a&s Middle East No.2

Page 1

Interview

Alex Lapirov, Microavia

AI in Video Surveillance

Multisensor Cameras

Cyber Security

Ally or Weak Link in Cyber Defense?

False Alarms in Intrusion Detection

www.asmideast.com March/April 2023 2
3 www.asmideast.com Unlock savings of up to 80% with Aperio® wireless access control* Cut your costs – and do your bit without doing a lot. *See the full calculation and Download our free Solution Guide:

If you thought that once you have determined that an alarm is false, you can breathe a sigh of relief, think again. Even without a real threat, every false alarm is a source of frustration, costs for the user and the authorities, as well as damage to the reputation of the manufacturer.

50 ChatGPT as a Security Phenomenon

Ally or Weak Link in Cyber Defense?

52 Second World Police Summit Held in Dubai

A Step Towards a Global Platform for Combating High-Tech Crime

54 The Security Event 2023 Designed by The Industry, for The Industry

4 www.asmideast.com PRODUCTS & SYSTEMS 40 AI in Video Surveillance Multisensor Cameras Become More Powerful Than Ever 44 Smart Investments in Security Bollards for More Advanced Storefront Safety 46 Vision Object Analytics Unlocking the Potential of Next-Generation Technology 47 Advanced Middle East Distribution FZCO Project-Based Solution Tailored for Your Needs 48 Case study - Iris Recognition Providing Safety and Security at World’s Foremost Particle Physics Laboratory
INTERVIEW
INTERVIEW
IN FOCUS
False Alarms in Intrusion Detection New Technologies for Agile Security without Expensive Mistakes 2 Issue False Alarms in Intrusion Detection 22 EVENTS
14 Alex Lapirov, CEO, Microavia
32 Hanchul Kim, CEO, Suprema
22
INSIGHTS
MARKETS
New Business
Moving From Competitive Barriers to Cooperation
38
Models
5 www.asmideast.com Visualize Your Smart Factory VIVOTEK’s Factory Solution Incident notification is a critical factor in the management of any factory. To make operation easier, VIVOTEK provides accurate, visualized, and real-time event notification of all things a factory manager needs to know of. This facilitates and optimizes accident prevention, human protection, operation management and more, all in VIVOTEK factory solution platform. For more info contact www.inteleye.sa | info@inteleye.sa Tel: +966 920033372 | Mobile: +966 540413960 Inteleye, Platinum Tower, Sari Street, Al-Faisaliah, Office #305B, Jeddah, Saudi Arabia

EDITOR‘S

Professional media for complete security solutions

Management

Mahir Hodžić, General Manager mahir.hodzic@asmideast.com

Adis Hodžić, CEO adis.hodzic@asmideast.com

Editorial Staff

Damir Muharemović, Editor-in-Chief damir.muharemovic@asmideast.com

Orhan Hadžagić, Associate Editor orhan.hadzagic@asmideast.com

Emily Lin, Contributing Editor Emily.Lin@taiwan.messefrankfurt.com

Mirza Bahić, Journalist editorial@asmideast.com

Nermin Kabahija, Journalist editorial@asmideast.com

Art Staff

Sanel Palislamović, Art&Design Editor sanel.palislamovic@asmideast.com

Nelmedin Kolubara, DTP&Art Design dino.kolubara@asmideast.com

Sales

Amar Pap, Business Development Manager amar.pap@asmideast.com

International Sales

Israel Gogol, International Sales Director Israel.Gogol@taiwan.messefrankfurt.com

a&s Middle East offers the latest news and insights on video surveillance, access control, intrusion detection, fire alarm, mechanical protection, man guarding, cyber security, artificial intelligence, IoT, big data, smart homes and buildings, industrial automation, information, communication technology to Middle East region professional channel players.

a&s Middle East is part of the media network of the Messe Frankfurt Ltd – Taiwan Branch, which offers several media platforms — asmag.com and a&s magazines, published in English, traditional Chinese, and three other languages, providing the most comprehensive industry trends, product, and supply chain information. The total annual circulation is approximately 515,000 copies around the globe.

a&s Middle East is published 6 times a year, Jan/Feb, March/ April, May/June, July/August, Sept/Oct, and Nov/Dec.

Payment Instructions

Annual subscriptions are payable in USD, EUR, or AED. Subscription inquiries per your request.

EUR: AE340400000653005131002

Account No. 0653005131002

USD: AE070400000653005131003

Account No. 0653005131003

AED: AE610400000653005131001

Account No. 0653005131001

Copyright Statement © Copyright by Privus Agency Ltd. All rights reserved. Any republication, copying, redistribution, or reproduction of the magazine in any form, including electronic, without the prior written consent of the publisher, is prohibited. Advertisers are solely responsible for the content of advertising material. The publisher bears no responsibility regarding possible legal, patent, content, or brand disputes of the advertiser.

Legal disclaimer

The information in this magazine has not undergone any formal testing by Privus Agency Ltd. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While this information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments.

Corporate Address

Privus Agency FZ-LLC

JT010006, Al Shohada Road, Ras Al Khaimah, UAE Tel: +971 58 983 4258

Web: www.asmideast.com

Marketing: marketing@asmideast.com

Second Time’s the Charm

Welcome to the second edition of our a&s Middle East magazine. In line with our quest to stay at the cutting edge of all things security, we want our second time to be the charm. Our main topic, false alarms in anti-intrusion, will give you an array of solutions to this age-old security problem. We will explore the causes of false alarms in anti-intrusion and provide insights into the latest technological solutions to reduce their occurrence.

We will also delve into the importance of multisensor cameras and how they can enhance the security of your organization. With their ability to capture multiple types of data, including video, audio, and thermal imaging, multisensor cameras can provide a more comprehensive view of your environment, which is crucial in preventing and responding to security incidents.

Furthermore, we have two exclusive interviews – one with the CEO of Suprema, a global leader in security and biometrics, and the other with the head of Microavia, a Dubai-based rising star in the world of drones. Both interviewees will showcase the best practices of their companies and offer valuable lessons for organizations looking to improve their security posture.

We hope that this edition will provide valuable insights into the latest security trends and practices, and help you better protect your assets, employees, and users in the Middle East and beyond. Happy reading and stay tuned for more exciting content in our upcoming editions.

WANT TO RECEIVE THE MAGAZINE AT YOUR DOORSTEP?

Please visit our official website www.asmideast.com and select ‘Subscribe Now’ option under THE MAGAZINE menu.

Subscription includes all six editions.

Digital edition is FREE and readily available at the official website.

6 www.asmideast.com
WORD

ABU DHABI RANKED MENA SMARTEST CITY FOR THE THIRD TIME

For the third time in a row, Abu Dhabi has been ranked as the smartest city in the Middle East and North Africa (MENA) surpassing several international capitals and ranking 13th in the world out of 141 cities.

IMD Smart City Index released by the International Institute for Management Development in Switzerland in collaboration with the Singapore University of Technology and Design released their annual study on smart city development by surveying 120 residents in 118 cities worldwide. The study evaluated residents’ perceptions of health and safety, mobility, activities, opportunities (work and education system), and governance.

Smart cities contribute to the development of many key sectors in the emirate, such as the smart transportation sector and the smart economy, which is based on advanced software that helps develop many sectors such as supply, delivery, and joint support services.

Additionally, interactive platforms are built with the public to identify their needs and

aspirations and interact with them transparently, placing them at the center of government work, in addition to developing and facilitating access to services for citizens.

The Smart Cities Index issued by IMD is considered an important reference

for international organizations, decisionmakers, and institutions to measure the impact of national strategies in enhancing levels of welfare, achieving progress, and promoting the quality of life for people. n

UAE GOVERNMENT INTRODUCED “GENERATIVE AI” GUIDE

The Artificial Intelligence, Digital Economy, and Remote Work Applications Office have launched a comprehensive guide on the utilization of generative AI applications aiming to intensify research and efforts towards promoting the adoption of futuristic technologies in government work models.

“According to many global studies, artificial intelligence will change the shape of the world in the coming years. We have seen AI play a significant role in shaping how humans interact with modern technologies and machines, and we can use it as a driver for future diverse and flexible innovation that keep up with rapid cultural and technological transformations and open up new horizons for innovation,” says the comment in the Guide’s intro note by His Excellency Omar Sultan Al Olama, Minister of State for Artificial Intelligence, Digital Economy and Remote Work Applications.

The guide provides a comprehensive exposition of generative artificial intelligence, explores the challenges and opportunities inherent in diverse digital technologies, recommends optimal approaches for effectively managing these technologies, emphasizes the importance of data pri-

vacy in the current digital landscape, expounds on principles and methodologies for leveraging generative artificial intelligence technologies, and features texts that provide the most accurate content created by Generative AI.

The guide showcases 100 use cases and applications of generative AI, including image and video synthesis, language translation, music composition, and text creation. Of particular significance is ChatGPT, which is recognized as one of the most fundamental and widely employed generative AI applications. The guide also presents the implementation of several language-based tasks that facilitate the development of healthcare, education, and transportation services. The adoption of ChatGPT can be readily integrated, exemplifying the UAE’s efforts to design and establish policies and regulations that align with future approaches. n

8 www.asmideast.com
NEWS
9 www.asmideast.com Our team will support your project from inception to completion, so your project is completed on time, wthin budget and with optimum security solution PRE-BUILD & CONFIG COMMISSIONING TRAINING TROUBLESHOOTING PRODUCT DEMOS SPRAY PAINTING SERVICES SITE SURVEYS SYSTEM DESIGN ADI ADDED VALUE Looking for Support with Your Next Project? For More Information on ADI Products and Services Call: +97 148 170 307 Email: sales.me@adiglobal.com We Offer:

KUWAIT LOSES OVER $160 MILLION TO CYBERCRIME

Between January 2022 and March 2023 cybercrime had harmed around 20,000 Kuwait citizens and residents, producing an estimated cost of over $160 million, said the unnamed security official to Al Qabas newspaper.

The official said that the Electronic and Cyber Crime Department at the Ministry of Interior faces major challenges in raising awareness to protect privacy, especially after the spread of artificial intelligence applications. He said that cybercriminals disrupt digital systems and steal data from public and private institutions, adding that personal data available on social networks present an added vulnerability.

The vast majority of the victims are senior citizens who are considered a vulnerable group by attackers due to a lack of experience in dealing with technology tools. Most of the time they were

approached through WhatsApp messages and anonymous calls. The official added that victims were also exposed to malware that provides cybercriminals remote access to their smartphones. Earlier this year Kuwait’s Ministry of Commerce and Industry was also subject to a cyber-attack. Kuwaiti media reported that the hacking attempt was enabled through two personal computers which deployed LockBit ransomware into the Ministry’s network. n

DUBAI CIVIL DEFENCE INTRODUCED NEW FIRE SAFETY REGULATIONS

New fire safety regulation will apply to all types of buildings and industrial facilities and it is based on international standards and best practices aiming to improve the safety of the buildings and reduce the risk of fires. New regulations were introduced at Emirates Safety Laboratory by Lieutenant General Rashid Thani Al Matroushi, Director General of Dubai Civil Defence.

