely important region for Genetec. When you look at the quality, the scalability, and the variety of the solutions that we’re able to provide,

Genetec is, I would say, a perfect fit for the Saudi Arabia market, and we’ve been very successful at helping customers resolve very complex problems in large environments. a&s Middle East: How does Genetec’s ability to leverage existing infrastructure,

www.asmideast.com

19


INTERVIEW

such as video, sensors, and cameras, contribute to data aggregation and provide insights to enhance safety and security? Tannous: What we’ve excelled at doing is leveraging an existing infrastructure, which is the video, the sensors, and the cameras, to ingest, analyze, and provide insights about their environment through data aggregation. And we’re not doing this just from a video perspective; we’re able to pull the video, the access control, and the license plate recognition data, and make sense of it so that customers can use this extremely valuable information to understand their environment, to improve their cost structure, to drive cash flow within their spaces, to improve their ability to generate revenue in some cases. So this is where we’ve been able to really distinguish ourselves. a&s Middle East: Now, shifting to Saudi Arabia’s Vision 2030, could you explain how Genetec’s security solutions align with the Vision’s pillars, such as economic diversification, infrastructure development, and quality of life improvement?

20

www.asmideast.com

Being a fully digitized project is a score, and we believe that this will be where we will play a big role in how we can help this region reach its goal and Vision for 2030 Tannous: The plans are very ambitious, and that fits well with what Genetec does. We have engineers in our headquarters who are focused on innovation and continuous improvement so that we can keep up with our customer demands. The Saudi Arabian market is one of the most fast-moving markets, the most visionary, and the most advanced. We have the right commitment to maintain the velocity of any of our innovations and our improvement to grow with these types of clients. I think the biggest value that we will add in the next, you know, three, five, eight, ten years to this market is our ability to support the digital transformation. If I look at the plans, it will all rest on a digital environment. Of course, there’s the engineering part, but at the end of the day being a fully digitized project is a score, and we believe that this will be where we will play a big role in how we can help this region reach their goal and their Vision for 2030.

a&s Middle East: Can you provide more insights into the specific technological advancements and solutions developed by Genetec that are particularly relevant to Saudi Arabia’s digital transformation initiatives? Tannous: Our commitment to innovation and continuous improvement is a key driver. We have 1000 engineers dedicated to this. Saudi Arabia is a fast-moving market, and we aim to support its digital transformation goals. Our ability to leverage existing infrastructure and provide insights through data aggregation will be crucial in this context. a&s Middle East: Thank you, Mr. Tannous, for sharing these insights about Genetec’s role in supporting smart cities, public-private partnerships, Vision 2030, safety and security, and digital transformation in Saudi Arabia. Your perspectives have been invaluable. n


INTERVIEW

www.asmideast.com

21


TRENDS, CHALLENGES, AND THE CHANGING LANDSCAPE IN 2022

SECURITY 50: A SECURITY INDUSTRY RESHUFFLING IN THE CARDS? In 2022, global security witnessed economic shifts, geopolitical tensions, and a profound impact on the security industry, which is anticipated to continue its growth trajectory

22

www.asmideast.com


n Source: asmag.com editorial@asmideast.com Looking back, security in 2022 operated in a world that saw a slowed recovery from COVID due to various factors, including inflation and geopolitical tensions. Economically speaking, the world had an average GDP growth of 4.1 percent in 2022, dropping from 5.5 percent in 2021, according to the World Bank. Advanced economies such as the U.S. and the Euro area grew 3.8 percent last year, down from 2021’s 5 percent, while emerging markets had a growth of 4.6 percent, down from 2021’s 6.3 percent. China, meanwhile, registered a 2022 GDP growth of 5.1 percent, down from 9 percent in 2021, due to challenges on several fronts. Domestically, China issued lockdowns in different cities throughout 2022, in response to a rise in COVID cases. Then, there is China’s ongoing real estate crisis–the Chinese government’s effort to regulate the debt limits of major Chinese developers, like the Evergrande Group, had caused the country’s real estate market to tumble. External factors also played a role. Geopolitical tensions between the U.S. and China prompted the U.S. to place severe trade barriers and restrictions against China.

Impact on security So how did these factors play out in security last year? Upon first look, they brought little change to this year’s Security 50. The top 10 global security manufacturers in access control and video surveillance in our 2023 Security 50 ranking are Hikvision Digital Technology, Dahua Technology, ASSA ABLOY, Axis Communications, Motorola Solutions, Allegion, Tiandy, Hanwha Vision (formerly Hanwha Techwin), Uniview Technologies and Aiphone. Hikvision and Dahua remain the world’s largest security companies, with 2022 security product/equipment sales reaching US$9.8 billion and $4.5 billion, respectively (based on the IRS’s 2022 average currency exchange rates). There were two new entrants: China-based smart home solutions provider MEARI and Korean biometric solution provider Union Community. Yet a surprising part of this year’s Security 50 was the growth list. Of the 17 companies that registered 2022-2021 revenue declines, 12 were Chinese companies. While China companies’ revenue declines were somewhat expected given the environment, the number of companies that inked sales declines, and the ma-

gnitude of these declines (by as much as 40.2 percent), still caught us off guard. Indeed, China’s internal and external challenges mentioned earlier–lockdowns, real estate crisis, and tensions with the U.S.– all played a part. “Chinese government spending was diverted away from other areas, including spending on video surveillance, and towards battling COVID-19 and supporting its economy during these lockdowns. Restrictions lasted much longer than many observers had anticipated, with the Chinese government finally easing its ‘zero Covid’ policy in December 2022,” said Jon Cropley, Principal Analyst, and Josh Woodhouse, Founder of Novaira Insights. At the same time, U.S.-China tensions, which led to legislation like the National Defense Authorization Act (NDAA) that bans the US government from purchasing video surveillance equipment by Hikvision and Dahua, had caused Western and non-China brands to register a proportional growth in their 2022 revenue. These include VIVOTEK, with a sales increase of 82.48 percent; Hanwha Vision, 47.52 percent; Axis, 36.01 percent; Milestone Systems, 30.43 percent; and IDIS, 22.17 percent. It should be noted that many of the U.S.’s Western allies, for example, the U.K., have also enacted NDAA-like legislation.

The security market is expected to see growth in 2023 and 2024, with video surveillance equipment predicted to grow by 11.8 percent and 10.2 percent, respectively www.asmideast.com

23


“The shift away from Chinese vendors continued at a pace not just in the U.S., but across Northern Europe and countries in Asia including Japan and South Korea. In part, many organizations and systems integrators want to standardize NDAA-compliant equipment to ensure existing and future business in the U.S., while end users are expressing concerns about looming regulations in the EU and Asia, cybersecurity weaknesses, and the potential for reputational damage connected to human rights abuses committed by some of the banned Chinese manufacturers,” said Jamie Barnfield, Senior Sales Director at IDIS Europe. As for this year, Chinese companies are expected to fare better, even though they are not completely out of the woods yet. “The Chinese market is forecast to recover slightly in 2023 but remain well below its peak in 2021. Growth in demand will be much lower than in the years before the pandemic. At the same time, a weakening exchange rate between the Chinese yuan and US dollar will also dampen growth (when measured in US dollars),” Cropley and Woodhouse said.

Yearly review and preview For the security market in general, growth is expected this year and next, with Novaira Insights forecasting the market for video surveillance equipment to grow 11.8 percent and 10.2 percent, respectively, in 2023 and 2024. Industry experts agree with that notion. “We observed some economic growth and expansion in 2023, although it has been unevenly distributed across different regions and sectors. This has had a mixed impact on the security industry,” said Choong Hoon Ha, Chief Sales and Marketing Officer at Hanwha Vision. “Despite the mixed economic impact, the security demands from society and individuals are still rising with the growing need for advanced network-based systems, such as intelligent surveillance cameras. Businesses are willing to invest in security solutions that protect their employees and assets, and even improve business efficiency and productivity by providing business insight.” “Long-term, sustainable growth is at the heart of our business planning. We plan

The shift away from Chinese vendors continued at a pace not just in the U.S., but across Northern Europe and countries in Asia including Japan and South Korea

24

www.asmideast.com

for 15 percent growth per year on average. And while the market itself is forecast to grow, Axis is again set to outpace it. We’ll achieve this by continuing to broaden our portfolio into new areas, such as intercoms, access control, audio solutions, and so on,” said Ray Mauritsson, CEO of Axis Communications.

Trends: AI, cloud, and mobile access more noticeable As for predominant trends in security, AI and cloud still rank on top. “Artificial intelligence will continue to provide opportunities for innovation across the industry. Application of AI to data streams from sensor fusion–combining and interpreting inputs from cameras and other sensory devices–will shift security solutions towards proactive capabilities that drive new value. AI’s influence is still in the transformational stage, for certain, but the applicability to the security industry is strong and clear,” said Vince Wenos, Senior VP and CTO of Allegion. “This year, we have witnessed a growing demand from customers to maximize the capabilities of their cameras and sensors, with a strong emphasis on analytics. The industry continues to embrace the dominant trend of edge analytics, with an increasing number of camera manufacturers expanding their support for this technology,” said William Hinton, Product Line


Mobile credentials and digital wallets are emerging trends in 2023, providing greater value to end-users and system operators Manager for Video at Genetec. According to Hanwha, customers are seeking technologies that can help them improve the accuracy of detection, make their video surveillance systems more scalable and cost-effective, and benefit from video analysis. “In other words, they’re looking for surveillance technology powered by AI and cloud,” Choong said. “Many customers are still in the early stages of adopting AI and cloud-based video surveillance solutions. However, the adoption of these technologies is expected to accelerate in the coming years, as customers see the benefits that they can offer.” Mobile credentials, meanwhile, have also emerged as a top trend in 2023. “Electronics continue to fuel significant growth for the industry across both hardware and solutions providers. Increasing adoption of mobile credentials and associated readers is providing a healthy lift,” Wenos said. “Mobile credentials continue to gain interest from customers, as they provide greater value to end users and system operators.” Digital wallets, an offshoot of mobile access, are also gaining traction. “We’re seeing a lot of interest in digital wallets in large, tech-savvy office buildings. The first European rollout of an employee badge in Apple Wallet was at London’s 22 Bishop-

sgate, touted as the world’s smartest building. 14,000 mobile users at 22 Bishopsgate can now use just their iPhone or Apple Watch to access their offices, plus all the building’s amenities,” said Prabhu Patel, Commercial Director for Physical Access Control Solutions, ASEAN and India, at HID. Cybersecurity continues to be a hot topic now that more and more devices are online. “For several years we’ve witnessed a growing focus on the cybersecurity of solutions. Customers are aware the risks are rising, demanding robust processes, vigilance, and transparency. When vulnerabilities do occur, vendor transparency is essential, allowing customers to respond as quickly as possible,” Mauritsson said.

Flexible payment This year, we’re seeing at least two companies offering flexible payment options. These are i-PRO, who announced their FlexPay Financing, and Eagle Eye Networks, who launched their Eagle Eye Camera Direct Complete. The programs aim to help customers achieve more payment flexibility, reduce initial investment, and become more competitive in general. “In some organizations, an increasing amount of security ops fall under the IT department’s responsibility, and they may

have a preference for a greater amount of OPEX compared with the security industry’s typical preference for CAPEX purchases,” Cropley and Woodhouse said. “This type of transition is indicative of a cloud business model transition. However, only the video surveillance vendors themselves know whether the motive behind this is related specifically to products from specific competitors.”

Consolidation vs. smaller start-ups Meanwhile, two competing forces continue to dominate in security. One is the continued consolidation of the industry. Recent examples include acquisition deals between ACRE and SISCO, Motorola Solutions and Rave Mobile Safety, and IDIS and Costar. Yet on the other hand, we’re also seeing the emergence of smaller companies focusing on cloud and AI. How these forces will play out remains to be seen. Yet according to Cropley and Woodhouse, there are advantages to the scale of operation. “Each surveillance scenario is unique. Variables include the size of the installation, whether it is indoors or outdoors, and lighting and weather conditions. At the same time, the channel varies considerably by geographic location with a different set of distributors, systems integrators, and installers serving its needs. Large vendors have a range of solutions to meet all scenarios and have the resources to serve different channels in a wide range of geographies,” they said. n

www.asmideast.com

25


Innovations Shape the Landscape

Prevailing Physical Security Trends in 2023: AI, Mobile Access Control and Integration While the era of double-digit annual growth appears to be over for video surveillance, factors including AI-related innovations, expanding provision, and demand for more sophisticated analytics, the ongoing shift to IP cameras and improving camera resolution will continue to drive market growth

n Source: asmag.com editorial@asmideast.com Memoori’s latest report into The Global Video Surveillance Business explores market prospects for cameras, storage, software & analytics from 2023 to 2028. Our latest estimates, based on a comprehensive analysis of the performance of a total of 322 companies operating in the global market, indicate that it generated revenues totaling $30.4Bn in 2022. We forecast that this market will experience a Compound Annual Growth Rate (CAGR) of 5.7% between 2023 and 2028, with revenues totaling $44.8Bn by 2028.

The AI imperative The integration of advanced Artificial Intelligence (AI) and Machine Learning into video surveillance is reaching unprecedented levels of maturity. Key drivers of this trend include various factors. First among them are practical Implementations, as earlier discussions on AI in surveillance have moved from theoretical to practical, with more real-world applications coming to the fore. Next, sophisticated analytics offer capabilities that have grown increasingly refined and reliable, reducing false alarms and allowing for more nuanced and actionable insights. Also, the falling costs of implementing AI and Machine Learning are making these technologies accessible to a broader range of applications. Finally, there’s a widespread rollout of edge-based analytics, based on dedicated AI chip system-onchip architectures that offers the ability

26

www.asmideast.com

By 2028, the percentage of network security cameras with onboard AI capabilities is projected to rise from today’s 18% to over 50% to process data closer to its source, alleviating network bandwidth constraints and helping end-users to minimize the risk of transferring or processing privacyrelated data. We forecast that by 2028, the percentage of network security cameras with onboard AI capabilities is projected to rise from today’s 18% to over 50%. These advancements are fueling new features like object recognition, behavior analysis, and other forms of intelligent monitoring.

As data volumes and the demand for analytics rise, we expect the market for Video Management Software (VMS) & analytics to significantly outpace growth in the wider market, here, we are forecasting growth at an 8.4% CAGR from 2022-2028. Here, the progressive transition to cloud-based analytics driven by requirements to amplify the power of video analytics by leveraging centralized computing resources is set to continue.


Access control: Mobile gains traction Turning to access control, our market forecasts for this year’s analysis are still being finalized, but initial indicators are that Electronic Access Control market growth is set to outpace Video Surveillance market growth for the coming 5 years, reversing the dynamics that have been in play across Physical Security for over a decade. Here, the underlying supply chain and security dynamics are similar, geopolitical uncertainties are having a much more muted impact. Biometrics adoption has been somewhat stalled due to behavioral and attitude changes resulting from COVID, but we see the primary driver for growth is the progressive shift to mobilebased access control. From a user standpoint, the allure of mobile access control lies in its convenience, enhanced security features, and the flexibility it offers for system administration. Customers, too, are taking note. According to a recent survey on access control trends, 42% of respondents worldwide now have plans in place to upgrade to mobile-ready systems. Our preliminary data aligns with this sentiment, projecting that by the end of 2023, mobile-based systems could constitute around 20% of all newly issued access control credentials for non-residential buildings. While the transition to mobile-based systems is underway, it isn’t without its own challenges. Privacy and cybersecurity remain key concerns amongst many end users, particularly in cases where personal devices are proposed as the pri-

By the end of 2023, mobile-based systems could constitute around 20% of all newly issued access control credentials for non-residential buildings mary means of access control. For this reason, some organizations remain reticent to back the shift, still preferring the use of physical cards to mitigate the risks associated with personal data exposure on mobile devices.

Tying it all together As the physical security industry evolves, integration continues to move to the forefront as a business imperative. Rather than maintaining each individual security component (video surveillance, access control, or intruder detection) in individual silos, companies are now looking for new cross-functional efficiencies and value add opportunities across the BIoT. There’s a burgeoning demand from both users and vendors for unified platforms that not only streamline workflows but also enrich data insights by correlating information across domains. Deeper forms of interoperability that span data structures, analytics, identity management, and automation capabilities are emerging, fostered by expanded cross-domain partnering networks and improving API functionality. One of the key enablers in this transformation is improving the standardization of security data and its metadata. Providing more contextually rich data is needed to inform more intelligent decision-making across these previously siloed systems,

and can be invaluable when integrated into a broader security or building management system, enabling more nuanced and responsive actions like selective door locking or lighting adjustments based on occupancy, or scheduling elevator movements to match patterns of people movement within a building, saving energy and enhancing building user experiences. Legacy systems, proprietary protocols, and the absence of standardized data formats will also continue to act as common roadblocks to integration until such systems are progressively phased out. As the industry moves toward more standardized solutions, and cross-functional expertise grows, we can expect deeper, more seamless integrations to become the norm rather than the exception.

Looking forward The physical security market clearly remains in a state of flux, influenced by technological advancements, geopolitical shifts, and an increasing focus on integration and ethics. Companies that can adapt to these changes, innovate, and offer intelligent, integrated solutions are likely to thrive. But this is not a market for the complacent; staying ahead will require constant innovation, ethical considerations, and perhaps most crucially, the ability to adapt to everchanging conditions. n

www.asmideast.com

27


Interview: Swift Wu, General Manager of the International Department at ZKTeco

ZKTeco’s vision for 2024: Advancing biometrics, cloud solutions and global growth Swift Wu, General Manager of the International Department at ZKTeco, discusses how the company effectively addressed industry challenges in 2023 and shares key insights on how regions like the Middle East are emerging as hubs that hold great potential for economic growth n Source: asmag.com editorial@asmideast.com Founded in 2007, ZKTeco has long established itself as a leading global provider of hybrid biometric identification technology. In August 2022, the company marked a momentous occasion when ZKTeco successfully became a publicly listed company on the Shenzhen Stock Exchange. asmag.com: What was 2023 like for ZKTeco? What were the challenges and how was ZKTeco able to respond? Wu: Looking back at 2023, it was a pivotal year for ZKTeco and the industry as a whole. The world was showing signs of economic recovery. However, global economic performance did not meet expectations. While there were improvements, some sectors like retail lagged behind others in recovery. Some regions continued to grapple with lingering economic deficits, resulting in postponed or canceled government projects. In more extreme cases, rapid currency depreciation led to economic instability. Despite these challenges, certain economies outperformed others, with significant changes seen in lifestyles and business operations. The shift towards remote work and online shopping had a considerable impact on our business, particularly in areas like time attendance systems and other B2B security solutions. While many companies have begun asking their employees to return to the office, we anticipate that some changes in working practices may be permanent. Compounding these difficulties were escalating geopolitical tensions, with some nations in con-

28

www.asmideast.com

We anticipate a return to economic stability, particularly in regions like Southeast Asia and the Middle East. These regions are becoming hubs for manufacturing and IT jobs, and we foresee considerable economic growth there flict or facing economic sanctions. These global issues led to an influx of vendors branching out into overseas markets to compensate for domestic economic downturns. Many employed a skimming strategy, offering low prices to penetrate new markets. This approach not only disrupted local markets but also threatened the sustainability of local suppliers due to the extremely low-profit margins. ZKTeco, with its longstanding presence in

international business, was well-equipped to navigate these challenges. Asmag.com: Can you share some noteworthy accomplishments from the past year? Wu: In the past year, we at ZKTeco have made strides in expanding our business along both horizontal and vertical dimensions. We consider horizontal expansion as into new business sectors or lines,


The shift towards remote work and online shopping had a considerable impact on our business, particularly in areas like time attendance systems and other B2B security solutions and vertical expansion as penetrating higher or lower market sectors. In 2023, we focused on establishing a solid foundation for future growth. One of our notable achievements was the investment and development of our next-generation access control systems. These systems, built on universal industrial standards, are fortified with intelligent and flexible functions. To accomplish this, we incorporated multiple advanced technologies, including artificial intelligence (AI), cloud computing, and big data. This integration solidifies our position at the forefront of the industry and offers our clients the most sophisticated solutions. Simultaneously, we’ve made significant progress in our vertical expansion. We are on the verge of launching a new product line that provides real-time managed advertisements, professional digital displays, digital signage, and digital posters. This system is fully enhanced by computer vision technology, addressing the limitations of conventional advertisement placement tools that cannot push correlated advertisements to audiences on demand. In our system, front-end cameras utilize computer vision technology to provide active video analytics. This includes text recognition, pattern recognition, and behavior analysis. Our edge devices then push correlated advertisements to the audience based on these analytics. This technology greatly enhances the accuracy of advertisement placement and provides reliable statistical information to advertisers. Asmag.com: How is ZKTeco strategizing for 2024? Where do you see new business opportunities in the market? Wu: While the world continues to face conflicts and unstable situations, we remain optimistic for 2024. We anticipate a return to economic stability, particularly in regions like Southeast Asia and the Middle East. These regions are beco-

Notable achievements included the investment and development of our next-generation access control systems, fortified with intelligent functions and incorporating advanced technologies like AI, cloud computing, and big data ming hubs for manufacturing and IT jobs, and we foresee considerable economic growth there. Our strategy for expansion has always centered around localization. We adhere to a management philosophy of decentralization — we believe that providing our branches and departments with autonomy allows them to deliver optimal results, spurred by an effective motivational system. In response to the tense political situations among global superpowers, we’ve invested resources to ensure dual supply chains. This strategy will enable ZKTeco to maintain the production and delivery of our solutions to partners and clients, regardless of external circumstances. As of 2023, our biometric technology is among the top in the industry according to the NIST competition results. We firmly believe that biometrics is the future of human identity authentication and are committed to providing top-notch biometric technology across various solutions and applications. Alongside biometric technology, we believe that cloud-based and SaaS platforms

are becoming mainstream. Soon, ZKTeco will launch several SaaS platforms for access control, visitor management, and time-attendance services. This is just the beginning of our journey to provide cloudbased services, with more to come in the next few years. Indeed, 2023 marked an exciting time for advancements in AI technology, with ChatGPT (GPT-4), in particular, garnering global attention. As a technology-based company, we at ZKTeco have embraced these advancements, incorporating AI to enhance our solutions in numerous ways. We are optimistic that the integration of GPT-4 with our existing solutions will result in improved user experiences and more efficient system operations. However, it’s crucial to remember that ChatGPT is just one facet of AI. AI technology as a whole offers a broad range of opportunities to enhance our solutions, and we’ve been keen to leverage these opportunities. For instance, we use AI in our biometric algorithms, where machine learning techniques allow our systems to improve accuracy and performance over time. n

www.asmideast.com

29


‘23

‘22

Company

Headquarters

Product Group

1

1

HIKVISION DIGITAL TECHNOLOGY (VIDEO SURVEILLANCE)

China

Multiple

2

2

DAHUA TECHNOLOGY

China

Multiple

3

3

ASSA ABLOY (ELECTROMECHANICAL AND ELECTRONIC LOCKS)

Sweden

Entry System

4

4

AXIS COMMUNICATIONS

Sweden

Multiple

5

5

MOTOROLA SOLUTIONS (VIDEO SECURITY AND ANALYTICS)

U.S.

Multiple

6

8

ALLEGION (ELECTRONIC PRODUCTS AND ACCESS CONTROL)

U.S.