The regulations require all buildings to have fire-resistant cladding and insulation, as well as improved fire alarm and sprinkler systems. The installation of smoke detectors, emergency lighting, and fire extinguishers is also mandatory under the new standards. The requirements apply to all types of buildings, including residential, commercial, and industrial properties. The announcement of the new fire safety standards comes as part of Dubai’s ongoing efforts to improve safety and security across the city. In recent years, the city has implemented a range of measures to enhance safety, including the use of drones to monitor buildings and the introduction of new safety regulations for public transport. n

VEHICLE ACCESS CONTROL MARKET TO REACH $25b BY 2033

The worldwide vehicle access control market is currently valued at $10 billion, and is projected to collect revenues of as much as $25 billion by 2033, says the Fact.MR research. Vehicle access control is a combination of software and hardware solution automating vehicles’ entry and exit processes and allowing for efficient management of guests, employees, and suppliers on the premises via gates, doors, shutters, and barriers. The projected global market growth rate (2023-2033) will rise by 9.6%, and the leading system segment remains biometrics and key implementing companies are Denso Corporation, dormakaba International Holding, Continental, Axis Communication, ClAmp Corporation, Alps Alpine, and Automatic Systems.

Demand for sophisticated safety systems for vehicle access control is increasing just as some security requirements at the residential and commercial facility entrances growing more rigorous. The system is required at power plants, R&D facilities, and nuclear power centers considered critical to a country’s economy. n

10 www.asmideast.com
NEWS
11 www.asmideast.com

EVERY DAY UAE BLOCKS 50,000 CYBER ATTACKS

Mohammed Hamad Al Kuwaiti, Head of Cyber Security Council for the Government, during his Oracle CloudWorld Tour Abu Dhabi 2023 said that UAE daily stops 50,000 cyber attacks adding that the prime targets are the banking, financial, healthcare, oil, and gas sectors. He noted that the cyber attack protection is in line with the country’s information security standards and policies, affirming that the UAE’s advanced digital infrastructure and capabilities effectively counter malicious cyberattacks that target government authorities.

“The UAE is at the forefront of creating a state-of-the-art and secure digital infrastructure to help drive the country’s digital economy growth,” said Dr Mohamed Hamad Al Kuwaiti.

Among 193 countries The United Arab

BOSCH TO ACQUIRE US CHIP-MAKER TSI SEMICONDUCTORS

Bosch plans to acquire assets of the US Roseville, California-based chip-maker TSI Semiconductors. The company with 250 employees mainly develops and produces

large volumes of chips on 200 mm silicon wafers for applications in the mobility, telecommunications, energy, and life sciences industries.

Emirates occupies the fifth position worldwide in the Global Cybersecurity Index of the International Telecommunication Union of the United Nations, assessing awareness of the cybersecurity importance. n

“With the acquisition of TSI Semiconductors, we are establishing manufacturing capacity for SiC chips in an important sales market while also increasing our semiconductor manufacturing, globally. The existing clean-room facilities and expert personnel in Roseville will allow us to manufacture SiC chips for electromobility on an even larger scale,” says Dr. Stefan Hartung, the chairman of the Bosch board of management. Over the next years, Bosch intends to invest more than 1.5 billion USD in the Roseville site and convert the TSI Semiconductors manufacturing facilities to state-of-the-art processes. Starting in 2026, the first chips will be produced on 200-millimeter wafers based on the innovative material silicon carbide (SiC). Bosch has been producing silicon carbide (SiC) chips since 2021 in Germany. n

VIDEO TELEMATICS TO ENTER THE SMART TRANSPORT SECTOR

The integration of cameras to enable various video-based solutions in commercial vehicle environments is one of the most apparent trends in the fleet telematics sector today, says the latest Berg Insight report.

Growing at a compound annual growth rate (CAGR) of 18.0 percent, the active installed base is forecasted to reach 8.8 million units in North America by 2027, and in Europe, the installed base of active video telematics systems reached over 1.1 million units in 2022. The ac-

tive installed base is forecasted to grow at a CAGR of 17.9 percent to reach 2.5 million video telematics systems in Europe by 2027.

The video telematics market is served by many companies ranging from specialists focused specifically on video telematics solutions for various commercial vehicles, to general fleet telematics players which have introduced video offerings, and hardware-focused suppliers offering mobile digital video recorders (DVRs) and vehicle cameras used for video telematics. n

12 www.asmideast.com
NEWS
Get in touch with us to exhibit or sponsor: www.integrateme.com #IntegrateME Co-located with Organised by The Middle East and North Africa premier forum and sourcing platform for the global Pro AV Community, connecting technology leaders with integrated solution buyers from the intersecting worlds of Education, Retail, Hospitality, Media, Metaverse, Entertainment, Real Estate, Communications and much more.
INTEGRATED SOLUTIONS EXHIBIT AT MENA’S PREMIER BUSINESS EVENT DUBAI WORLD TRADE CENTRE 16 18 MAY 2023
PRO AV &

ONVIF’S 15th ANNIVERSARY AND 25.000 CONFORMANT PRODUCTS

ONVIF, the leading global standardization initiative for IP-based physical security products, continues to deepen its influence and impact in the physical security market with the dual milestones of surpassing 25,000 conformant products and celebrating 15 years as the defacto

industry standard for interoperability. Since its inception in 2008, products that conform to ONVIF profiles have consistently grown in number and scope, beginning with core products such as IP cameras, video management software, and network video recording solutions.

Today’s database of conformant products now encompasses intercoms, license plate recognition cameras, and can also include drones, and services such as video surveillance as a service (VSaaS).

“ONVIF has accomplished quite a lot in its first 15 years, but our work is certainly not done yet,” said Leo Levit, chairman of the ONVIF Steering Committee. “As the industry continues to adopt video analytics, Artificial Intelligence, cloud, and IoT, the role of ONVIF as a provider of standardized interfaces in these domains will only become more relevant.”

In all, ONVIF offers seven profiles, including Profile S for streaming video; Profile G for video recording and storage; Profile C for physical access control; Profile A for broader access control configuration; Profile T for advanced video streaming, Profile D for access control peripherals, and Profile M for Metadata and events for analytics applications. n

HANWHA PRESENTED A NEW STRATEGIC PLAN

Hanwha Vision, under the new company name, presented regionally customized solutions and a new expansion strategy for the first time at the ISC West and Secon security trade shows.

“As we expand our business from surveillance monitoring to data analysis, we will provide customized information through big data analytics and actionable solutions that not only prevent incidents but also respond to them in real time. Moreover, our vision solutions will be instrumental in advancing customer’s operational strategies,” said Soon-hong Ahn, President and CEO of Hanwha Vision.

Along with its new name, Hanwha Vision also developed its new business strategy, emphasizing its leading capabilities in vision solutions. First, Hanwha Vision will provide a platform to collect, analyze and integrate data from various devices and sensors, leveraging its partner solutions. By acquiring data collection devices, such as AI cameras and IoT sensors as well as event-detection applications and AI-training solutions, Hanwha Vision will acquire vision data and deliver useful insights through data analytics.

Second, in the area of real-time video surveillance, Hanwha Vision plans to expand the scope of technologies to offer solutions that will not only respond to events but also predict them. Big data collected through various sources will be analyzed using AI and cloud technologies to pre-

dict events to provide prevention or early resolution.

Hanwha Vision, which announced its new name in March, will gradually change the names of overseas subsidiaries, products, and solutions based on its business needs in each market. n

14 www.asmideast.com
NEWS

DIAMOND SPONSOR

PLATINUM SPONSORS

GOLD SPONSORS

SILVER SPONSORS

ODM teh-tel
inovatio innovative solutions for the future
25 - 26 October 2023 Ljubljana, Slovenia www.adriasecuritysummit.com CONFERENCE & EXHIBITION
LUNATRONIK
ADRIA SECURITY SUMMIT
INTERVIEW 16 www.asmideast.com

WE ARE ONLY ABOUT TO UNCOVER THE POTENTIAL OF UAVS FOR COMMERCIAL USE

We saw an overwhelming demand for UAVs in GCC and moved our operation to Dubai. This opened a whole new pool of talented engineers for us and the possibility of working closely with organizations throughout the MENA region. We pride ourselves on producing and developing most of our hardware and software in-house. This can be challenging, but the result is top-notch quality of both products and services.

a&s Middle East: Could you please present yourself to the readers of the a&s Middle East?

Alex: I am Alex Lapirov, a seasoned business development expert and leader. I hold a master’s degree in international and intercultural communication, complemented by various other courses. Before joining Microavia, I held a variety of senior sales and executive positions, including Sales Director CIS at Oracle and CEO of WinterArk. I am deeply involved in many processes at Microavia, supporting the team to innovate and rapidly bring new products to market.

a&s Middle East: What are your core areas of expertise as the UAE’s first and only drone manufacturing company? Tell us more about how and when it started for Microavia and some critical milestones.

Alex: Microavia is the leading GCC drone innovation and manufacturing company. With almost 100 employees from 12 different nations, we develop and produce industrial drones for various commercial applications. We are also one of the few companies in the World providing managed drone infrastructure as a service

(MDIaaS). Our headquarters are in Dubai Silicon Oasis.

The company started in Europe five years ago with a mission to manufacture advanced UAVs for communications and monitoring. However, two years ago, we saw an overwhelming demand for UAVs in GCC and moved our operation to Dubai. This opened a whole new pool of talented engineers for us and the possibility of working closely with organizations throughout the MENA region. We pride ourselves on producing and developing most of our hardware and software inhouse. This can be challenging, but the result is top-notch quality of both products and services. It is possible because of our talented people – avionics engineers, quality and assembly experts, AI vision programmers, and the customer support team.

a&s Middle East: Tell us more about your latest drone platform. Why is it, as

you market it, “ideal for industrial applications”? And what are its security applications?

Alex: Microavia has developed three distinct drone lines, which are meant to satisfy most of the customer’s needs. Ortus Dock is a drone-in-a-box solution with a robust drone dock serving as a recharging and data exchange station for the drone. It has four batteries, which can be swapped automatically, and climate control inside. If Ortus Dock has a power supply, drones can land and go on missions 24/7.

Ortus Kite is the tethered version with a winch with a power cable. The drone can hover at an altitude of up to 200 meters indefinitely, providing 24/7 monitoring with a live video stream.

Last but not least is our heavy-duty Fortis drone, which is most commonly used for geophysical surveys. It can carry up to 20kg of payload for extended periods and

17 www.asmideast.com
INTERVIEW
We develop a set of our “standard” equipment: video, photo, and thermal cameras. Two additional options, which our partners create for us, are a LiDAR for surface point cloud scanning and a magnetometer

has some unique features helping stabilization and terrain following.