Entry System

7

7

TIANDY

China

Video Surveillance

8

9

HANWHA VISION

Korea

Video Surveillance

9

6

UNIVIEW TECHNOLOGIES

China

Video Surveillance

10

10

AIPHONE

Japan

Intercom

11

13

INTELBRAS

Brazil

Multiple

12

17

VIVOTEK

Taiwan

Video Surveillance

13

15

CP PLUS

India

Video Surveillance

14

12

ZKTECO

China

Multiple

15

11

DONGGUAN YUTONG OPTICAL TECHNOLOGY

China

Video Surveillance (Lens)

16

18

MILESTONE SYSTEMS

Denmark

Video Surveillance

17

19

NEDAP

Netherlands

Multiple

18

21

IDIS

Korea

Video Surveillance

19

14

INFINOVA

China

Video Surveillance

20

20

TVT DIGITAL TECHNOLOGY

China

Video Surveillance

21

26

NAPCO SECURITY TECHNOLOGIES

U.S.

Multiple

22

24

OPTEX (SECURITY SENSORS)

Japan

Intrusion Detection

23

25

COMMAX

Korea

Home Security & Automation

24

23

RAYSHARP

China

Video Surveillance

25

16

KEDACOM (VIDEO SURVEILLANCE)

China

Video Surveillance

26

30

IDENTIV

U.S.

Entry System

27

27

GALLAGHER

New Zealand

Entry System

28

32

SUPREMA

Korea

Entry System

29

35

EVETAR

China

Video Surveillance (Lens)

30

33

TAMRON (SURVEILLANCE & FA LENSES)

Japan

Video Surveillance (Lens)

31

N/A

MEARI

China

Home Security & Automation

32

34

KOCOM

Korea

Home Security & Automation

33

37

FOCTEK PHOTONICS

China

Video Surveillance (Lens)

34

38

BLUESKY TECHNOLOGIES

China

Video Surveillance

35

36

MOBOTIX

Germany

Video Surveillance

36

39

DYNACOLOR

Taiwan

Video Surveillance

37

40

COSTAR TECHNOLOGIES

U.S.

Video Surveillance

38

48

EVOLV TECHNOLOGY

U.S.

Screening Systems

39

44

HI SHARP ELECTRONICS

Taiwan

Video Surveillance

40

N/A

UNION COMMUNITY

Korea

Entry System

41

43

SENSTAR TECHNOLOGIES

Israel

Multiple

42

41

C-PRO ELECTRONICS

Korea

Video Surveillance

43

45

SYNECTICS (SYSTEM DIVISION)

U.K.

Video Surveillance

44

42

GEOVISION

Taiwan

Video Surveillance

45

46

ITX AI

Korea

Video Surveillance

46

52

ACTI

Taiwan

Video Surveillance

47

N/A

THRUVISION

U.K.

People Screening

48

49

AVA GROUP

Australia

Multiple

49

N/A

EVERFOCUS ELECTRONICS

Taiwan

Video Surveillance

50

47

HITRON SYSTEMS

Korea

Video Surveillance

30

www.asmideast.com


2022 1H Revenue (US$ Million)

2021 1H Revenue (US$ Million)

Revenue Growth (2022-2021 1H)

2022 Revenue (US$ 2021 Revenue (US$ Million) Million)

Revenue Growth (2022-2021)

9,788.0

9,679.9

1.1%

4,280.83

4,487.60

-4.61%

4,541.7

4,879.0

-6.9%

1,720.00

1,898.51

-9.40%

3,580.1

2,815.9

27.1%

0.00

0.00

0

1,572.0

1,155.8

36.0%

772.11

568.28

35.87%

1,523.0

1,226.0

24.2%

0.00

0.00

0

850.7

602.2

41.3%

0.00

0.00

0

805.8

791.1

1.9%

0.00

0.00

0

775.9

526.0

47.5%

438.06

296.78

47.60%

762.0

902.4

-15.6%

0.00

0.00

0

401.7

395.5

1.6%

171.78

182.28

-5.76%

374.1

305.8

22.3%

0.13

0.10

23.67%

333.7

182.9

82.5%

86.8

54.06

60.56%

292.1

209.7

39.3%

0.00

0.00

0

285.1

290.5

-1.9%

0.00

0.00

0

274.3

306.4

-10.5%

0.00

0.00

0

210.3

161.2

30.4%

186.92

153.62

21.67%

167.8

156.1

7.5%

0.00

0.00

0

164.2

134.4

22.2%

49.16

42.38

15.99%

153.7

235.5

-34.7%

28.25

75.50

-62.59%

144.2

149.1

-3.3%

0.00

0.00

0

143.6

114.0

25.9%

59.16

50.15

17.96%

122.2

103.9

17.7%

0.00

0.00

0

120.8

109.5

10.3%

14.65

8.93

63.97%

118.0

128.9

-8.5%

0.00

0.00

0

115.5

193.2

-40.2%

50.07

105.61

-52.59%

112.9

103.8

8.8%

40.94

37.07

10.46%

112.4

101.4

10.9%

0.00

0.00

0

94.3

80.1

17.8%

0.00

44.10

0

86.9

74.4

16.8%

35.64

31.67

12.54%

85.5

71.2

20.0%

0.00

0.00

0

82.2

82.5

-0.4%

0.00

0.00

0

73.8

71.7

2.8%

12.98

16.4

-20.83%

67.3

67.7

-0.6%

0.00

0.00

0

62.4

60.1

3.8%

0.00

0.00

0

58.9

65.6

-10.2%

-4.07

3.24

-225.80%

58.6

57.3

2.3%

0.00

0.00

0

54.2

52.9

2.4%

17.28

17.34

-0.35%

49.6

21.8

127.6%

1.73

6.64

-73.96%

35.9

31.3

15.0%

0.00

0.00

0

35.7

30.2

18.3%

12.11

10.88

11.28%

35.6

34.9

1.8%

21.5

21.98

-2.18%

34.1

40.4

-15.6%

10.06

10.22

-1.57%

29.8

25.5

17.1%

15.1

11.82

27.76%

29.2

47.7

-38.8%

20.63

19.60

5.21%

20.6

24.3

-15.1%

7.16

6.11

17.08%

15.7

14.7

6.9%

0.00

0.00

0

15.3

10.3

48.5%

0.00

0.00

0

13.4

18.0

-25.7%

0.00

0.00

0

10.9

12.6

-13.9%

0.00

0.00

0

8.3

21.3

-60.8%

-2.09

-5.08

-58.93%

www.asmideast.com

31


FEATURE STORY

Peacetime technology in information warfare

CYBER SECURITY BEHIND THE FRONT LINES:

LESSONS FROM THE UKRAINE WAR

With the transition to the digital era, cyber security has found itself on the digital front lines, the borders of which are today stretched along satellite networks, swarms of drones, and even surveillance camera installations

32

www.asmideast.com


FEATURE STORY

n By: Mirza Bahić editorial@asmideast.com In today’s modern warfare environment, cyber security has emerged as a key determinant of success or failure. Ukraine’s current conflict with its eastern neighbor has highlighted the importance of innovative security solutions on modern battlefields, especially those in the cyber domain. In fact, the events in this country served as the first mass demonstration of the importance of protecting peacetime resources from cyber attacks, primarily satellites, drones, and surveillance cameras. As a novelty in the world of cyber warfare already at the beginning of the conflict, there emerged the Starlink satellite Internet system of billionaire Elon Musk, which enabled Ukraine to dispel the informational fog of war amid continuous attacks on its telecommunications infrastructure. But after curbing support for Ukraine to use Starlink for a planned attack on Crimea, doubts have been raised about Musk’s claims to prevent “world war” and talk of problems Starlink has with interference from Russia’s entire com-

Digital infrastructure dispersion as a strategy It is interesting to note that after the outbreak of the conflict, several international companies came together to strengthen Ukraine’s cyber resilience. For example, according to Microsoft, the synthesis of cyber threat intelligence and focus on endpoint protection has significantly strengthened Ukraine’s defenses against Russian hacking attacks. Further, Ukraine’s ability to “scatter” its digital infrastructure into the cloud has proven to be an important strategy in resisting coordinated attacks on its data centers. In this approach, Amazon Web Services (AWS) played an important role, ensuring the continuity of availability of services for the needs of the government of Ukraine. At the same time, both Cloudflare and Google have expanded their cyber protection services to key Ukrainian organizations. Accordingly, the defense of Ukraine’s national cyber domain has been transformed into a joint transnational enterprise involving contributions from both private and state entities.

plex of electronic warfare systems followed soon.

Starlink under attack The Security Service of Ukraine (SBU) has revealed that Russian intelligence services are using custom malware to infiltrate Android devices, including tablets, to gain unauthorized access to Starlink satellite data. In addition to tablets, mobile devices have also been targeted by malware known

The captured tablets were used as an entry point for malware infiltration to collect data from the Starlink system

as Malware 4. STL which exploits these platforms to remotely collect data from Starlink systems. This software did this through API functions, and cyber security experts found the entry point for malware infiltration to be captured tablets on the battlefield. After the security service identified at least ten different types of software targeting Starlink, the service issued a warning to soldiers to install special antihacker software on computers that use Starlink terminals to access the Internet. Although the SBU claims that these “illegal activities” have now been stopped, it is no secret that after this revelation, concerns remain about the extent of access to compromised data and the

www.asmideast.com

33


FEATURE STORY

possible implications for the future use of Starlink. In fact, as early as 2022, voices of caution were being raised about the potential for hackers to exploit vulnerabilities in Starlink’s infrastructure and gain unauthorized access to sensitive data transmitted via satellite communications. Security researcher Lennert Wouters identified a weak point in Starlink’s systems that could be exploited with a simple modified chip made up of components that cost less than $25. These are fault injection attacks that can bypass Star-

There have also been reports in the media that Russia has tested a space-based electronic warfare system called the 14Ts227 Tobol to jam Starlink communications. Speculation ran far enough that the Tobol, along with Russia’s truck-mounted Tirad-2 satellite jammer, is now considered a crucial factor in the disruption of communications with Starlink during the pivotal Battle of Bakhmut this summer. In the absence of a search for a more permanent solution in wartime conditions, Ukraine was promised additional support from NATO countries for IT

Lack of regulatory oversight can lead to unpredictable outcomes such as situations where company management can thwart the execution of field operations link’s security measures and infiltrate its systems. Although Starlink issued a public update in response to Wouters’ findings, this expert emphasized that removing this kind of fundamental vulnerability would require the development of completely new versions of chips for satellite terminals as well as the introduction of stricter cyber protection measures in satellite communications.

34

www.asmideast.com

protection of military communication capabilities. The Swedish company Satcube 100 is supposed to supply this country with portable satellite Internet terminals that offer greater reliability and resistance to cyber attacks compared to Starlink. In response to identified weaknesses in the previously invincible system, Starlink also implemented a paid bug-hunting

program, offering cash rewards ranging from $100 to $25,000 to security researchers who identify weaknesses in its satellite systems. Although the reward system for observed bugs has been used before in order to encourage ethical hackers to find and report vulnerabilities, potential challenges lie in controlling the activities of these actors who, by the very nature of their calling, operate independently of any surveillance system.

Is the satellite a military or civilian target? Findings by Ukrainian security experts regarding weaknesses in Starlink systems only underscored the strategic importance of satellite internet in modern warfare. But that is not the only problem in the fight to protect satellite systems from cyber attacks. Given that its parent company SpaceX has an almost monopolistic status in the global satellite internet market, there is increasing pressure towards strengthening international cooperation in regulating and monitoring these systems. Despite this, major problems soon arose in terms of defining the status of satellite systems as military or civilian targets in cyber warfare.