All our drones are managed through our proprietary flight management system (UTM), which is heavily focused on allowing automated mission planning and execution and AI assistance.

a&s Middle East: What kind of cameras, sensors, lights, and other technical systems is it equipped with? Does it come as standard equipment, or does it depend on a specific industrial application?

Alex: We have developed a very flexible gimbal, which can be used with various payloads and adjusted to customers’ needs. That said, we also have a set of “standard” equipment, which we usually ship: video, photo, and thermal cameras, which are all developed by us. Then there are two additional options, which our partners create for us: a LiDAR for

surface point cloud scanning and a magnetometer, which is used for mineral surveys.

a&s Middle East: You can manage drone operations differently, from gathering geo and aerial data and mission planning to automated flight modes and risk assessment. What are the features of the Microavia drone operation management, and can you scale your operations to hundreds or even thousands of drones?

Alex: The key differentiator is our proprietary UTM. It can comfortably handle unlimited drones thanks to the extensive mission planning functionality. A customer can quickly scale any number of Ortus Docks to provide mission capabilities over large areas. Our software is cloudbased, meaning drone operators can be thousands of kilometers away from the

drone and still execute missions and analyze the results. Also, our docks can be chained, meaning that a single drone can travel between multiple docks for battery replacement while keeping the monitoring missions going. This effectively doubles the flight range.

a&s Middle East: Your manufacturing processes mostly rely on your capacities. Since robotics technology is increasingly sophisticated, how do you plan to maintain that kind of independence of third parties?

18 www.asmideast.com
INTERVIEW
The Middle East holds a lot of potential, which is one of the reasons we made it our home. Governments of the Gulf states have made it clear that they believe in innovation and new technologies, and drones are a part of that vision.

Alex: Initially, we relied heavily on 3rd party components but quickly realized that this affected the reliability. So, our engineering leads have put their heads together and made a list of priorities for in-house production vs. what we have to order outside. As a rule of thumb, software and most of the assembly is made by us down to autopilot components. We have two manufacturing areas to satisfy the demand and will likely keep expanding.

a&s Middle East: How do you make your products fit increasingly rigid standards and regulations imposed by UAE national regulatory authorities?

Alex: Drone regulations are relatively new, both in UAE and globally. The main concern areas are the so-called BVLOS flight (Beyond Visual Line of Sight) and pilot competencies. Developing these regulatory frameworks takes a lot of time, as civil aviation and transport authorities must coordinate with law enforcement and the military. The UAE situation is even more difficult because drones have been used in terrorist attacks. On our end, we work with authorities to promote the responsible usage of drones. However, this process is long and tricky as Microavia

Less Than One Minute To Take Off

a&s Middle East: Ortus Dock is autonomous by design. What does this ability imply, and what are the specs of Microavia land spots where it recharges?

Lapirov: Our engineers love numbers, and there’s always a celebration when they improve one of them. I think some of the critical numbers are the following. It takes less than 1 minute for the Ortus drone to take off from the dock, following the mission starts command. This is crucial for emergency response. Battery swapping takes about 90 seconds, which means minimal downtime for continuous operations. A single Ortus Dock can cover an area of ca 1000 sq km, depending on the payload.

operates in many countries. Thankfully, our partners in various countries fully support this work.

a&s Middle East: Last year the Seed Group teamed up with Microavia. What have you achieved in that collaboration since its announcement?

Alex: We are very grateful that SEED Group has supported us since we relocated to Dubai. Their mission to promote and support innovation in Dubai is of utmost importance. They have helped us adapt quickly to the local rules and traditions and opened many doors. We collaborate with them in various areas,

including work with universities, marketing, etc.

a&s Middle East: Do you see a more prominent role of AI, big data, or IoT in how drones will operate?

Alex: Absolutely. Fundamentally, a drone is just a tool for extracting data. Photos, video, point clouds… All that data has to be processed to deliver meaningful results. AI and related technologies make this data processing faster and better. This is why the Microavia platform features a robust API interface to allow customers and 3rd party service providers to take advantage of the data gathered by

19 www.asmideast.com
INTERVIEW

our drones. We also invest in machine learning and AI vision to give our customers out-of-the-box tools for better results.

a&s Middle East: What are your plans and expectations for the Middle East region in the future? What other less explored markets have a high potential for drones from your perspective? Do you foresee any challenges in entering those markets?

Alex: I think that the Middle East holds a lot of potential, which is one of the reasons we made it our home. Governments of the Gulf states have made it clear that they believe in innovation and new technologies, and drones are a part of that vision. And most of the World will share this vision, eventually. We already operate in Africa and Asia, and the challenges are often similar and mundane: lack of regulation (or over-regulation) to import and use commercial drones. This occasionally keeps us and our partners from delivering the UAV services, which are much needed and could help many industries. Instead, they are locked into using small “personal” drones, which help but not on the scale the Microavia platform would enable. Also, the price may be an issue in developing countries where labor is still incredibly cheap. We are solving that problem by offering our drones as a service with highly flexible payment options.

a&s Middle East: Are there any achievements, or projects that you feel most proud of?

Alex: My pride and joy are the company we are building and our team, which is filled with brilliant specialists and has a flat structure, enabling continuous innovation. Project-wise, one of our latest success stories has been a mineral surveying mission in the Kazakhstan wilder-

Reducing the Time Spent on Tasks

a&s Middle East: How do you see the future of robotics and automatization and its utilization in efforts to make us live and feel safer?

Lapirov: I am a firm believer in human potential and talent. This is something that is at the core of Microavia’s values. The technology we create across the board helps reduce the time people spend on tasks, which can be automated. It creates additional time to spend on more creative, plain, and critical areas. The same is valid for safety. It is clear to all that the speed of response to any emergency directly affects the outcome. Also, consider a task such as a controlled avalanche detonation. It is much safer and cheaper to use a drone for the task than sending an alpinist up the mountain. A drone can also reach any nearby incident sight within minutes or keep an eye on an ongoing event, identifying problems with the help of AI. I believe we are only about to uncover the potential of UAVs for commercial use, and there is much more to look forward to.

ness. One of our pilots, Max, and a geophysicist, Dan, spent weeks in Kazakh woods and mountains to find some very extensive deposits for a customer. They have even survived an encounter with a

bear. Also, this winter marks the first time our drone has been used for filming a skiing competition in the mountains and demonstrated excellent wind resistance. n

20 www.asmideast.com
INTERVIEW
The price may be an issue in developing countries where labor is still incredibly cheap. We are solving that problem by offering our drones as a service with highly flexible payment options.

09 - 10

October 2023

venue: Oman Convention & exhibition Centre muscat, sultanate Of Oman

Conference Partner: Organized by:

event highlights

12-14 October 2020

time: 11am to 8pm

mprehensive summit & exp nd seCurity

venue: Oman Convention & exhibition Centre muscat, sultanate Of Oman

www.ofsecevent.com

ORGANIZED BY: www.muscat-expo.com/ofsec

21 www.asmideast.com
7th edition
and
COmprehensive exhiBitiOn
Fire,
and seCurity exhiBitiOn highlights Mr. Navneeth K, Project Director • +968 9123 7892 • nk@muscat-expo.com
FiFth editiOn OF Oman’s Only
mOst
On
saFety
For Enquiries and Information, please contact:

False Alarms in Intrusion Detection

NEW TECHNOLOGIES FOR AGILE SECURITY WITHOUT EXPENSIVE MISTAKES

IF YOU THOUGHT THAT ONCE YOU HAVE DETERMINED THAT AN ALARM IS FALSE, YOU CAN BREATHE A SIGH OF RELIEF, THINK AGAIN. EVEN WITHOUT A REAL THREAT, EVERY FALSE ALARM IS A SOURCE OF FRUSTRATION, COSTS FOR THE USER AND THE AUTHORITIES, AS WELL AS DAMAGE TO THE REPUTATION OF THE MANUFACTURER.

IN FOCUS
22 www.asmideast.com

Everyone is familiar with the old fable of the shepherd boy who constantly warned others about non-existent wolves so that no one believed him when real beasts arrived. False alarms in anti-intrusion systems work on the same principle and have been following the security industry since its earliest days. However, the fable of the boy who cried wolf differs from reality in that ignoring recurring false alarms could cost you dearly because every unnecessary alarm comes with a price tag. In the following text, we present new approaches to unraveling the eternal Gordian knot of the industry - false alarms in anti-intrusion systems.

Moody but Essential Systems

Both users and security experts constantly emphasize the importance of antiintrusion alarms in protecting organizations and homes from potential dangers. Electronic security systems have proven to be very effective in identifying threats and alerting owners and users of facilities to various incidents.

“Unfortunately, the main problem with all anti-intrusion systems remains the occurrence of false alarms. False alarms can be not only annoying and frustrating, but can also bring additional costs to the system user. False alarms cannot be completely eliminated, but we can take several steps to minimize their number,” says Aleksandar Dobnikar, Sales Distribution Manager for Southeast Europe at Bosch Building Technologies. His opinion is shared by Ketrin Stepančić-Kontošić, Sales Manager at Vlado Elektronika. “We often hear about security systems that create problems. False alarms are often mentioned as the first cause of user dissatisfaction,” says Stepančić-Kontošić.

In anti-intrusion, connecting these complex and highly reactive systems and their oft-changing settings with human interactions and the environment increases the likelihood of false alarms. Although these security systems offer enormous advantages in terms of protecting lives and property, false alarms are a nuisance for both organizations and emergency services that must respond to them by going out into the field.

Penalizing Service Providers Instead of Users for False Alarms

Some states and local communities are taking initiatives to penalize anti-intrusion service providers for false alarms instead of the owners of the properties where the equipment is used. A similar system is also being applied in the city of Seattle in the United States, where the community has already recorded a significant decrease in the rate of false alarms based on the collection of these fines (from 25,000 false alarms to 11,000 after the introduction of the program). In this case, the fines are directed towards the alarm companies themselves, which are required to be licensed and provide advanced alarm verification before requesting police response. Specifically, the local police require physical evidence before intervening, and the mere activation of the alarm, the opening of doors or windows, etc. is not considered adequate proof.

How Common Are False Alarms?

In anti-intrusion systems, the frequency of false alarms can vary depending on the specific installation and its configuration, as well as on the factors such as the operational environment. Generally speaking, false alarms can occur for various reasons, including accidental triggers, equipment malfunctions, and human errors.

Regardless of the reasons, an illustrative statistic is that 98% of calls for police intervention in the United States are attributed to false alarms, according to the International Association of Chiefs of Po-

lice (IACP).

“When it comes to anti-intrusion alarm systems, it is estimated that more than 90% of all anti-intrusion alarms turn out to be false,” says Marco Zittino, International Sales Area Manager at AVS Electronics. According to the Security Industry Alarm Coalition’s report, the average false alarm rate for residential properties in the United States in 2018 was 0.8 false alarms per system per year. On the other hand, Reolink states that between 94% and 98% of all anti-intrusion system activations in America are false alarms, resulting in costs of $1.5 billion.

A survey conducted by Parks Associates asked participants to describe their experiences with surveillance and alarm systems

23 www.asmideast.com IN FOCUS

in their households, and the results show that the users are not satisfied. Nearly half (48%) of security system owners reported that their system triggers too many false alarms. At the same time, at least 62% of respondents confirmed the activation of at least one false alarm in the past year. But is the situation better for security systems equipped with video analytics? That was the focus of a study by the NW Systems Group, which showed that 93% of medium and large businesses in England reported a high number of false alarms in CCTV systems with video analytics features. According to the same report, 27% of decision-makers among respondents say that their CCTV systems generate excess false alarms due to incorrect specifications or configuration of video analytics software. The report states that suppliers of video analytics systems tend to make excessive promises and use confusing phrases about preventing false alarms in their sales and marketing documents. As a result, at least 33% of respondents reported being confused with the feature descriptions, while 28% believed they were misled by them. Sales and marketing materials usually included popular phrases such as “AI-based analytics,” “deep learning,” and “smart motion detection.”

Consequences Are Underestimated

False alarms not only cause inconvenience to building owners and damage

How to Prevent False Alarms Due to Incorrect Installation?

Each detector should be set up and tested before the system is put into operation. Special care is required when setting up detectors with anti-masking protection and those that use radar for detection. Newer systems can be controlled remotely and, if needed, manually or automatically “bypass” or disable a zone or detector that generates false alarms. This is a quick and effective solution, but also very dangerous if there is no appropriate verification of the cause of the alarm,” says Dobnikar from Bosch. “The most common mistakes are improper positioning (angle and height) of the detector, improper use of detector brackets, and incorrect system programming. A mistake can occur when selecting zone resistors (or EOL resistors). Connections are often made by simply twisting the ends due to small terminals and limited space inside the detector, which can lead to a connection interruption during operation. Newer detectors have microprocessors or components that are sensitive to electrostatic electricity, so direct contact with the printed circuit board (PCB) should be avoided,” says Dobnikar.

the reputation of alarm companies but can also lead to significant costs for local communities in terms of unnecessary deployment of the first respondent services in the event of a false alarm.

“The burden of false alarms falls on first responders. Every false alarm in anti-intrusion implies that the police department or monitoring station sends an officer or operator to investigate the case, and it usually takes 20-30 minutes to resolve the situation,” says Zittino. False alarms cost US police departments around $1.8 billion and 64,000 working hours per year, according to a study by the Center for Problem-Oriented Policing and Secu-

rity Sales & Integration. In the UK, these costs are estimated to be around £1 billion per year.

The reason for this high cost is that patrol vehicles and personnel are sent to the alarm call location because all alarms are treated as high-priority events. These interventions now not only cost police departments but can also result in fines paid by companies and users. Therefore, the issue of false alarms goes beyond an individual source of frustration and includes a concrete cost borne by the user on behalf of the entire community. Therefore, a solution that can mitigate this problem not only saves time for emer-

24 www.asmideast.com IN FOCUS
In addition to the accompanying frustrations, false alarms have become a real source of financial loss for their users due to fines imposed in some communities, which only increases the total cost of ownership of these systems

gency services but also saves money for security system users, with resources redirected to authentic alarm events that require genuine attention.

That’s why many cities around the world have been forced to implement false alarm reduction programs in their communities. For example, in Los Angeles, the police have been imposing fines for responding to false alarms for years. For licensed alarm users, the first false alarm will result in a fine of $267, with an increase of $50 for each subsequent one. In addition to the frustrations, false alarms have become a real source of financial loss for their users due to fines imposed in some communities, which only increases the total cost of ownership of these security systems. In addition, harmless occurrences such as children playing or pets moving about can render the security system useless in multiple ways as an equally dangerous phenomenon can occur - ignoring a real alarm or disabling the system due to false triggers to avoid fines or disturbances.

Due to the trend of penalizing false alarms, the security industry has faced a unique challenge that requires both technological and legal solutions. Lobbyists have taken care of the latter by securing bans on local authorities punishing security service providers in several US states. However, this legal battle is still ongoing, and its outcomes will largely determine the industry’s approach to the problem of false alarms and their impact on local communities.

Causes of False Alarms

“False alarms are common in burglar alarm systems, but the causes of their occurrence are unique,” says Zittino. His

ANPR Cameras Also Trigger False Alarms

False alarms are triggered not only by standard sensors but also by specialized devices such as ANPR cameras. Since these devices must grant access only to specific vehicles, false alarms are usually caused by incorrect reading of symbols on the license plates e.g. if the camera captures the reflection of the plate in a puddle instead of the physical markings on the vehicle and sends a wrong message to the alarm system. Therefore, these devices must be installed at an appropriate height, angle, and proper distance from the vehicles. Weather conditions such as rain or snow, as well as recording performance, should also be taken into account to avoid false alarms caused by strong headlights and reflections from nearby objects.

colleague Dobnikar from Bosch states that errors mostly occur when the existing system is outdated or old. “These are force majeure factors (power surge, lightning) in inadequate grounding or wiring, but the most common cause of all false alarms is a human error,” he says. Ultimately, the causes of false alarms in burglar alarm systems can be collectively described as factors of a technical, human, and natural character.

User Errors

User errors account for about 50% of all false alarms in anti-intrusion, according to AVS Electronics. The most common causes are insufficient training of staff or users handling the system. Additionally, cleaning crews, maintenance personnel,

or contractors often do not receive proper instructions on how to use the burglar alarm system. As a result, they may accidentally activate it while trying to enter or exit the building. The same applies to users who perform routine maintenance activities on the system, such as replacing security device batteries. They may accidentally trigger a tampering alarm if they are not instructed to call the control center before such activities.

Inadequate Maintenance

Alarm systems are precise instruments that require routine maintenance. Maintenance includes, among other things, testing the system and all peripheral modules, replacing depleted batteries (backup power) and detectors, and clean-

25 www.asmideast.com IN FOCUS
25 www.asmideast.com
Ketrin Stepančić-Kontošić, Sales Manager, Vlado Elektronika Aleksandar Dobnikar, Sales Distribution Manager for SEE, Bosch Building Technologies Marco Zittino, International Sales Area Manager, AVS Electronics Andrej Češek, Presales Engineer, Hikvision Adriatic
Suppliers of video analytics systems tend to make exaggerated promises and use confusing phrases in their sales materials about preventing false alarms

ing and inspecting cables. Otherwise, if the alarm system is damaged or neglected, its installed motion detectors, sensors on windows and doors, and other field devices may detect threats where there are none. “Sometimes, in the absence of appropriate tools, the installer drills a larger hole in the detector for cable placement. Small animals (spiders, ants, bugs) can enter through this opening which often generates false

alarms. I suggest that each user should schedule regular service and inspection of the alarm systems at least once every two years,” says Dobnikar. Even seemingly harmless ambient factors such as thick cobwebs on a motion detector can trigger an alarm in an otherwise safe situation. Other environmental false alarm triggers include storms, the passage of animals in front of sensors, and the movement of vegetation.

Unlike wild animals, pets are a more common trigger of recurring alarms. That’s why companies like Bosch and Venitem offer detectors that are immune to alarm activation due to the detection of moving objects of a predefined mass. To its solution, Venitem adds software that analyzes the type of animal based on its size, with two levels of differentiation and an antimasking function that makes outdoor sensors resistant to insect-related triggers.

26 www.asmideast.com
IN FOCUS
One-size-fits-all solutions are rare and should not be used. Relying on qualified installations and certified products is a card worth playing in a situation where there are no guarantees that false alarms will be eliminated

The Role of Sound in Reducing False Alarms

The use of video for verifying alarm events before alerting first responders can significantly reduce the number of false alarms. However, video is just one piece of the puzzle in the fight against false alarms. Important evidence needed for verification is also collected when the audio component of the security system is involved, for example, if glass breaking, gunshots, or attackers’ conversation during an attempted break-in can be heard. Incorporating audio surveillance technology into the security system can help first responders confirm whether the alarm event is authentic and thus ensure that the police respond only to real threats. Sound monitors can stream and record audio content live after an alarm is triggered, allowing the user to more easily determine what is happening and why. Finally, there is additional information about the location of the event and the level of threat, allowing law enforcement to prepare an appropriate response based on the situation on the ground.

Power outages and battery drain are also one of the causes of false alarms. That’s why some anti-intrusion devices, like Venitem’s, are equipped with a system that allows constant monitoring of the status of all installations.

Poor Engineering and Installation

Some companies neglect the quality factor of alarm system installation, which contributes to the frequency of false alarms. If door and window sensors are not properly placed or a motion sensor is used with incorrect settings, false alarms may be triggered more often. Also, poorly installed and designed sys-

tems may include devices that are not intended for specific environments. Finally, there is also a risk of installing cheaper components with a security system that simply cannot withstand constant use compared to more robust and standardized materials.

The reliability of a burglar alarm is directly related to the quality of its components, their installation, and maintenance. Therefore, when selecting and installing these systems, it is important to rely on qualified installers and certified products. This is the card to play in a situation where no one can offer you 100% protection against false alarms.

“Manufacturer recommendations regarding the equipment in use must be

respected and tailored to the user’s requirements. One-size-fits-all solutions are rare and should not be used. This primarily refers to the location where the alarm detector is mounted, proper detector selection, connection to the alarm system, cable placement, dimensioning of the backup power supply, and the system’s mode of operation,” says Dobnikar.

Visual Verification as a Solution?

Over time, another ‘school of thought’ emerged within the industry according to which false alarms should primarily be dealt with on a technological rather than a legal battlefield. “The installation of video surveillance or the option of video alarm verification can temporarily and partially solve this problem,” says Dobnikar.

Development and integration of AI-based solutions and visual verification have emerged as important technological trends aimed at reducing false alarms in anti-intrusion and eliminating the need for regulatory frameworks that penalize users or companies. In this case, a “verified” alarm event is defined as a situation that the security system first registers as such, after which the operator determines the presence of individuals and a high probability that an attack is underway according to a standardized protocol.

Video verification is used to verify the authenticity of the threat before personnel or material resources are deployed in response. At Ajax Systems, they say that photographic verification, or the

27 www.asmideast.com IN FOCUS
AI can accurately “interpret” the monitored scene and dissect its elements, which means it can recognize phenomena such as the movement of leaves, weather conditions, and animal movements, thus reducing the number of false alarms
The installation of video surveillance or the option of video alarm verification can partially solve the issue of false alarms
27 asmideast.com

ability to visualize the event that triggered the alarm before the intervention, is sufficient to reduce the number of false alarms. For example, their MotionCam series does not require additional system settings for this type of feature and brings it closer to less technically proficient users.