FEATURE STORY These are fault injection attacks that bypass Starlink’s security measures and infiltrate its systems

The fact is that the involvement of private technology companies in matters of national security entails many challenges when it comes to treating the satellite network as a “valid” target in information warfare. An example is a situation where private entities, such as Starlink, offer civilian technology that virtually overnight becomes vital to military operations in conflict zones. Initially, Starlink’s technology was classified exclusively as civilian, bypassing export restrictions and International Traffic in Arms Regulations (ITAR) requirements. However, the situation changed dramatically when the Ukrainian military began using civilian technology for military communications. Thus, according to some, technology, originally intended for civilian use, turned into a weapon of information warfare. The logical course of future action would be for Starlink to be classified as a so-called dual-use technology subject to ITAR and military export restrictions. Otherwise, the absence of military export regulations means that private technology companies can make unilateral decisions regarding the delivery and terms of their services during wartime. This lack of regulatory oversight can also lead

to unpredictable outcomes and strategic vulnerabilities, such as situations where a company’s management can thwart the execution of field operations at its own discretion and judgment, as in Musk’s case.

ter use of available civilian technologies, such as surveillance cameras. For example, Ukrainian teams regularly engage in hacking CCTV cameras in occupied territories to monitor Russian troop movements. At the same time,

Hacked webcams have already caused enough damage to the country’s defense, as activities related to air defense systems and equipment transport were monitored through them The battle for surveillance cameras The need for rapid acquisition and dissemination of information in emergencies is not limited to satellite networks. It is crucial for the performance of the activities of all warring parties that identify cyber warfare as an integral part of their broader military strategy. In the Ukraine war, both sides are recruiting teams of hackers and special forces for information warfare to penetrate each other’s systems, cooperate with military personnel on the ground, and make bet-

they are sending kamikaze drones to disable Russian cameras monitoring Ukrainian activities. In response, Russian hackers have managed to gain unauthorized access to private security cameras in Ukrainian coffee shops on many occasions, using them to gather intelligence on military convoys passing near these facilities. CCTV cameras, which local authorities and private companies use to monitor events in their immediate surroundings, were also the focus of their attacks. Hackers have shown ingenuity in their methods, including unauthorized access to public web cameras that have been

www.asmideast.com

35


FEATURE STORY A significant defensive move was the wider use of third-party hosting services, i.e. for moving data and services outside the geographical boundaries of the conflict zone

used to monitor the movements of the Ukrainian military. The IT Army of Ukraine, a hacking collective linked to the authorities in Kyiv, has undertaken a large-scale operation to detect security-compromised webcams inside the country. Their primary goal is to prevent Russian forces from gaining insight into the movement of Ukrainian troops, especially during planned offensive operations. For this purpose, a “camera hunt” program was launched, in which security experts and other individuals are rewarded for identifying and reporting IP addresses and vulnerable points of public cameras to the authorities. According to this hacker collective, hacked public webcams have already caused enough damage to the country’s defense because they monitored activities related to air defense systems and the transport of military equipment. According to local media, Russian forces allegedly used hacked webcams to identify Patriot surface-to-air missiles that were attacked in Kyiv in May.

Is national strategy more important than technology in cyber warfare? The ongoing conflict in Ukraine represents not only an escalation of traditional military operations but also a multiple increase in the volume of activities in the field of information warfare. However, what sets this kind of first large-scale modern cyber conflict apart is a kind of paradox that accompanies it

36

www.asmideast.com

Drones as a double-edged sword in cyber-warfare Drones have revolutionized modern cyber warfare by enabling warring parties to gather extensive data from various sources, including the Internet, radio frequency transmissions, and GPS tracking information. However, in addition to monitoring the activities of opponents and participating in actions on the ground, drones have found themselves in the arena of cyber war due to their ability to disrupt communication networks and channels and thus reduce the flow of key information needed to launch hacker attacks on military and key infrastructure. However, the application of drones to cyber warfare operations has not been without potential challenges. As the war in Ukraine has shown, drones themselves are vulnerable to being hacked or taken over by an adversary. In that case, a hacked drone offers access to the sensitive information needed to launch an attack on an adversary’s digital infrastructure. When capturing or hacking drones, speed is of essential importance because the task of military cyber teams is to extract as much data as possible from these devices and, at the same time, to hide for as long as possible the fact that the drone has fallen into enemy hands and is no longer in the service of the original users. That’s why both Russian and Ukrainian intelligence services have moved some of their elite cyber teams closer to the front lines for easier coordination with the military and faster direct access to captured enemy devices before they are discovered to be compromised.

and captures the attention of the security community and its professionals. It has to do with a paradoxical disparity between the intensity of cyber warfare operations undertaken and their outcomes. More precisely, despite the rise in the frequency of cyberattacks, there has

been no significant loss of resources or a complete collapse of the enemy’s information network. This mysterious trend has attracted the attention of experts from the Center for Strategic and International Research, who attribute its results to a change in the paradigm of

When hacking drones, speed is of the essence because the task of military cyber teams is to extract as much data as possible from these devices and to hide the fact that the drone has fallen into enemy hands for as long as possible


FEATURE STORY

national cyber protection that Ukraine copied from more experienced countries while drawing valuable lessons from the experience of fighting Russian cyber attacks in 2014 and 2016. According to the Center’s 2023 report, a possible explanation for the relative ineffectiveness of Russia’s cyber endeavors lies in Ukraine’s focus on active defense within the domain of cyber warfare. A

curity strategy that prioritized strengthening data redundancy and resilience with expanded use of encryption. A significant move was the wider use of third-party hosting services, i.e. for moving data and services outside the geographical boundaries of the conflict zone. This innovative approach was introduced to complicate and limit the planning of an opponent’s cyber attack. This method

Ukraine’s ability to disperse its digital infrastructure into the cloud has proven to be an important cyber defense strategy combination of innovative contributions from the private sector orchestrated state efforts, and the evolution of Ukrainian cyber doctrine have tipped the balance in favor of the concept of cyber defense. Ukraine’s defense strategy in the cyber war thus focused on several key elements: proactive measures to protect potential targets, the establishment of intensive cooperation with international security entities, and rapid suppression of threats through monitoring of critical networks. In 2016, even before the invasion, Ukraine adopted a national cyber se-

has shown how even smaller countries can design digital infrastructure and data systems with the help of external service providers, thus minimizing vulnerability to attacks and increasing resistance to them. However, the less optimistic security experts believe that the relative absence of spectacular cyber attacks in this war is only a consequence of the fact that Russia achieves its cyber warfare goals by using conventional military weapons to destroy communication infrastructure. At the same time, more sophisti-

cated tools for cyberattacks, they warn, can simply be kept in stock for largescale cyberattacks on the communication systems of countries that support Ukraine, and in the event of an escalation of the conflict.

Lessons for the future The conflict in Ukraine has brought to the fore the critical role of cyber security in modern warfare. New strategic effects of cyber warfare, including innovations such as Starlink’s satellite internet system and national IT defense measures that include external hosting services, underscore the importance of protecting digital assets in the face of cyber threats. This conflict serves as an important reminder of the permanently changed environment of cyber warfare in which not only traditional infrastructure but also drones and webcams are being targeted by hacker activities. Lessons learned should help shape new defense strategies and approaches to international cooperation to protect peacetime critical infrastructure such as satellite systems, commercial drones, and surveillance cameras. n

www.asmideast.com

37


INTERVIEW

Intersec Insights

BALANCING SECURITY, REGULATION AND INNOVATION WILL ENHANCE CYBER RESILIENCE IN THE MIDDLE EAST Ayad (Ed) Sleiman, cybersecurity veteran and KAUST’s special projects head, talks to a&s Middle East about fortifying cyber defenses in the ME without stifling technological progress amidst the shifting tides of security n By: Hatidža Lazović editorial@asmideast.com Ayad (Ed) Sleiman, a seasoned expert with over 38 years of experience in the IT industry, shares insights into the evolving field of cybersecurity. As Head of Special Projects and former Head of Information Security at King Abdullah University of Science and Technology (KAUST), he discusses the pressing issues in IT safety and protection, emphasizing the growing importance of cybersecurity and its role in addressing emerging threats in the Middle East. a&s Middle East: As an expert with significant experience in the area of safety and protection, can you describe what challenges or pressing issues in the field of safety, specifically cybersecurity, you believe should be addressed and discussed at Intersec? Sleiman: The technological revolution of this century has positively impacted every facet of our lives, safety and security included. Especially cybersecurity

38

www.asmideast.com

has become crucial. The reason is the ubiquitous connectivity we enjoy can be used against us to do us harm. For example, the legacy safety and protection problems dictated that we focus on physical security aspects, especially the safety of individuals. These days, criminals and terrorists have employed cyber mechanisms that can cause damage, injury, and sometimes casualties without risking their own lives or even being in proximity to their target. Derailing a train, opening a dam to flood a city, or even using drones to attack a civilian entity all do not require the criminal/terrorist to even be physically present near the target site. So, while Intersec’s focus has been on the physical aspect of security, safety, and protection and it is still needed, more focus should be placed on cybersecurity due to the ever-evolving threat landscape. a&s Middle East: How do you see your role as a speaker at Intersec in influencing and shaping the discourse on cybersecurity, and what contributions do you hope to make?

Sleiman: My experience in security started in the intersection of physical and digital space over 20 years ago with a focus on biometric security which attempts to identify and verify individuals based on their biological attributes like face, iris, and fingerprint among other biometrics. Then, I moved into the cybersecurity space where my focus shifted to protecting organizations in cyberspace. This rich experience affords me to draw parallels between the physical and digital (cyber) aspects of security and inspiring other individuals about to embark on the same journey and bridging the gap between the two disciplines thus being able to effectively communicate from both ends of the spectrum. a&s Middle East: Speaking of the global impact of Intersec, how do you envision the exchange of knowledge and ideas among attendees shaping the future of safety practices worldwide? Sleiman: By bringing together experts, policymakers, and industry leaders from around the globe, Intersec can help in


INTERVIEW

www.asmideast.com

39


INTERVIEW

promoting and harmonizing global standards for safety and protection. Also, the exchange of ideas can lead to innovative solutions to pressing safety and security challenges where attendees can learn about the latest advances in technology and methodologies employed across different regions and industries. Intersec provides a platform for establishing cross-border collaborations which can lead to joint initiatives, research projects, etc. It also helps in raising awareness and educating attendees on crucial issues. Finally, discussions and insights discussed at the event can inform policy development and advocacy efforts which creates a conducive regulatory environment for enhancing security and safety. Ultimately, the knowledge and ideas exchanged at Intersec can contribute to building global resilience against a wide range of threats, from cyber-attacks to natural disasters. a&s Middle East: As an expert in cybersecurity, could you describe your perspective on the current state and trends in the cybersecurity and safety industry within the Middle East? How do you see the Middle East region’s opportunities and challenges, and what can be done better? Sleiman: This seems like a full SWOT analysis of the region, which could fill pages if not books of text. But if we were to conduct a mini-SWOT analysis, it would

40

www.asmideast.com

Our approach should be synergetic by establishing cross-sector forums and working groups, developing common standards and frameworks, and promoting public-private partnerships involve strengths that can be summarized with the quickly adapting regulatory landscape, the adoption of advanced technology, and the cybersecurity investments being made at all levels of society. Next are weaknesses such as skills shortage, complex threat landscape due to the geo-political aspect, and rapid technological changes. These are followed by opportunities, including capacity building, technology development, international collaboration, and public-private partnerships (PPPs). Finally, we have threats that reflect rapid digital transformations and geopolitical dynamics. I highly recommend investment in cybersecurity infrastructure, people, processes, and technology, specifically, education and training of people. Also, strengthening regulatory frameworks, promoting R&D, and enhancing regional and international collaboration to share threat intelligence, best practices, and resources. a&s Middle East: In the rapidly evolving landscape of cybersecurity threats, what emerging technologies or strategies do

you see as particularly promising for enhancing safety and protection measures, and how might they be integrated into existing systems in the Middle East? Sleiman: The rapidly evolving threat landscape highlights the need for more innovative and out-of-the-box approaches to securing our systems. We need to adopt solutions and strategies that enhance our protection measures such as AI/ML which can significantly enhance threat detection and response identifying malicious activities and anomalies. Zero Trust Architecture (ZTA) is becoming the ABC of security based on the “Assume nothing, Believe no one, and Check everything” principle. There are also threat intelligence platforms that involve the collection and analysis of data from various sources to provide actionable insights on potential threats. Integrating AI/ML involves deploying advanced analytics solutions and training them with historical data that is relevant to the region, the kingdom, and our organizations. Integrating ZTA requires a complete mindset shift and deployment of