“With video surveillance, more people are now using video technology for alarming, so we pay special attention to the development of video analytics based on special algorithms for classifying potential intruders,” say Andrej Češek and Elvis Ferhatović, pre-sales engineers at Hikvision Adriatic. Hikvision’s AcuSense technology relies on classifying vehicles and people, with all information being filtered to cancel out false alarms with a high degree of efficiency. This technology works based on deep learning and machine learning algorithms.

“For reducing the number of false alarms, we have another option - the use of thermal cameras for perimeter protection. In this case, the image remains the same day and night because weather and lighting conditions cannot cause false alarms, so detection is highly reliable,” say

Češek and Ferhatović.

On the other hand, Ajax treats false alarms as a systemic rather than solely hardware-related problem. Therefore, this company offers its advanced us-

ers to manually adjust the features to reduce false alarms. Installers can limit the conditions for activating alarms to the activation of multiple systems simultaneously or separate the activation of alarms into two phases - initial and final. In this case, the alarm is only activated when the second device is turned on,

while accidental activation is prevented by requiring the alarm to be triggered by pressing two panic buttons. Finally, false alarms due to malfunctions are prevented by the system ignoring damaged or improperly placed sensors if they do not return to their initial state within a specified period.

The Role of Artificial Intelligence

At Vlado Elektronika, a distributor of the Italian company EL.MO., the rise of artificial intelligence (AI) in the security sector is seen as the beginning of the end of the dominance of false alarms as a key drawback of anti-intrusion systems. “Through these new technologies, it is possible to provide end-users and security professionals with the tools needed to strengthen the performance of antiintrusion systems, while significantly reducing many of the problems that can occur after the installation of such systems,” says Stepančić-Kontošić.

In collaboration with EL.MO., Vlado Elektronika treats artificial intelligence as a tool to reduce false alarms and as a part of a broader integrated ecosystem. In practice, this means that the e-Vision video surveillance systems with AI capabilities offered by EL.MO. are integrated with the PROXIMA and PREGIO series of intrusion control panels. The interface

28 www.asmideast.com IN FOCUS
Sensors will need to learn to ignore the effects of light, wind, rain, or snow while tolerating detected animals in order to effectively reduce the number of false detections

called D-PULSE serves as a bridge between them, through which alarm events generated by the analysis of video data streams (such as intrusion, line crossing, or abandoned objects) activate the intrusion detection alarm panel in the same way as a sensor. In this way, artificial intelligence can accurately “interpret” the monitored scene and dissect its elements. This significantly reduces the risk of false alarms in anti-intrusion because AI will recognize phenomena such as the movement of leaves, weather conditions, and animal movements. “The insightfulness of these systems allows for advanced recognition of human shapes and behaviors, types of animals, and vehicles,” says Stepančić-Kontošić, adding that this “supports the activation of predefined automation scenarios to achieve maximum adaptability and protection against false alarms.”

Is It Possible to Reconcile Sensitivity and Resistance to False Alarms?

“The component most involved in causing false alarm problems in an anti-intrusion system is the sensor, especially the outdoor one because, unlike the internal detector, it is exposed to weather conditions and external factors,” says Barbara Lomartire, Marketing and Communication Manager at Venitem. At Venitem, atmospheric conditions have been recognized as an important cause of false alarms, which primarily refer to rain, fog, and even sunlight. This is particularly relevant in situations where PIR detectors are used, as they are much more sensitive to temperature and atmospheric variations, such as sunlight,

that can trigger a false alarm. Venitem’s detectors have a temperature compensation technology in which algorithms automatically optimize the detection level based on the external temperature. Other providers of anti-intrusion solutions see the development of sensor technology as a response to the problem of false alarms since this technology constitutes the first line of communication between the alarm system and the outside world. “At Optex, we offer a wide range of products and technologies for detecting false alarms that fit different types of locations, needs, and security levels,” says Jacek Wójcik, Customer Care Director of CEE at Optex. Optex’s PIR sensors are equipped with an SMDA multidimensional analysis system which allows the detector to analyze passive infrared signals and ambient information to differentiate genuine breakin attempts from false alarms caused,

for example, by temperature changes. “Anti-intrusion systems often have an external component, which is why false alarms are caused by ambient phenomena such as wind. Optex offers optical sensors that are resistant to electromagnetic and radio interference, humidity, salt, UV radiation, and lightning strikes, which minimizes the chance of any environmental factor triggering an alarm instead of an authentic threat,” says Wójcik.

Information about detected objects is sent in real-time, with the ability to adjust detection to only track targets larger than a predefined size or only those that stay in the detection field longer than a defined time. Other detection parameters can be adjusted for maximum flexibility in adapting to the installation site and thus preventing false alarms. AVS Electronics relies on a similar approach. “We offer the ability to customize detec-

29 www.asmideast.com IN FOCUS
Barbara Lomartire, Marketing and Communication Manager, Venitem Elvis Ferhatović, Presales Engineer, Hikvision Adriatic Jacek Wójcik, Customer Care Director of CEE, OPTEX
29 www.asmideast.com
Ilia Yashmakov, Sales Director for the Balkans and Adriatic region, Ajax Systems

tors to the user’s needs, which means that you can adapt them to the environment and installation location standards,” says Zittino.

Analytics as a Response to False Alarms

According to a study by NW Security, users’ faith in video analytics as a solution to reducing the frequency of false alarms remains unshaken. At least 30% of companies believe that the video analytics software they use helps to reduce the number of false alarms.

At Optex, they also believe that an additional reduction in false alarms will come from analytics. They see the solution in introducing external PIR sensors with intelligent visual verification and video content analysis (VCA) technology in the camera itself. These sensors will be able to learn to ignore the effects of light, wind, rain, or snow, with a tolerance for detected animals to effectively reduce the number of false detections.

The representatives of AVS Electronics

claim that detection based on multiple technologies will be important in the fight against false alarms. “We already use technologies based on PIR and microwave sensors. Any suspicion of false alarms will be eliminated by video verification and detectors with built-in cameras and microphones that will communicate with the user or control room,” says Zittino.

Although most people trust analytics as a universal cure for false alarms, there are still many who say they won’t invest in analytics even at the cost of dealing with false alarms. The main reasons for the lack of investments are related to the lack of funds for investing in video analytics and the need to hire system integrators to help them choose and configure analytics.

For now, it can be said that there are two opposite trends in the anti-intrusion sector when it comes to preventing false alarms. One is the awareness of the role of analytics and proper installation and configuration of systems in relation to environmental factors, while the other is

the reluctance to invest due to a lack of resources and the fact that equipment manufacturers do not use clear and concise language or offer unrealistic promises.

The Detector is a Key Component

There are several types of detectors, and their proper selection is crucial for the functioning of the alarm system. These include motion detectors, PIR, microwave detectors (MW), dual detectors (PIR+MW), glass break detectors, seismic detectors, vibration detectors, and others.

“The detector is a fundamental element of every alarm system that collects data from the protected area. It is precisely this part of the alarm system that generates false alarms, excluding system sabotage,” says Dobnikar. That is why his company, Bosch, focuses on the detector component in the fight against false alarms i.e. on its functions that include response time, sensitivity, coverage area, resistance to interference, etc.

One of the main causes of false alarms in anti-intrusion systems is temperature compensation since most high-quality detectors on the market offer the feature

30 www.asmideast.com IN FOCUS
One of the main causes of false alarms in anti-burglary systems is the function of linear temperature compensation

of linear temperature compensation. This means that the detector’s sensitivity increases as the temperature rises. This solution leads to false alarms if the ambient temperature continues to rise and exceeds the body temperature. Instead of this, Bosch uses dynamic temperature compensation technology. In practice, this means that the detector sensitivity increases only within the range of 32.2°C – 37.7°C, which corresponds to the temperature of the human body. If the temperature continues to rise, the detector sensitivity decreases, while Bosch’s detector will detect the temperature difference between the body and the environment.

“Our TriTech detector performs selfcalibration in the first ten seconds after activation, adjusting the operating parameters according to the environment. This not only applies to temperature and light but also to all objects (moving and stationary ones) that the detector ‘sees’. If there is any source of interference in the room, such as temperature, the detector will remember it and adjust the sensitivity relative to the signal level to detect intruders,” says Dobnikar. Finally, Bosch also relies on MEMS (Micro Electric Mechanical System) sensors, which many people know from mobile phones or cars. They are now part of the company’s latest Commercial Series Gen2 detectors. They serve to increase the detector’s resistance to false alarms when it comes to sabotage (movement, hitting, and sudden vibrations) and to recognize such activities much faster.

The Education Is a Significant Factor

In addition to all of the above, is there a third “X factor” in the false alarm equation that is not related to finances, marketing, or technology? Our interlocutors also see the problem in the insufficient education of users about the prevention and consequences of false alarms.

“The main cause of errors is the insufficient training of end-users. Most often, it is due to incorrectly entered or forgotten codes, failure to comply with instructions or protocols for using the system (temperature in the facility, open window, AC, heating, pets),” says Dobnikar, adding that system sabotage sometimes looks like a false alarm. This situation should be given enough attention, especially if it happens when the alarm system is not activated.

At Ajax Systems, the response to this challenge is seen in strengthening communication with the users through a dedicated application. “Data clearly show that users themselves are the biggest generators of false alarms. Although it is easy to train a security professional who earns a living from these skills, the same does not apply to the user. At Ajax Systems, we believe that the more interaction we have with our users through our application and the more value we can offer them, the more comfortable they will feel. Positive user experience and training will help reduce the number of false alarms more than training alone. That has been my experience so far,” says Ilia Yashmakov, Sales Director for the Balkans and Adriatic Region at Ajax Systems.

AVS Electronics conducts education with a focus on local partnerships. “Knowing how to use an alarm system is not knowledge people are born with. That’s where the second step comes in: partnering with a supplier of commercial alarm systems with decades of experience in designing, installing, and maintaining topnotch business alarm systems. An important factor is careful customization of each commercial burglar alarm system, as well as a commitment to using only the highest quality suppliers and devices,” says Zittino. Finally, there are also service contracts and preventive mainte-

nance plans to maintain the health and functionality of these systems.

Bosch also sees the solution in reducing the impact of human factors on false alarms, which is why they offer training to distributors and not just to equipment users. “Our customers have access to two types of training - commercial and technological certification. In this way, we ensure that all of our partners are timely familiarized with the latest technological solutions and that they can provide complete support to end users of our equipment at any time,” says Dobnikar.

Hikvision also puts hope in education, especially through regular professional workshops at the local level. They offer access to Hikvision Academy and training programs that take place in the premises of distributors and cover training on false alarms for partners, installers, and other interested professionals. “The development of technological solutions without the proper education of users and installers is meaningless and is doomed to failure and difficulties in everyday work. The prerequisite for proper operation and use of technology is certainly quality education of all participants in the chain - from sellers, through installers to end users. They must know how to properly configure and install our systems,” conclude Češek and Ferhatović. n

31 www.asmideast.com
IN FOCUS
31 www.asmideast.com
The data clearly shows that users themselves are the biggest generators of false alarms, which is why positive user experience and training can help reduce the number of false alarms

A BILLION PEOPLE ARE CURRENTLY USING SUPREMA DEVICES

Market demand for contactless security solutions continues to grow even after the pandemic. Known as the “Apple of the World of Physical Security,” Suprema is a specialized security solutions company integrated with AI that has original technologies for facial recognition and fingerprints. Its main clients are Fortune 500 companies, data centers, banks, and public institutions that require high security.

32 www.asmideast.com
Hanchul Kim, CEO, Suprema
INTERVIEW
33 www.asmideast.com INTERVIEW

a&s Adria: Mr. Kim, can you please present yourself to our readers?

Kim: Thank you for this opportunity. I am Kim Hanchul, CEO of Suprema. I graduated from the University of Wisconsin, USA, and accumulated work and technological experience in global business and software development in Korean and foreign IT companies such as Samsung Electronics, Motorola, and Harman. After joining Suprema in 2015, it has been leading aggressive business growth abroad through location strategies by expanding partner channels and establishing branches abroad.

a&s Adria: What portfolio does Suprema have?

Kim: It has a broad portfolio in all areas of access control systems, including AIbased fingerprint and face recognition terminals, Biostar 2, which is an integrated platform for access/assistance/ visitors management and mobile access card solutions.

In September 2022, the company launched BioStation 3, which can perform 100% contactless access authentication,

reflecting the growing need for the market for contactless security solutions in the post-COVID-19 era. Provides various contactless access verification options, such as facial recognition, mobile access card, QR, and barcode to improve user convenience. With a small size similar to that of a smartphone, it is characterized by the ease of installation and scalability that can be installed on any door, from small offices to business environments.

a&s Adria: Can you explain more about BioStation 3?

Kim: BioStation 3 is equipped with an AI processor, NPU (Neural Processing Unit), and can perform high-level facial recognition access authentication. Accurate authentication is possible even with changes to the face, such as various types and colors of masks, hairstyles, hats, and glasses. It has an intercom and RTSP (Real-time streaming protocol), al-

lowing efficient bilateral communication with visitors anytime, anywhere.

a&s Adria: Are you proud to have a premium access security solution? What is the difference or strength of Suprema compared to other solutions?

Kim: The chance that our products will recognize and misidentify people is approximately 1 in 10 billion. This is thanks to the in-depth learning algorithm developed independently and exclusively based on the technology accumulated over 20 years. This recognition algorithm is evaluated for its excellent false fingerprint/ face detection technology. Another point of difference is that it has a design delicate and modern enough to be used in movies and dramas like JTBC’s ‘Confidential Assignment 2: International’ and ‘Private Life. Provides accurate facial recognition performance regardless of race or facial expressions of people worldwide,

The chance that our products will recognize and misidentify people is approximately 1 in 10 billion. This is thanks to the in-depth learning algorithm developed independently and exclusively based on the technology accumulated over 20 years.
INTERVIEW

Long-term Development of AI Algorithms

a&s Adria: What’s the secret of accurate personal identification despite changes in masks, hats, glasses, etc.?

Kim: This is possible by AI which has undergone massive data learning. Data for 50,000 people have been recorded. About 12 years have passed since a facial recognition terminal was made. In 2010, I made a facial recognition terminal with a product called FaceStation, and at that time, the algorithm memorized the elements of the face. Then I tried to change it to AI. BioStation 3 creates an AI-based algorithm instead of memorizing. The algorithm has become smarter in the continuous learning process by securing data from various angles of the face accumulated since 2010.

and this stability has been recognized worldwide, and a billion users currently use Suprema products.

a&s Adria: Suprema has recently been selected as Top 100 in the spin of the artificial intelligence fusion.

Kim: Suprema was selected as the 2023 Emerging AI + X Top 100, published annually by AIIA, the representative artificial intelligence association of South Korea. “Emerging AI + X Top 100” is an emerging company that is expected to be of greater value in the future, and refers to the top 100 national companies that will lead innovation through the merger between artificial intelligence ( IA ) and various industries ( X ). AIIA, industry, academia, and AI experts have conducted a quantitative and qualitative assessment of the future value of the company’s

technology and business among 1,800 candidates. 48 companies with specialized solutions such as manufacturing, finance, and medical care were selected in 11 fields of the domain industry, and 52 companies that combine AI technologies in various industries branches in six fields of the merger industry (Cross-Industry).

Suprema, which provides integrated AIbased security solutions, has been named in the image and video processing spin in the fusion industry. Suprema recently

introduced the BioStation 3, equipped with NPU ( Neural Network Processor ), an AI processor based on Deep Learning that leads the industry. BioStation 3 is an AI facial recognition solution that specializes in the contactless access authentication feature maximizing AI engine performance to accurately verify facial changes. The speed is so fast, so even in the busiest places of people, it is possible to authenticate quickly. I am honored to be recognized for its unique AI algorithm technology and future value. Suprema will continue to develop integrated security solutions using AI technology to always live safely and conveniently without users paying special attention.

a&s Adria: What are the solutions or products that Suprema is currently focusing on developing?

Kim: We are planning a major update to Biostar 2, an integrated access/ assistance/visitor management and management software. Features such as the control panel and mobile access card issuance will be updated to improve cloud-based scalability, connectivity, and performance, and to more efficiently

35 www.asmideast.com
INTERVIEW
Face Template on Mobile is the security industry’s first access authentication method that allows users to store and manage their facial authentication data on personal mobile phones without having to store it in a company database

manage access, assistance, and visitors. BioStation 3 is estimated to implement the ‘Face Template on Mobile’ feature, the first access authentication method in this industry.

a&s Adria: The technology called ‘Face Template on Mobile’ is unfamiliar to me. Can you explain it briefly?

Kim: It is a technology that allows users to store and manage their facial authentication information on their personal mobile phones without the need to save it in the company’s database.

a&s Adria: I understand that the automation system was introduced into the assembly and inspection process at your plant during the transition to a smart factory. Is there a specific reason?

Kim: The first reason to automate production lines in small and medium-sized companies is to maintain high quality. We are implementing a “high margin” business by promoting premium products and I believe that due to our high quality, the premium position has been filled. The second is productivity. Automation can increase productivity.

a&s Adria: Is it impossible to automate the entire process?

36 www.asmideast.com
INTERVIEW
Ultra Wideband wireless communication technology is a striking topic in the IT industry. It is expected to have a broader capacity of uses, such as digital keys, lost and found search, payment services, and interior navigation.

High-End Products

a&s Adria: I am curious about specific future perspectives, such as short and long-term goals.

Kim: Recently, large-scale orders for Supreme Biostar 2 are increasing in industries such as construction, oil, gas, and data center security, mainly in the Middle East, Asia, and North America. Furthermore, our access control hardware products are widely used as high-end products on the world market. It is a strategy to expand the participation of the software business in the future by completing the advancement of the current software platform and continuously winning large-scale projects.

Kim: 100% automation is difficult, but we are trying to automate simple tasks. I think it is significant and important that 100% of manufacturing is done in Korea. By 2023, the reliability verification process for all input products will be automated. Further, We seek to improve productivity by automating the logistical

movement between processes by introducing an automated guided vehicle ( AGV ) and further expanding the automated process to apply it to all products.

a&s Adria: What are the future trends in the security industry?

Kim: The demand for contactless access

control solutions including facial recognition and mobile access cards continues to grow. In particular, the introduction of mobile solutions that can authenticate access via smartphones in educational institutions with generations of digital natives is increasing.

In addition, UWB ( Ultra Wideband ) wireless communication technology, which provides a more convenient user experience, is a striking topic in the IT industry. UWB technology is expected to have a broader capacity of uses, such as digital keys, lost and found search, payment services, and interior navigation. UWB technology can also be applied to physical security. If UWB technology is applied to the access control system, when the user approaches the door, the door opens automatically as long as the user has only one smartphone without having to take an action for access authentication. In the future, this technology is estimated to be used to create an environment for

INTERVIEW

New Business Models

MOVING FROM COMPETITIVE BARRIERS TO COOPERATION

IN ORDER TO SUCCEED AND STAY RELEVANT, CHANNEL PLAYERS NEED TO LOOK FOR NEW WAYS OF DOING BUSINESS THAT CAN DELIVER BETTER RESULTS TO END USERS. IF BEFORE, BUSINESSES FOCUSED ON CREATING A COMPETITIVE BARRIER AGAINST OTHER COMPANIES, NOW THE TREND IS TO COOPERATE AND CREATE NEW ECOSYSTEMS THAT RELY ON COOPERATION MORE THAN ON COMPETITION.

In our conversations with security channel players over recent years, three important issues stand out. Distributors and integrators alike state that they are facing mounting challenges posed by product commoditization (cameras in particular), market consolidation, and the changing technology landscape.

Dropping camera prices and their increased availability through new sales channels (like IT distributors, big box retailers, or online portals) have reduced margins significantly and pushed many players out of the market. In parallel, big companies are acquiring more brands under their umbrella. When there are fewer and fewer players in the market, the need for more channel players diminishes.

Digitization and the growing acceptance of cloud technology pose additional challenges for the traditional channel player. If cloud companies can do business directly with the end user, the role of the channel player as an intermediary becomes less significant.

The growing sophistication of edge devices has also changed the demands for installation, integration, and maintenance. This puts pressure on channel players to improve their technical skills in order to deliver proper solutions.

Business Ecosystems Are Coordinated, Customizable, and Multilateral

When attending large security trade shows, you will undoubtedly see companies promoting their “ecosystem partners” in their respective booths. The confusing part is that the same company

may also be represented in several other “ecosystems.” Hence, clearer differentiation is needed to be able to identify a new business ecosystem from what is simply an integration partnership. Ecosystems are not controlled from the top down, but instead have some sort of mechanism for coordination — either through standards, rules, or processes.

38 www.asmideast.com MARKETS
Dropping camera prices and their increased availability through new sales channels have reduced margins and pushed many players out of the market

What Is an Ecosystem?

Management consulting company Boston Consulting Group defines a business ecosystem as “a dynamic group of largely independent economic players that create products or services that together constitute a coherent solution they couldn’t deliver on their own.”

This definition means that each ecosystem has a specific and defined solution – this is the value they deliver. Next, you have clearly defined members with different roles that work together to bring their solutions to life.

Ecosystems also have an orchestrator, a core member that coordinates the work of member companies. Orchestrators build the ecosystem, encourage others to join, define standards and rules, and help resolve conflicts.

Next, the products and services of the ecosystem participants tend to be customized to the ecosystem and made mutually compatible.

Finally, ecosystems are not made up of just bilateral relationships. This means that a successful contract between A and B (e.g., the camera manufacturer and VMS provider) can be undermined by the failure of the contract between A and C (e.g., the camera manufacturer and the video analytics provider).