INTERVIEW

technologies such as micro-segmentation, multi-factor authentication (MFA), and continuous monitoring. Integrating threat intelligence platforms should be done with existing Security Information and Event Management (SIEM) systems to provide a holistic view of the threat landscape. a&s Middle East: Cybersecurity often intersects with other sectors like critical infrastructure, healthcare, and finance. How can interdisciplinary collaboration and information sharing be fostered to address the growing complexity of cyber threats? Sleiman: Common to all of these domains is the cybersecurity triad: confidentiality, integrity, and availability. So, it’s natural they would intersect. We need to maintain the availability of CNI at all times as well as the confidentiality and integrity of healthcare and finance. Threat actors pose threats to all of these edges of the triad thus impacting all of the industries mentioned above. So, our approach should be synergetic by establishing cross-sector forums and working groups, developing common standards and frameworks, promoting public-private partnerships (PPPs), and investing in interdisciplinary education and training. In addition, conducting joint exercises and simulations and developing legal and regulatory frameworks that support information sharing will foster collabora-

We really need to strike a balance between regulating the industry and checking a box and promoting innovation that sometimes can be stifled by strict regulations tion and encourage parties to share their experiences and solutions to common problems. a&s Middle East: As cybersecurity concerns continue to grow in the Middle East, what are your thoughts on the role of government regulations and international standards in ensuring a higher level of safety and protection in cyberspace? How can these regulations strike a balance between security and innovation in the region? Sleiman: This is an excellent question and one that is challenging to answer at the same time. We really need to strike a balance between regulating the industry and checking a box and promoting innovation that sometimes can be stifled by strict regulations. The role of

government regulations and international standards added to the key role played by the National Cybersecurity Authority specifically in Saudi Arabia and other authorities within the Middle East can enhance the position of cybersecurity in the region. As a matter of fact, the Kingdom holds the second position in the world within the cybersecurity Index because it provides a clear framework for organizations to follow ensuring a baseline level of cybersecurity. This can help reduce the risk of cyber-attacks and data breaches. Regulators though have to make it easy for organizations to implement such a framework allowing for a maturity-based approach as opposed to a check-box one. For example, having one ruler to measure all organizations would be doing a disservice to these organizations instead of helping them out. The regulator should implement a risk-based framework that can be applied to all organizational profiles and industries. Based on the organizational risk tolerance, they will then have the room to innovate while staying within their risk appetite, but at the same time complying with regulations. Industry-specific frameworks can also be developed to address specific threats with the respective domains such as healthcare, Critical National Infrastructure (CNI), and the like. a&s Middle East: Cybersecurity incidents can have far-reaching consequences, both economically and in terms of

www.asmideast.com

41


INTERVIEW

Human Firewall Program 2.0 calls for a national awareness score for every citizen that can be used in conjunction with their financial score when conducting business or engaging with government entities personal privacy. How can businesses and individuals in the Middle East be better educated and prepared to mitigate cyber risks, and what role should the industry play in this education? Sleiman: Educating and preparing businesses and individuals to mitigate cyber risks is a collective effort that involves various stakeholders including the government, the private sector, educational institutions, and industry associations. Some strategies to use in the Middle East to enhance cybersecurity awareness and preparedness include but are not limited to awareness campaigns like the Cybersecurity Awareness Month of October which is a worldwide event where organizations engage in awareness activities for their employees for a whole month. A country-wide awareness campaign can be run by the authorities to educate the public too. Such campaign ads can be run on TV and social media outlets. The Human Firewall Program is another awareness program that can be utilized by the government and private sector alike. It uses a risk-based approach to training and awareness by including some fun activities and keeping a score of all participating individuals by which you can objectively measure awareness. This concept was invented by me in 2014 and has been successfully used at KAUST and other organizations. The Human Firewall Program 2.0 calls for a national awareness score for each and every citizen that can be used in conjunction with their financial score when conducting business or engaging with government entities. Incident reporting platforms can also help in gathering data on common threats and provide an opportunity for educating the public on how to respond to such incidents.

42

www.asmideast.com

Proactive Strategies for Cybersecurity: Sleiman’s Recommendations a&s Middle East: Given the evolving nature of cybersecurity, what strategies do you recommend for organizations to develop proactive rather than reactive approaches to safeguarding their digital assets and sensitive information? Sleiman: Developing a proactive approach to cybersecurity is crucial for organizations to stay ahead of potential threats and safeguard their digital assets and sensitive information. There are several strategies that organizations can employ to shift from a reactive to a proactive cybersecurity stance. Risk Assessment and Management means that one should conduct regular risk assessments to identify vulnerabilities, threats, and potential impacts on the organization, develop a risk management plan to address identified risks and prioritize actions based on the level of risk. Next, you need to implement continuous monitoring solutions to detect and alert suspicious activities and anomalies in real time. This will allow for quicker identification and response to potential threats. Leverage threat intelligence feeds and platforms to stay informed about the latest threats and vulnerabilities. Utilize this intelligence to anticipate potential attacks and prepare accordingly. Develop and maintain an incident response plan to ensure a coordinated and effective response to cybersecurity incidents. Conduct regular drills and exercises to test and refine the plan. Provide ongoing security awareness training to employees to help them recognize potential threats such as phishing and social engineering. A well-informed staff can act as a first line of defense. Establish a robust patch management process to ensure that software and systems are updated promptly to address known vulnerabilities. You should also allocate resources towards sophisticated security technologies, including the implementation of machine learning and artificial intelligence, to proactively identify and address threats. Next, implement strict access control policies and use encryption to protect sensitive data both in transit and at rest. Conduct regular security audits and penetration testing to identify and fix security weaknesses before they can be exploited. Deploy Data Loss Prevention (DLP) technologies to monitor and control data transfer across the organization’s network. Engage with the Security Community by participating in industry groups, forums, and information-sharing platforms to exchange knowledge and learn from the experiences of others. Ensure compliance with relevant cybersecurity standards and regulations to maintain a strong security posture. Secure Development Lifecycle by integrating security into the development lifecycle of applications and systems to ensure that security is considered at every stage. Adopt a Zero Trust Architecture approach, which assumes that threats can come from anywhere, even within the organization, and requires verification at every step. Next, consider outsourcing certain cybersecurity functions to specialized firms or managed security service providers to benefit from their expertise and advanced tools. Finally, explore cybersecurity insurance options to mitigate financial risks associated with cyber incidents and be proactive about reactiveness. No matter how proactive you are, it’s not a matter of if, it’s a matter of when. So, proactively prepare a reactive plan to be executed when a major incident occurs.

a&s Middle East: Intersec serves as a platform for networking and knowledge exchange. What advice do you have for professionals looking to stay at the forefront of cybersecurity advancements and foster valuable connections in the field? Sleiman: My favorite quote is: “It is what learn after you know it all that counts”. I can’t stop learning and it’s a lifelong experience. Intersec is a great platform for

exchanging ideas and continuous learning by attending workshops and staying updated with the latest security trends, technologies, and best practices by previewing some of the exhibitors’ solutions. I advise security professionals to attend the conference and actively network with other professionals in the field and discuss the latest topics with peers, experts, and industry leaders. This is the best way to learn and grow. n


PRODUCTS & SYSTEMS

TECHMAN SOLUTION AND QATAR DATAMATION SYSTEMS

SECURING ICT AND CCTV PROJECT - HORTICULTURAL EXPO 2023 DOHA, QATAR Within the ambit of the Horticultural Expo 2023 in Doha, themed “Green Desert, Better Environment,” Techman Solution, in partnership with Qatar Datamation Systems, has achieved a significant triumph by securing a critical portion of the ICT and CCTV project n By: Mirsad Selimović editorial@asmideast.com This event, pivotal in advancing sustainable innovations and combating desertification, holds particular significance for Qatar in terms of inspiring visitors and the international community across themes such as Modern Agriculture, Technology and Innovation, Environmental Consciousness, and Sustainability. In the ICT segment, Techman Solution and Qatar Datamation Systems are entrusted with designing and constructing the entire Internet network infrastructure, encompassing LAN and wireless networks. The project entails establishing a high-quality network with a 99% availability guarantee, public Wi-Fi, and separate networks for participating countries and accredited individuals, essential for ensuring efficient communication and connectivity during the Expo. As for the CCTV segment, the team is responsible for installing intelligent cameras along the perimeter fence of the Expo 2023 Doha. These cameras monitor the area and are equipped with

intrusion detection capabilities, thus providing additional security at the event. The project was awarded through a competitive tender process organized by The Public Works Authority ‘Ashghal’. Techman Solution and Qatar Datamation Systems’ success in this tender highlights their technical expertise and ability to adapt to high standards of sustainability and innovation necessary for such a project. A representative of Techman Solution, Mr. Mirsad Selimovic, expressed enthusiasm and gratitude for the trust bestowed upon them, emphasizing the importance of the partnership with Qatar Datamation Systems. “This partnership and success in the tender symbolize our commitment to sustainable innovations. We anticipate that our contribution to the Expo 2023 in Doha will be a key factor in inspiring the global community towards innovative solutions.” The Horticultural Expo 2023 in Doha, under the theme “Green Desert, Better Environment,” offers Qatar an opportunity to demonstrate its commitment to promoting sustainability. The involvement of Techman Solution and Qatar Datamation Systems in this project underscores their capability to tackle sustainability challenges, offering solutions aligned with global sustainable development goals. n

www.asmideast.com

43


PRODUCTS & SYSTEMS

RIELLO ELETTRONICA GROUP

AVS ELECTRONICS UNVEILS „ULTRA“: THE PINNACLE OF INTEGRATED SECURITY SOLUTIONS Revolutionizing Security Systems with Cutting-Edge Integration and Functionality n Source: AVS Electronics editorial@asmideast.com Since 2003 AVS ELECTRONICS is part of RIELLO ELETTRONICA Group. Continuing growth and successful figures: this is Riello Elettronica, an expression of its entrepreneurial tradition aimed at innovation, global challenges, and the development of ‘Made in Italy’ technology in International markets. A group of global dimensions, based in Legnago (VR), with strong and continuous growth. Since 1974, AVS ELECTRONICS has been a leader in the electronic security market. We design ideas, we develop and manufacture electronic security products and solutions in our headquarters in Italy. We offer a complete range of products, wired & wireless, technologically advanced, unique, reliable, and guaranteed over time, to create well-being and safety in everyday life. Innovative, technological solutions, designed to be eco-sustainable.

International Group Technology and innovation have always been the values of AVS Electronics and Riello Elettronica, who have successfully established themselves in the Italian and International markets, remaining faithful to their roots, and expressing an entrepreneurial tradition anchored in the land.

Production “Made In Italy” In our quality lab, each electronic board is tested to make the product reliable and guaranteed over time, to comply with all the most important CERTIFICATIONS.

44

www.asmideast.com

Technical Assistance We are always by your side: from the design to the product selection, installation, and after-sales. A qualified Help Desk, constantly updated, offers telephone technical assistance every day, to satisfy any customer request.