This is the part of the definition that is most relevant to the security industry. If the partnerships within said ecosystem are all standalone partnerships (bilateral and not multilateral), this would indicate

that it is not an ecosystem, but rather an integration partnership. This can pose a challenge in security projects: how to identify and match the required partners – the interfaces between the components are not always well standardized, the specifications of individual components can change, and changes to one component require corresponding changes to other components for the ecosystem to realize its full value.

How Will This Impact the Security Industry?

The sad truth is that many business ecosystems fail. Many vendors have tried to create their own digital marketplace or promote themselves as orchestrators of an ecosystem. You can no doubt think of a few companies that have tried but didn’t make it.

This can be due to several inherent fac-

tors. One, ecosystems consist of largely independent players that agree to collaborate, which translates to limited control of the overall system by each participant and limited means to enforce or control the behavior of partners. Another potential issue lies in value distribution, which needs to be fair and attractive enough for all the participants to remain in the ecosystem.

We believe that we will see 2 trends in the coming years, increasing the number and nature of involved companies.

The first is the growing involvement of channel players. More distributors and integrators will shift to become value-added resellers and play a bigger part in localizing the vendor ecosystems, being able to contribute more due to their direct access to customers and their needs.

The second major development will be non-security companies joining existing ecosystems. For example, business intelligence or ERP companies can use video feeds from video security systems for better business efficiency and resource use.

Companies that can adapt to this new way of doing business and move from building competitive barriers to coordinating partnerships, stand to reap the most benefit. These partnerships can offer access to a broad range of capabilities that may be too expensive or complicated to build in-house as well as open new sales channels for existing products or services.

But perhaps their biggest contribution is as innovation drivers. The collaboration that ecosystems encourage can introduce new components or combinations of existing components that in turn will become a new product offering, enabling it to provide value also beyond security. n

39 www.asmideast.com MARKETS
Value distribution needs to be fair and attractive enough for all the participants to remain in the ecosystem
If the partnerships within the ecosystem are all standalone (bilateral and not multilateral), it is not an ecosystem, but rather an integration partnership
39 www.asmideast.com

MULTISENSOR CAMERAS BECOME MORE POWERFUL THAN EVER

WIDE-AREA MONITORING IS AN IMPORTANT PART OF VIDEO SURVEILLANCE, ESPECIALLY FOR END USERS MAINTAINING LARGE, SPACIOUS AREAS SUCH AS AIRPORTS, PARKING LOTS, AND WAREHOUSES. YET THE CHALLENGE HAS ALWAYS BEEN THE FACT THESE AREAS NEED TO BE COVERED BY MULTIPLE CAMERAS, WHICH CAN BE COSTLY AND CUMBERSOME TO DEPLOY.

n Source: asmag.com

editorial@asmideast.com

A single-sensor fixed IP camera offers high performance and great resolution, but it has drawbacks, the biggest of which is it covers a narrow field of view, which is a limiting factor when surveilling a wide area. Panoramic cameras overcome this problem by offering 180-, 270or even 360-degree views of a given area, allowing users to monitor multiple sides all from a single device.

Panoramic and Multi-Directional View

Panoramic views can be enabled either by a fisheye camera or a multisensor camera. A fisheye camera comes with a single fisheye lens, which produces a highly warped view of the scene. This leaves multisensor cameras, which include multiple lenses in a single unit, as an ideal choice. Multisensor cameras can be set up to offer panoramic and multi-directional views. Panoramic multisensor cameras fully cover a wide field of view. For example, a 180-degree camera can cover an entire street scene, and a 270-degree camera mounted on an outside corner of a building can provide total coverage in that space. These cameras are about providing situational awareness across wide areas.

Alternatively, multidirectional views can also be achieved. The sensors can be positioned so they point in multiple directions to offer detailed views from several angles in a particular area. They are ideal for areas such as hallways or road intersections, on outer corners of buildings, and especially in locations such as schools or retail stores.

Higher Image Quality

“Multisensor IP cameras contain two or more stand-alone sensor/lens modules in a single housing. This gives the camera a much higher pixel density for each field of view resulting in significantly higher image quality than what is available from a wide-

40 www.asmideast.com
in Video Surveillance PRODUCTS & SYSTEMS
AI

angle lens paired with a single sensor. With more sensors contained in a single housing, installers, and end-users benefit from reduced installation costs from the single mount and one network cable carrying both power and data,” said Rui Barbosa, Product Manager at i-PRO Americas. “Multisensor cameras also minimize the ports required on a PoE network switch while needing only a single software license for the VMS. These cameras also take up less space and are less intrusive than multiple individual cameras.”

Multisensor cameras offer various benefits. “Using only a single network cable and IP address, multi-sensor cameras take the place of several conventional cameras, allowing users to monitor multiple areas with one device,” said Uri Guterman, Head of Product and Marketing at Hanwha Vision Europe. “They offer significant cost savings for end users as they require far less cable, conduit, and mounting hardware, and involve a single installation process, single power source, single IP address, and single VMS license.”

Applications

The unique features of multisensor cameras make them ideal for any deployment where a high-quality, wide area of coverage is desired. “Multisensor cameras are extremely versatile and are suitable for large indoor and outdoor areas, regardless of the vertical market. For example, at an airport, a multisensor camera can be installed indoors to keep the terminals safe and secure by effectively monitoring the flow of traffic in two directions or outdoors to monitor the airfield. At a school, it can be installed indoors to protect hallway intersections or outdoors to safeguard the parking lot. For cities, the multisensor camera can provide optimal coverage of major road intersections,” said Hamish Dobson, Corporate VP for Enterprise Physical Security at Motorola Solutions. Vertical markets that can benefit from multisensor cameras include retail, cities, transportation, government, education, and hospitals. However, these cameras are used for non-security purposes as well, helping end users achieve further business intelligence. Beyond security, multi-sensor cameras have been proven to decrease shrinkage, resolve staff and customer disputes, provide forensic documentation to build cases and prevent fraudulent claims, and improve traffic

41 www.asmideast.com
PRODUCTS & SYSTEMS

flows in traffic monitoring, amongst many other applications.

Retail, in particular, can benefit. Multisensor cameras can be embedded with various analytics software to help organizations better deal with various aspects of their business. For example, retailers could use the 180-360 degree vision/view of the cameras to see how customers move around a store, where bottlenecks appear, and where cash desks are busy, so they can optimize the layout of the shop floor for greater operational efficiency and an improved customer experience

Empowered with Artificial Intelligence

More and more, IP cameras are empowered by AI-enabled video analytics, which adds more intelligence to the camera. Multisensor cameras are not exempt from this trend.

“Adding AI to a multisensor camera means a user does not have to constantly monitor for events, as it automatically alerts operators to specifically configured events, for example, vehicles entering an area and people loitering. They also provide accurate object classification, object tracking, rapid event search, and the possibility of edge-based business intelligence. Adding AI also reduces false alarms,” Guterman said.

“The addition of AI to a multisensor camera can turn video security systems from a reactive to a proactive solution. Security operators monitoring site cameras for long periods of time can experi-

ence attention fatigue and stress, which may result in events being missed. Multisensor cameras that come equipped with AI-powered video analytics can help detect and alert operators of potential events that may go unnoticed and need their attention, such as a person loitering or a vehicle trespassing, and help expedite response times and investigations,” Dobson said.

According to Barbosa, because AI-based analytics can be installed on each sensor, it allows much more customization with regard to analytics being used in each direction. “An installer might have one direction being used to count people coming through a door, while another direction might notify how many people are in a checkout line. A third direction could be monitoring unauthorized access to a restricted area. The possibilities are endless, and that fact that you can do all of this from a single vantage point is truly powerful,” he said.

Types of AI Used

At the minimum, AI used in multisensor cameras allows for object detection and classification. This enables the system to detect objects such as people, vehicles, number plates, and others. Then, there are more advanced solutions that can further analyze details in the scene. “More advanced models classify attributes such as age, gender, color and type of clothing, accessories (such as a hat, face mask, glasses, bag) as well as vehicle type, make color and even model,” said Uri Guterman, Head of Product and

Marketing at Hanwha Vision Europe. Advanced AI analytics are able to run on these cameras thanks to more powerful hardware, especially the system-on-chip, that has enough computing power to execute complex algorithms.

“When processing on the edge, it’s important to have a powerful and flexible SoC that can support multiple analytics processes in parallel while consuming very little power,” said Rui Barbosa, Product Manager at i-PRO Americas, who used his company’s offerings as an example. “Because the field of AI is changing so rapidly, i-PRO has chosen the powerful Ambarella AI SoC which is also advancing the technology behind autonomous vehicles, IoT, and robotics.”

Indeed, AI and multisensor cameras form an ideal solution for different types of users, who can be more situationally aware and perform their tasks with more effectiveness. “These capabilities can provide greater insight into what is happening at the site, allowing security operators to make better-informed decisions and respond to events. Multisensor cameras have no barriers to using AI analytics compared to standard cameras and the value they bring depends on the use case, the installation, and the field of view,” said Hamish Dobson, Corporate VP for Enterprise Physical Security at Motorola Solutions.

Selection Process

There are certain key considerations to be made when selecting an AI multisensor camera. First, it must be noted that

42 www.asmideast.com
& SYSTEMS
PRODUCTS

in order for the AI to work effectively, the image quality must be good. Therefore, the user should look at the various specs to make sure the camera can produce a good-quality image.

“Total resolution and frame rates are important specifications to consider. Multisensor cameras are intended to be deployed in large areas where people, vehicles, and important details might be far away from the camera. The higher the camera’s resolution and frame rates, the easier it will be for it to capture the level of detail required, giving a clearer picture of what’s happening at the site,” Dobson said.

“IR illumination is another important feature to consider, particularly for monitoring outdoor areas where dusk or nighttime can make it difficult to see. The option to have IR illumination on multisensor cameras allows security operators to see the site clearly even when it is poorly lit or completely dark,” he added. Being able to work with the right VMS is

another key factor to consider. “It’s crucial that the AI camera be paired with a VMS system that supports all the metadata that the camera is generating. If the VMS can’t support all the data from the camera, then the system is limited from the start. This is why i-PRO created the Active Guard plugin that can be installed in popular VMSs such as Genetec and Milestone allowing them to display and work with every attribute the camera can detect,” Barbosa said.

Optimizing Installation

How to install a multisensor AI camera is also critical if optimal results are desired. In this regard, various considerations also need to be made, for example, the area to be monitored, the field of view, and the ideal height for installation.

“For the best AI-based analytic performance, it’s important to not mount the camera too high. A well-placed multisen-

PRODUCTS & SYSTEMS

sor camera can easily replace three or four standalone cameras at the corner of a building or a hallway intersection. For hallways, it’s also important to choose a camera that can optimize the aspect ratio to display more hall than a wall. Depending on the distance to be covered, it may be useful to specify 4K sensors to ensure the pixel density is high enough to discern faces and other distinguishing features,” Barbosa said.