Training We have always promoted training as a key element for the professional growth of our installers to satisfy the needs of the end user: we organize technical meetings and training courses on AVS products and systems at the AVS Headquarters and our customers’ premises.


PRODUCTS & SYSTEMS

Quality & Environment We are ISO 9001: 2015 certified for the Company Management System and ISO 45001:2018 for the Worker Safety Management System. We guarantee the quality of the production process, thanks to the application of precise operating procedures and the implementation of strict quality controls at all levels. Research & Development New ideas are born daily in our R&D department. Thanks to an internal team of Engineers, we can offer technological, safe, and intuitive solutions for the installers.

Technological Innovation Technological innovation is the basis of our corporate mission: the study of intrusion detection systems with original design, cuttingedge solutions, and technological reliability, appreciated in the European security market thanks to the ability to innovate and anticipate the market needs of installers and end users.

Introducing ULTRA, a groundbreaking integrated platform Based on many years of experience in the security market, AVS Electronics is increasingly oriented towards the FUTURE and innovation. AVS Electronics has identified what will be the trend in the coming years for a market whose users are more and more looking for solutions that, contrary to the past, are now increasingly oriented towards the INTEGRATION for all those technological solutions that can and must coexist for their daily comfort. AVS Electronics heralds the arrival of ULTRA, a groundbreaking integrated platform poised to transcend traditional security systems. ULTRA represents a convergence of cutting-edge technologies, offering a comprehensive solution that integrates Intrusion Protection, Smart Home Automation, Video Verification, Building Automation, Access Control, and Cloud functionalities. This innovative platform is designed to set new standards in safety and security across diverse sectors.

ULTRA is meticulously crafted to manage security zones ranging from 32 to 1000, supporting both wired and wireless setups, as well as IP or BUS configurations. Its versatility caters to a wide spectrum of environments, spanning from residential homes to industrial complexes, retail outlets, and hospitality establishments. At the core of ULTRA’s design philosophy is a user-centric approach. Equipped with T8 and T10 (8” and 10”) touchscreen keypads, ULTRA harmoniously blends aesthetic appeal with functional intuitiveness, reflecting AVS Electronics’ dedication to user-friendly solutions. For forward-thinking System Integrators and meticulous installers, ULTRA presents an exceptional opportunity. It offers unparalleled adaptability and functionality, redefining industry standards and exceeding expectations.

ULTRA by AVS Electronics: Redefining Security Integration Standards The platform seamlessly integrates with CCTV systems, encompassing IP zones and video verification with Onvif (S) cameras (from 30-30 cameras), and major NVR solutions for video verification. The system also supports video analysis alarm management and camera presence management (available for CCTV). Access Control features are effortlessly integrated with our own NFC readers, allowing for direct integration with biometric readers, and a/o server platform of some of the best-known brands in business. Supported functionalities include user biometric recognition, system ON/OFF, and output activation. ULTRA’s Video Intercom operates on the SIP protocol, enabling video calls accessible via touchscreen keypads T8 a/o T10 and the MyAVSAlarm app. In Smart Home functionalities, ULTRA enables environment management, electrical consumption monitoring, organization of overload priorities, temperature regulation, and control of motorized devices and lighting. Moreover, ULTRA includes a PSIM Supervision Platform, comprising AVS Electronics’ “Presidium Plus” software, designed for centralizing installations and displaying events on a graphical map. This software manages intrusion detection systems, communicates real-time status changes via an audio voice synthesizer, and streams live footage from associated IP cameras. The platform encompasses Cathexis, a comprehensive Video Management System (VMS) solution, WinGuard ADVANCIS, a Physical Security Information Management (PSIM) system known for its open integration platform, and C.G.C., a supervision software based on the SBI platform. Additional integrations cover Building Automation, allowing native integration of industrial protocols like ModBus, Nodered, MQTT protocols, and swift interconnection with third-party devices. ULTRA’s offerings also extend to comprehensive APP & SOFTWARE, simplifying platform management for enhanced user experience and convenience. n

www.asmideast.com

45


PRODUCTS & SYSTEMS

MONITOREAL

SECURE GUARD APP: A COMPREHENSIVE SURVEILLANCE SOLUTION ON THE GO

In a world where safety and security are paramount, Monitoreal is proud to announce the launch of the Monitoreal Secure Guard App, allowing its users to see what matters most in and around their properties, right from their pockets n Source: Monitoreal editorial@asmideast.com

Modern living demands modern solutions, and the Monitoreal Secure Guard App is designed to meet the needs of individuals and businesses alike. This all-in-one, comprehensive surveillance app offers on-the-go accessibility, making it easier than ever to protect your property and loved ones using your existing Monitoreal devices and ecosystem.

Why Choose the Monitoreal Secure Guard App? Monitoreal is a trusted name in surveillance technology, known for its high-quality hardware and software solutions that have secured homes and businesses using AI-powered video analytics for years. With the Monitoreal Secure Guard App, that same level of excellence is now available for your smartphone or tablet.

Key Features Monitoreal offers a range of features that start with live streaming with which

46

www.asmideast.com

you can watch real-time video feeds from your connected security cameras, ensuring flexibility and ease of monitoring. With multi-camera views, you can switch between various camera views at different locations to gain a holistic perspective of all monitored areas from a single screen. You can also receive in-

stant alerts in the event of suspicious activity and customize your alert preferences to filter out false alarms, ensuring you’re always in the know when it matters. The relay reactions feature allows you to trigger connected accessories such as smart lights, alarms, sirens, strobes, gates, and Bluetooth speakers


PRODUCTS & SYSTEMS

now, you can secure your world, one tap at a time.

About Monitoreal Monitoreal is a global provider of intelligent home security surveillance systems. Monitor your surroundings in real time with our AI-based smart object detection. Receive customizable alerts when people, cars, and objects move in the areas that matter most. Prevent intruders by triggering smart audio and light accessories, using rules that protect your home no matter where you are. Turn your existing or new security cameras into powerful surveillance with Monitoreal, even if they’re low-resolution, under poor lighting, or are placed at a dis-

based on predetermined detections that can deter potential intruders. For 24/7 monitoring, you can access securely stored archived footage on-premises, giving you the ability to review or share clips at any time. Next, Monitoreal’s smart analytical tools powered by AI differentiate between normal and suspicious activities, reducing the occurrence of false alarms. Moreover, you can control the security system remotely, arm or disarm it, control camera angles, and manage other smart home devices right from the app. Finally, Monitoreal’s userfriendly interface is designed with the user in mind, ensuring easy navigation for users of all tech-savviness levels.

Getting Started is Simple The app is accessible on both iOS and Android platforms. To begin, you can either sign in using your existing Monitoreal account or create a new one, making it easy for both returning and new users to get started. Next, you can connect devices by seamlessly and securely syncing the app with your Monitoreal hardware using a QR code system. Once connected, you can customize your settings, allowing you to tailor your preferences for alerts, cam-

era views, and more. With these settings in place, you are now ready to start monitoring what matters most to you wherever you go.

Security Never Sleeps, Neither Should Your Surveillance Whether you’re traveling, at the office, or simply away from your monitored space, the Monitoreal Secure Guard App ensures that you’re never more than a tap away from peace of mind. Take control of your security like never before, with a robust, flexible, and reliable surveillance solution right in the palm of your hand.

Ready to Take the Next Step? You can download the Monitoreal Secure Guard App today and transform your surveillance experience. Your world may be constantly changing, but with Monitoreal, your security remains uncompromised. With the Monitoreal Secure Guard App, you stay connected, stay secure. By downloading it

tance. Founded in 2018, Monitoreal is a privately owned company headquartered in Cyprus, Europe, and operates globally. Our devices are designed and assembled in the EU. n

www.asmideast.com

47


PRODUCTS & SYSTEMS

ASSA ABLOY

A CLIQ GO KEY SYSTEM SIMPLIFIES ACCESS CONTROL FOR SMALL BUSINESSES CLIQ Go key-operated access management is built to make security easier for small and medium-sized businesses (SMBs). It also offers a new way for locksmiths and business managers to work together for mutual benefit n Piše: Thomas Schulz, EMEIA Product Marketing Director, ASSA ABLOY thomas.sculhz@assaabloy.com In a typical SMB, the budget will not stretch to a security department or a dedicated facilities manager. Yet security demands and key management hassles are no different to those faced by a multinational. CLIQ Go helps businesses improve their security and manage access efficiently without stress. The system includes mobile access management from the dedicated CLIQ Go smartphone app. “We designed CLIQ Go to be fast to install, as well as easy to use and administer,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEIA. “As a company, we have a long heritage in inventing and manufacturing key-based locking systems, both electronic and mechanical. CLIQ Go is another milestone in a long line of ASSA ABLOY innovations.”

Access management made easy Three basic components make up a CLIQ Go system. Doors and other types

48

www.asmideast.com

of opening are secured by a range of wireless locking cylinders. Site users unlock with a programmable CLIQ key. For convenience, one key carries all their individual access permissions.

Finally, a business director or admin assistant can manage everyone’s access electronically from a personal computer with desk programmer or on the move, via the dedicated smartphone application.


PRODUCTS & SYSTEMS

CLIQ cylinders fit any type of interior or exterior opening. Because each programmable CLIQ locking cylinder is powered by the battery inside every programmable key, it can be quickly deployed without cabling or mains power. An installer simply swaps out the existing cylinder for the CLIQ device – it needs a simple 1 screw change. The CLIQ Go app manages the locking system from anywhere and provides the security admin higher flexibility. If a new employee needs server room access, for example, it is simple to make changes in-app and send new permissions to the system via the cloud. Issuing, revoking or amending a user’s access rights is straightforward. “CLIQ Go transforms your phone into the security team for a powerful access system,” adds Stephan. “Your premises are safer because keyholders only get into specific rooms or at certain times.

All unlock events are logged, making incident investigations faster.”

Time-saving for businesses, new revenue for locksmiths CLIQ Go also gives small businesses the opportunity to draw on the expertise of a local locksmith or security partner —

helps locksmiths keep keys and cylinders in stock. To manage a business’ system, the locksmith simply programs and configures a new key using CLIQ Express software. Permissions are sent to the business via the cloud. “Partnering with SMB clients in this way offers resellers an additional revenue

CLIQ Go helps businesses improve their security and manage access efficiently without stress. The system includes mobile access management from the dedicated CLIQ Go smartphone app and save even more security management time. To keep setup simple, there’s no software installation at the client end. A single mechanical coding for all systems

stream: issuing, programming and dispatching new keys on demand,” explains Stephan. “For locksmiths looking to future-proof their expertise, CLIQ Go is a smart way to support SMB clients.” n

www.asmideast.com

49


EVENTS

INTERSEC SAUDI ARABIA

INCREDIBLE GROWTH OF INTERSEC SAUDI ARABIA MARKS SUCCESSFUL RETURN TO LIVE EVENTS The first live Intersec Saudi Arabia in two years exceeded expectations, with attendee numbers growing both domestically and internationally n By: Mirza Bahić editorial@asmideast.com

The fourth edition of Intersec Saudi Arabia 2022 from 13-15 September marked a triumphant return to Saudi Arabia for the first time since 2019. More than 150 exhibitors from 22 countries appeared at the Riyadh International Convention & Exhibition Center (RICEC) and welcomed 9,836 visitors from 48 countries, more than double the visitors from the previous edition (2019). Intersec Saudi Arabia 2022 brought together key players in the security industry in the largest and fastest-growing market for security, safety, and fire protection in the Middle East. The country’s increasing opportunities are clearly recognized globally, as the number of attendees from Europe at Intersec Saudi Arabia grew an astounding 630% from 2019. Perhaps as importantly, it is clear that the event is the ideal platform to do business and remain at the forefront of the burgeoning market in the Kingdom and across the region. Of the almost ten thousand trade visitors that attended Intersec Saudi Arabia 2022, 77% had purchasing responsibility or influence over the pro-

curement process, while 78% initiated discussions with new suppliers during the exhibition. His Excellency Mr. Mohammed Abdullah Al Marshed, Vice Chairman of the Board of Directors; Chairman of, the Real Estate Committee of the Riyadh Chamber of Commerce and Industry, and Intersec Saudi Arabia’s patron, said “Intersec Saudi Arabia has always been a beacon of the safety and security industry in the Kingdom. The growth of the 2022 edi-

The number of attendees from Europe at Intersec Saudi Arabia grew an astounding 630% from 2019 50

www.asmideast.com

tion, and the response from exhibitors and visitors, reflects the growing market and the values of Saudi Vision 2030.”

Showcasing Innovation, Success, and Industry Influence in the Kingdom Exhibitors at Intersec Saudi Arabia 2022 presented products and innovations in market sectors including commercial & perimeter security, cybersecurity, homeland security and policing, fire and rescue in addition to safety and health. In addition, the power of Intersec Saudi Arabia as a platform for business is illustrated by the experiences reported by visitors. 98% of trade visitors stated


EVENTS

rity conference, presenting the industry’s most comprehensive showcase to date, featuring government leaders, agencies, organizational heads, world-class speakers, government stakeholders, policymakers, law enforcement, civil defense, and private sector players.

Growth in exhibitors and attendees

that they had achieved their objectives by attending the event, either completely or partially, while 95% of visitors said they were satisfied or very satisfied with

their experience of Intersec Saudi Arabia 2022. In addition to the exhibition, Intersec Saudi Arabia 2022 featured a three-day secu-

Alex Nicholl, Intersec Saudi Arabia’s Show Director, said: “The successful return of Intersec Saudi Arabia has reinforced our belief that the Kingdom offers unparalleled market opportunities.” He continued “The incredible response from the industry truly demonstrates the importance both of live events and also of the security industry in the Kingdom. The growth in both exhibitors and attendees since 2019 is a testament to this, as well as the growth of the market in Saudi Arabia.” Intersec Saudi Arabia 2022 was held in participation with Saudi Civil Defense and supported by leading industry organizations National Security Services Company “SAFE” (Strategic Partners) and NAFFCO, Hikvision, and TeknowareNetix (Platinum Sponsors). Intersec Saudi Arabia will return to RICEC from 3-5 October 2023. Messe Frankfurt Middle East is the world’s leading organizer for security, safety, and fire protection exhibitions under the Intersec and Secutech brands. Intersec Saudi Arabia is organized by Saudi-based Al-Harithy Company for Exhibitions (ACE) Group under a license from UAE-headquartered Messe Frankfurt Middle East. n

www.asmideast.com

51


EVENTS

20 YEARS OF ISE

ISE 2024 HIGHLIGHTS KEY TECHNOLOGIES FOR BUILDING AUTOMATION AND SECURITY SOLUTIONS ISE 2024 takes place at the Fira Barcelona Gran Via from 30 Jan – 2 Feb 2024. This special 20th anniversary edition is set to be the biggest event yet, as ISE celebrates two decades of pro AV and systems integration excellence n By: Mirza Bahić editorial@asmideast.com

Since it began in 2004, Integrated Systems Europe (ISE) - the world’s premier exhibition for professional audiovisual (pro AV) and systems integration - has grown in size, strength and influence to become an industry-defining event. Every year, ISE brings together professionals, innovators and thought leaders across multiple industry sectors from around the world.

Celebrating 20 Years of Innovation Recognized as the world’s leading AV and systems integration exhibition, ISE’s journey from its humble beginnings in Geneva, to becoming the definitive event it is today has been a remarkable success story. Over the past two decades, ISE has served as a catalyst for groundbreaking technological advances, fostered meaningful connections and dialogue and propelled the systems integration industry to new heights. “This special 20th anniversary edition of ISE will be our biggest ever event, with an expanded show floor which is already 17% bigger than last year, two new halls, over 80 new exhibitors currently confirmed and several special

52

www.asmideast.com

Registration for ISE 2024 is open from 5 October 2023. Readers of a&s Adria can secure FREE registration for ISE 2024 using this code: asadriamag features and attractions to mark the occasion, including an Anniversary Treasure Hunt. We also are planning a number of special activities throughout Barcelona, including extending our partnership with the Barcelona Llum lighting festival – watch out for more news in the coming weeks,” said Mike Blackman, Managing Director at Integrated Systems Events.

Residential & Smart Buildings Zone A key sector for ISE is smart buildings, which continues to evolve as expectations for wellness tech, greater connectivity, efficient use of energy and integrated technologies grow. ISE’s Residential & Smart Building Zone in Hall 2 is a major feature, highlighting the la-


EVENTS

test solutions for creating comfortable and secure smart buildings. Technologies in this specialist area include building automation, security and surveillance, access control, room booking, remote monitoring and management software, audio, and lighting control. Visitors to this zone can find everything required for a fully integrated smart building. The eight Technology Zones at ISE 2024 provide visitors with the full spectrum of Pro AV and systems integration required for every application, including Lighting & Staging (Hall 1), Residential & Smart Building (Hall 2), Unified Communications & Education Technology (Hall 2), Multi-Technology (Halls 3, 4 & 5), Content Production & Distribution (Hall 4), Digital Signage & DooH (Hall 6), Audio (Hall 7), Plus ISE Sound Experience with Audio Demo Rooms in Hall 8.0.

Conference Program Attendees can also look forward to a host of immersive demonstrations, insightful speakers and inspiring panel discussions, with eight specialist conferences taking place during the show. Now in its 10th year, the Smart Building Conference returns on Tuesday 30 January as part of ISE’s comprehensive conference program. This full-day conference is designed for professionals working in the built environment. Hear from building engineering consultants, corporate real estate executives, architects, master systems integrators, IT/AV system houses and more. With smart building case studies and presentations from leaders of the latest technology solutions for inside smart buildings, smart homes and smart offices. The Control Rooms Summit also takes place on Tuesday 30 January and is ideal

for security professionals working across a wide range of vertical markets including utilities, transportation, government and public services.

Barcelona LLUM Festival Away from the show floor, take the opportunity to explore the beautiful city of Barcelona in a completely different way at Llum BCN, a festival of the light arts, sponsored by ISE. Head out after dark in the urban Poblenou neighborhood as it is transformed with light projections, installations, and light sculptures by contemporary artists.

The biggest ISE yet Registration for ISE 2024 is open from 5 October 2023. Readers of a&s Adria can secure FREE registration for ISE 2024 using this code: asadriamag. n

www.asmideast.com

53


EVENTS

INTERSEC DUBAI 2024

25-YEAR MILESTONE EDITION WITH A RECORD NUMBER OF EXHIBITORS The silver jubilee edition of Intersec 2024 will be the largest ever, with increased support from key UAE Government bodies n By: Mirza Bahić editorial@asmideast.com

Intersec 2024 is to commemorate a 25-year milestone edition in the region with a record-high number of exhibitors. Exhibitor numbers will be 20% higher than in 2023, reinforcing the importance of safety, security, and fire safety technology in the MENA region.

Anticipating a 20% Increase in the Number of Exhibitors The organizer of Intersec 2024, the world’s leading trade fair for safety, security, and fire protection, is preparing to host the largest edition in the show’s 25-year history. Taking place from 1618 January 2024 at Dubai World Trade Centre (DWTC), under the theme of ‘Innovating security tech for a quarter century’, the exhibition is expecting a remarkable 20 percent year-on-year increase in international exhibitor participation, and more than 45,000 trade visitors from around the world traveling to attend the event. Held under the patronage of His Highness Sheikh Mansoor Bin Mohammed bin Rashid Al Maktoum, the silver jubilee edition of Intersec will host 1,000 exhibitors from more than 60 nations, with around a quarter of these appearing for the first time. Occupying 13 halls at DWTC, the exhibition signifies a 20 percent growth compared to 2023, reaffirming its status as a critical networking hub for global security, safety, and fire protection industries. Uniting buyers,

54

www.asmideast.com

The exhibition is expecting a remarkable 20 percent year-on-year increase in international exhibitor participation, and more than 45,000 trade visitors sellers, and decision-makers, Intersec provides a dynamic nexus for networking, deal-making, and the global unveiling of cutting-edge technology and innovations in Dubai. In particular, every element of Intersec is affiliated with the relevant UAE government entities, demonstrating the commitment of the UAE Government to these important industries. Dubai Police and the Security Industry Regulatory Authority (SIRA) are affiliated with the security sector; Dubai Civil Defence with the Fire & Rescue element of Intersec; while Dubai Municipality supports the safety

sector and the Cyber Security Council and Dubai Electronic Security Center (DESC) underscore the importance of the cyber sector.

Innovation and Digital Security under the Spotlight This year, innovation and digital security will take center stage at Intersec 2024 as security and safety professionals from around the world look to collaborate, innovate, and actively seek new technologies to meet the industry’s rapidly changing needs.


EVENTS

Alex Nicholl, Group Commercial Director at Intersec organizer Messe Frankfurt Middle East, said: “With two months to the largest edition of Intersec, we look forward to providing a platform for bringing the leading industry players together for three days of discovery, networking, knowledge sharing and most of all, driving the industry forward.”

Nurturing Industry Progress through Comprehensive Conference Programs In addition to exhibitor showcases, Intersec 2024 will continue to set the stage for a safer and more secure world with the return of its high-impact conference programs, including the ex-

This year, innovation and digital security will take center stage at Intersec 2024 clusive Security Leaders’ Summit (ISLS) exploring trends in sustainable security and geopolitical risk intelligence, the Cyber Security Conference, hosted by the UAE Cybersecurity Council, delving into metaverse security and Zero Trust Architecture, and the Safety & Health Conference emphasizing workplace safety and well-being. Meanwhile, the Fire & Rescue Conference, hosted by Dubai Civil Defense, will discuss strategies and best practices across topics such as emergency response planning, fire safety and compliance, and community engagement. At

the same time, the Thought Leadership Pavilion, hosted by the Access Control Executive Brief, will address a range of topics across a central theme of the future of the access control and smart lock industry. “These conferences and workshops serve as the intellectual heartbeat of Intersec, providing a platform where pressing issues are dissected, innovative solutions are unveiled, and the seeds of progress are sown,” added Nicholl. The event’s diverse features encompass the Drone Threats & Counter Measures Workshop, the Emergency Crisis Management & Communication Workshop, live demonstrations in the Attack Zone, a catwalk show of industrial safety gear at the Safety Walk, and the Future Defenders Hack Arena, for students and professionals. Moreover, the Intersec Awards will recognize outstanding achievements across key sectors, and The Premium Club will provide a key networking program for industry professionals. The 25th edition of Intersec will encompass five broad product sections: Commercial & Perimeter Security, Homeland Security & Policing, Fire & Rescue, Safety & Health, and Cyber Security, offering tailored solutions for each industry segment under one roof. n

www.asmideast.com

55


EVENTS

ADRIA SECURITY SUMMIT 2023

SOARING ON DRAGON’S WINGS TO SUCCESS The most successful Adria Security Summit Powered by Intersec has closed its doors in Ljubljana. Behind them, it left a trail of record-breaking figures in all categories: with its 150 exhibitors, 2800 guests from 43 countries, and 5000 held meetings, the Summit confirmed its position as a leading regional event for the exchange of knowledge, innovation, and business opportunities in the world of security and beyond n By: Mirza Bahić editorial@asmideast.com Let’s start the story of this year’s Summit with an anecdote that we opened this year’s event with a four-legged robot and a dragon. The robotic guard dog was the messenger of the future of the industry that we are dedicated to, while we adopted the Ljubljana Dragon, the symbol of this city, as the informal mascot of this year’s Summit. From the robodog, we borrowed the symbolism of loyalty to the idea of promoting security, while the Dragon was the source of strength to turn that loyalty into an extremely successful event with the largest turnout of guests from all over the world in its history.

In Prestigious Company: Among the Security 50 Elite and Premier Regional Exhibitors We proudly hosted no fewer than 150 exhibitors at this year’s Adria Security Summit, marking the largest number of participants ever. More importantly, the event welcomed 10 security companies from the prestigious Security 50 list of the world’s best market players (Hikvision, ASSA ABLOY, Nedap, Suprema, ZK Teco, Uniview, Avigilon by Motorola Solutions, etc.), as well as the cream of the crop in regional companies such as Alarm au-

tomatika, Akoda +, CreaPlus, Eccos Inženjering, Tenzor, Systeh, TRS, and others. This impressive figure confirms the growing reputation and importance of our event in the security industry and beyond.

A Regional Event with Global Impact and RecordBreaking Attendance The numbers once again served as an illustration of the fact that this year’s Summit, with a record 2,800 guests from 43 countries, recorded a 12% increase in the number of visitors compared to the high 2,500 from last year’s gathering in Zagreb. It is important to note that al-

The Summit served as a versatile platform for business networking on the spot, with a record 5,000 meetings held, attended by an impressive 38.06% of senior management representatives 56

www.asmideast.com

most 17% of them came from outside the region, which leads to the conclusion that the Summit has quietly outgrown its regional uniform and dressed in a new international outfit. Thus, the Gospodarsko Razštavišče venue opened its door to guests with travel documents from Great Britain, the United States of America, Cyprus, Bulgaria, the Netherlands, China, Turkey, Germany, Austria, Ireland, Italy, the Czech Republic, Spain, Norway, Canada, Romania, Israel, France, Poland, Latvia, Estonia, Denmark, Sweden, Belgium, Ukraine, Hungary, Greece, Egypt, United Arab Emirates, Finland and Taiwan. In the regional segment, the structure of guests clearly reflects the regional recognition of the Summit and the expressed interest of the participants to use it as a bridge for establishing cooperation with the rest of the world. The largest number of guests comes from Croatia and the host country Slovenia, with shares of 22.23% and 20.71% respectively. Bosnia


EVENTS

and Herzegovina, Serbia, and North Macedonia are also significantly represented, with 12.28%, 17.57%, and 8.66%.

Almost 40% of the participants are the highest-ranked company representatives Adria Security Summit 2023 proved to be a rock-solid axis for connecting professionals from different sectors, with a dynamic structure of participants that emphasizes the event’s inclusive approach to security and related industries. This year, the Summit served as a versatile platform for business networking on the spot, with a record 5,000 meetings held. The event was attended by an impressive 38.06% of senior management representatives and executives, which is an indication of the attractiveness of the event among the highest decision-makers in the security sector and related industries. Regional or national sales and distribution executives, managers, and staff made up a significant 21.58% of attendees. The “technical” segment of the profession at the Summit was not neglected either, with 17.83% of participants representing engineers, experts, and developers. The middle level of management, which consists of managers of key clients, projects, and business development, made up 15.68% of those present.

This year’s Summit with a record 2,800 guests from 43 countries recorded a 12% increase in the number of visitors compared to the high 2,500 from last year’s gathering in Zagreb The Summit as a Mirror of Industry Evolution Adria Security Summit as a concept was developed from the beginning as a dynamic mirror of industrial trends which, among other things, are reflected in the representation of participants with the entire range of products and verticals from which they come. Video surveillance solutions continue to hold a prominent place at the Summit, with 18.03% of the exhibition space dedicated to them. Unsurprisingly, video surveillance is followed by cyber security solutions (10.19% of exhibitors), which is a reconfirmation of the Summit’s role as a messenger of the industry trends, which, today, put an increasing focus on protecting digital assets and systems from cyber threats. Another surprise at the Summit was the high representation (10.61%) of fire alarms, smoke, and gas detection equipment, and solutions for fire protection and evacuation. This category has shown the all-time relevance of dedication to fire protection and the need for the best possible response to emergencies that follow people practically from the moment the first fire is lit. Access control and time & attendance systems, with their 8.20% represen-

tation, had standard good visibility, and together with anti-burglary and accompanying alarm systems (9.52%), they make up an important piece of the security pie that industry representatives still rely on today. This spectrum is closed by mechanical security (4.21%) and perimeter protection systems (5.32%), which are indicators of the permanent importance of the combination of “old-school” technical security and new technological solutions for everyone who is looking for a holistic approach to the protection of life and property at the Summit. Other significant sectors include smart homes and cities and automation solutions (6.80%) which are equally represented by the IT/ICT industry (7.71%) as a relatively new but nowadays inevitable part of the security, IT, and communication landscapes of modern living and business. Finally, many verticals collectively covered 9.49% of the exhibition segment and they include communications and transportation, manufacturing, construction and architecture, retail and distribution, banking/finance, hospitality, education, oil and gas, healthcare, mobility, the housing sector, and pharmacy.

Ahead of Sarajevo 2024 Event Before returning to Sarajevo, the place where the Adria Security Summit took its first steps on the way to becoming the largest regional industrial event of its type back in 2015, the organizers face the important but also sweet challenge of surpassing everything achieved so far, and to the satisfaction of all participants without which this road to success would be longer and thornier. n

www.asmideast.com

57


Key Security Events in 2023/2024 Key Security Events in 2023

NOV

JAN

SICUREZZA, International Security & Fire Exhibition 15-17 November 2023, Rho Fiera Milano, Italy

INTERSEC DUBAI 16-18 January 2024 Dubai, UAE

https://www.sicurezza.it

https://intersec.ae.messefrankfurt.com

JAN Integrated Systems Europe 30 jan – 2 Feb 2024, Barcelona, Spain

MAR Light + Building 3-8 March 2024, Frankfurt, Germany

C

M

Y

https://www.iseurope.org

https://light-building.messefrankfurt.com

CM

MY

CY

MAR

MAR

World Police Summit 5-7 March 2024, Dubai, UAE

ASIS Europe 20-22 March 2024, Vienna, Austria

https://www.worldpolicesummit.com

https://asiseurope.org

APR

APR

ISC West 9-12 April 2024, Las Vegas, USA

GISEC Global 23-25 April 2024, Dubai, UAE

https://www.discoverisc.com

https://www.gisec.ae

58

www.asmideast.com

CMY

K


www.asmideast.com

59


Market & Contacts Bosch empowers you to build a safer, more secure and enjoyable world

TECHNICAL PROTECTION

Robert Bosch Middle East FZE Address: DAFZA, Block A701, West wing 5, Dubai Airport Free Zone, Dubai, United Arab Emirates Tel.: +971 4 212 3300

www.boschsecurity.com

Honeywell Commercial Security offers integrated security solutions within: * Video Surveillance * Access Control * Intruder Detection both as standard and cloud based systems. Contact: Dubai: +971 4 4505 800 Abu Dhabi: +971 2 2349 101 https://www.honeywell.com/ae

The world leader in access control, time & attendance and biometric solutions

1 m.shenawy@supremainc.com) Tel: +971 4 2357 996 www.supremainc.com

Advancis Middle East P.O. Box 73309 Abu Dhabi, United Arab Emirates Tel. +971 2 444 2503 Email: info@advancis.ae Web: https://advancis.net

The global leader in door opening solutions

IP Solutions

Vendor-neutral Physical Security Information Management (PSIM)

CCTV Products

Dahua Technology Co., Ltd.

1187 Bin’an Rd., Binjiang, Huangzhou, Zhejiang 310053, China Tel: (86-571)8768 8883, 2893 9666 | Fax: (86-571)8768 8815 Email: overseas@dahuatech.com | www.dahuatech.com

60

www.asmideast.com

www.optex-fa.com

ELECTRONIC LOCKING SOLUTIONS FOR HOSPITALITY Tel.: +34 943 344 550 Email: hospitality@saltosystems.com www.saltohospitality.com

www.hikvision.com

Magazine Topics Man Guarding Technical protection • Video surveillance • Access control • Intrusion detection • Item theft protection • IP and network solutions • Perimeter protection • Fire detection • Gas detection Mechanical protection Cash/valuables-in-transit Cyber security Digital forensics Software solutions Smart home Internet of things Security management Investigations Building management Market research Legislation and standards

Indoor intrusion sensors Outdoor beam sensors Outdoor intrusion sensors Vehicle detector for gate and parking systems People counting

Video surveillance products and solutions

United Arab Emirates Qatar Egypt Saudi Arabia info.me.open@assaabloy.com www.assaabloy.com/ae

A global player in sensing technologies

Public safety, public communication and public space design

Publi comm publi

TOA Electronics Europe GmbH www.toa.eu marketing@toa-eu.com +49 (0)40 25 17 19 0

TOA E m


Discover why AxisGo is ideal for protecting smaller sites

The powerful, flexible, single-loop fire panel Designed to be fast to fit, quick to configure and easy to use, AxisGo saves install time whilst bringing you complete peace of mind that your singlepanel site has the highest levels of fire protection.

Offering cost-effective access to popular premium features from our Axis EN range in a simpler, nonnetworkable format, AxisGo provides powerful protection for a wide range of smaller sites. Packed with future-proof technology and flexible features – including false alarm management, built-in zonal LEDs and a handy service tool – AxisGo’s ready to become your Go-to!

Creating a safer future Advanced – made in the UK. Trusted around the world. Discover more: advancedco.com | enquiries@advancedco.com | +44 (0)345 894 7000

www.asmideast.com

61


Index of Advertisers PAGE

ADVERTISER

COUNTRY

E-MAIL

WEBSITE

PRODUCTS AND SERVICES 61

ADVANCED

GREAT BRITAIN enquiries@advancedco.com

www.advancedco.com

3

ASSA ABLOY

SWEDEN

info@assaabloy.com

www.assaabloy.com

7

BOSCH FIRE ALARM SYSTEMS

GERMANY

onur.sonmez@tr.bosch.com

www.bosch-middleeast.com

11

HID GLOBAL

USA

sinenhlanhla.gumede@hidglobal.com

www.hidglobal.com

9

HUAWEI

CHINA

EUsupport@huawei.com

www.huawei.com

15

SIRA

UAE

info@sira.gov.ae

www.sira.gov.ae

2

TECHMAN SOLUTIONS

QATAR

info@techman-solutions.com

www.techman-solutions.com

5

VIVOTEK

TAIWAN

hasan.kiran@vivotek.com

www.vivotek.com

OTHER 59

ASMAG

TAIWAN

info@taiwan.messefrankfurt.com

www.asmag.com

63

INTEGRATED SYSTEMS EUROPE

SPAIN

cs@iseurope.org

www.iseurope.org

21

INTERSEC DUBAI

UAE

intersec@uae.messefrankfurt.com

www.intersecexpo.com

64

ISNR

UAE

info@idexuae.ae

https://isnrabudhabi.com

Magazine Topics Man Guarding Technical protection • Video surveillance • Access control • Intrusion detection • Item theft protection • IP and network solutions • Perimeter protection • Fire detection • Gas detection Mechanical protection Cash/valuables-in-transit Cyber security Digital forensics Software solutions Smart home Internet of things Security management Investigations Building management Market research Legislation and standards 62

www.asmideast.com


Join us at ISE 2024.

Your Destination for Innovation.

Defining, shaping and driving the industry for 20 years. ISE is the world’s largest AV and systems integration exhibition – for two decades we have helped the industry to connect, collaborate and create. Join us in 2024 and be inspired to innovate.

A joint venture partnership of

Fira Barcelona | Gran Vía 30 Jan - 2 Feb 2024 Get your FREE TICKET Register with code: asadriamag iseurope.org

www.asmideast.com

63


64

www.asmideast.com


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.