“Multisensor cameras bring a lot of flexibility and can be installed in many different ways. For example, 180-degree multisensor cameras are typically used for wall-to-wall coverage, whereas 270-degree multisensor cameras are most suitable to cover building corners with no blind spots. On the other hand, 360-degree multisensor cameras offer excellent coverage when installed in the middle of intersections and wide areas such as parking lots,” Dobson said. It’s good to note that there are certain online tools that can help optimize installation. “Online tools such as the Wisenet Toolbox Plus allow users to make simple field-of-view calculations and select the right capabilities, lens options, and accessories for their specific installation. System integrators can easily search, filter and compare product specifications side-by-side and then compile a list of the products required for a specific project. This, in turn, generates a report on the estimated bandwidth and storage requirements for the project,” Guterman said. n

Uri Guterman, Head of Product and Marketing, Hanwha Vision Europe Rui Barbosa, Product Manager, i-PRO Americas
43 www.asmideast.com
Hamish Dobson, Corporate VP for Enterprise Physical Security, Motorola Solutions

Smart Investments in Security

BOLLARDS FOR MORE ADVANCED STOREFRONT SAFETY

WE OFTEN DISCUSS ELECTRONIC SECURITY SYSTEMS SUCH AS VIDEO SURVEILLANCE AND ACCESS CONTROL. YET CERTAIN PHYSICAL BARRIERS ARE ALSO IMPORTANT ELEMENTS IN SECURITY. AMONG THEM ARE BOLLARDS, WHICH HAVE VARIOUS APPLICATIONS.

Bollards serve many purposes. For store owners, bollards can play a key role in protecting customers/staff against vehicle crashes. “They can be used as delineation devices to separate moving traffic from another area. Sometimes this can be to delineate a vehicular traffic lane from a bike lane, or they can be utilized to differentiate a pedestrianized area (for example outside a stadium at the ticket lines) from a parking area or roadway. We also see them utilized many times to protect critical infrastructure (for example electrical equipment) or retail storefronts from vehicular impact,” said Joseph Hauss, President of Gibraltar Perimeter Security.

The Most Expensive Bollard in the World

Retail storefront safety can be much enhanced by bollards, the lack of which can be quite devastating. This is underscored in an incident in which, according to an article by the Security Industry Association, a Chicago-area man lost

both his legs after an accidental crash in 2017 outside a 7-Eleven store where bollards were not installed. According to the article, the man in February received a record-breaking US$91 million settlement from 7-Eleven.

To this, Rob Reiter, Principal at Reiter and Reiter Consulting and Co-Founder of the Storefront Safety Council, commented: “What’s the most expensive bollard in the world? The one that was not installed in front of the sidewalk at a 7-Eleven store in Chicago. I have been studying the problem of storefront safety and vehicle-into-building crashes in the United States since 2010. We founded the Storefront Safety Council in 2012 to bring focus and hard data to a serious public health and safety problem that was being overlooked. What we have found after all these years is that safety

has been very often neglected in those retail and commercial areas where Americans most often eat, work, play and shop.”

Thousands Injured Annually

Using the council’s statistics, Reiter cited certain figures that are particularly alarming. “Vehicles run into commercial and retail properties more than 100 times per day or more than 36,000 times per year. Each year, more than 16,000 customers, pedestrians, and employees are injured, and as many as 2,600 are killed. Many of these crashes are low-speed parking lot incidents that are easily preventable,” he said.

He added: “In the recent 7-Eleven legal settlement, evidence was revealed that confirmed more than 6,300 store -

44 www.asmideast.com
PRODUCTS & SYSTEMS

front crashes occurred at unprotected 7-Eleven stores over 14 years. Approximately 800 stores were struck three times or more, with more than 100 struck more than five times. The totals worked out to 1.3 storefront crashes per day or about 500 crashes per year at unprotected stores.”

These incidents highlight the importance of installing bollards at these premises.

“Some of these areas have no protective bollard devices in place, while other places have bollards in place, but it is the wrong bollard and they still have an incident. The best practice is to procure a crash test-certified bollard from a reputable U.S. manufacturer,” Hauss said.

“Bollards can be designed with aesthetics in mind with a number of decorative sleeve designs and marketing wraps that can be utilized as a revenue driver for the end user, as it can be ad space.”

Selection

The next question, then, becomes how to choose the right bollard solution for the storefront. According to Hauss, most bollards are made of carbon steel or stainless steel that is crash test-certified. “However, there are some products in the marketplace that combine proprietary materials outside of this in their design with some combination of carbon steel and/or stainless,” he said.

He adds that the user should also identify what their threat vehicle is and the location and traffic directions around the facility. “Is it just nose-in parking and pedal error that you are concerned with, or could a vehicle come off the road directly into your building at 50 miles per hour (for example errant vehicle at high speed)? Do you have high-value assets in your store that make it a target for ram raid attacks

where someone will try to physically knock down the security bollard with multiple impacts from a vehicle to leave it and make a getaway in another vehicle? These are just a couple of questions to look at when identifying the correct bollard and the vehicle type and penetration necessary for your facility,” Hauss said.

Installation

The installation of these bollards is also important. According to Hauss, bollard spacing depends on vehicle vector analysis. “There are sites where nose-in parking is at a 45-degree angle and others at 90-degree. ADA (Americans with Disabilities Act) spacing also must be looked at when implementing bollards, which can differ by the municipality on what their minimum requirements are for gaps. Can the vehicle actually come in at 90 degrees? This is an important question on the spacing,” he said.

Hauss adds that spacing can also depend on the manufacturer and how they were tested and certified. “Typically, 48to 60-inch maximum clear spacing between bollards will accommodate the angled and nose in parking and meet ADA, but you must look at how the product was tested and certified,” he said. “If a product was tested with 36-inch spacing and it is installed at 48-inch clear, it may change the loading, as two to three bollards would be impacted in the test, but only one bollard would be hit in the actual 48-inch installation, as most vehicles are less than 8 feet in width. It all starts with utilizing a well-versed consultant that knows what products are in the marketplace and then utilizing a reputable U.S.-based manufacturer.” n

45 www.asmideast.com
PRODUCTS & SYSTEMS

VISION OBJECT ANALYTICS

UNLOCKING THE POTENTIAL OF NEXT-GENERATION TECHNOLOGY

VIVOTEK provides a full range of AI-based IP surveillance solutions, from cameras to video management systems. It consists of AI-based IR, Smart Motion Detection, Smart Video Content Analytics, Vision Object Analytics, and Deep Search

VIVOTEK’s line of AI deep learning products enables customers to automate their everyday surveillance with pre-defined detection rules and real-time computing, reduce efforts for post-event footage review, and enhance the accuracy of evidence search by introducing multiple attributes for both people and vehicles.

NVR for a Full Integration

The new ND9542P and ND9442P NVRs with advanced features such as powerful Deep Search, Scene Search, and Userfriendly Interface, allowing security professionals to quickly identify and act on problems before they become major issues. It also features embedded 16x 802.3 at/af PoE ports to provide users with easy and convenient IP camera installation and supports remote and mobile access via VIVOCloud and iViewer apps for both iOS and Android devices. The VIVOCloud app provides instant push notification and direct video playback functions when triggered by an alarm notification and provides users with a flexible and intelligent NVR for seamless use in small to medium-sized video surveillance applications. The new NVR can be used in VIVOTEK server architecture in VSS with full integration where we can manage and monitor multisite NVR installations from one place.

Next Generation NVR Firmware

Core+ AI firmware takes Core+ up to another level. Core+ AI ND9532P and ND9442P are empowered with Deep Search, utilizing AI to provide the fastest, smartest, and most efficient evidence search user experience. VIVOTEK cameras are enabled with Vision Object Analytics to provide the metadata used by Deep Search’s AI. Deep Search is comprised of two main functions: Attribute Search and Scene Search. Attribute extraction is possible by gender, age group, and color of clothing, including backpacks or headgear, and vehicle type and color.

Where Do You Use It

Attribute Search and Scene Search features can be used in many scenarios for better detection, recognition, and identification of wide public spaces where circulates a very big number of people. For example, in big shopping malls, this solution can be very useful for security

in different areas, but monitored from one place over the VAST Security Station VMS. All the analytics and AI attribute features are done on the edge, which means all events from cameras like FD9391EHTV-v2 and IB9365-EHTV-v2 will be provided over NVRs on a central monitoring place where more VSS security guards will have the possibility for easy monitoring for huge spaces. As an example, in the scenario of a robbery in a shopping mall, if security guards get access to the basic descriptions such as the color of the shirt, the cap on the head, and the gender, they can start to search for the robber very fast. With deep search solutions, they can use filters with this description and find the suspected people. Or in a very often scenario of missing kids, with the basic information provided, they can be found, and guards can start to trace their movements. For inquiry or demo, please contact the Inteleye office in Jeddah at info@inteleye. sa or +966 540413960. n

46 www.asmideast.com PRODUCTS & SYSTEMS

PROJECT-BASED SOLUTION TAILORED FOR YOUR NEEDS

There are multiple components of security technology that work together to create a reliable and advanced security system in today’s fastgrowing environment full of challenges. We supply project-based solutions, determine the needs of Automatic doors, Accessories, Access Control solutions, Intruder Alarms, Fibre & Network products, and offer solutions that require new-age technologies and superior quality. Advanced Middle East Distribution deploys manpower with the latest technological expertise with options open for growth to any new technological advancement as a challenge to overco-

me and deliver solutions through sheer dedication and hard work.

Team of Good People Always on Disposal

The use of cutting-edge technology & high-quality materials has enabled us to become a synonym for absolute reliability. All our products are selected after rigorous testing and validation. No matter the length of project, no matter what challenges you are faced with we are here to help, you will have a dedicated team who will always offer a continuity of service and are committed to ensuring you have everything you need to complete the project. Our team of Good People is always there for you.

Striving to Uphold Throughout All Sector

AMED believes that our strength lies in the comprehensive nature of the service we offer to our customers an individually tailored, one-stop package the keywords within the company are ‘personal service’ a philosophy we strive to uphold throughout all sectors of our operation without compromising on quality, we still manage to guarantee realistic prices, making the company a viable option for any potential customers and partners. We are dedicated to the quality policy that will ensure that our products and services fully meet the requirements of our customers at all times. n

47 www.asmideast.com
PRODUCTS & SYSTEMS
Middle East Distribution FZCO Established in 2020 based in Dubai, United Arab Emirates, and one of the leading providers of Entrance Controls, Security systems, and Door automation for the customers in Middle East, Southeast Asia, and Africa.

CASE STUDY – IRIS RECOGNITION

PROVIDING SAFETY & SECURITY AT WORLD’S FOREMOST PARTICLE PHYSICS LABORATORY

After completing a study of available access control options, CERN selected an iris-recognition system from Iris ID to replace existing fingerprint readers for identity authentication

CERN, located near Geneva on the Swiss-French border, is recognized as the world’s leading particle physics laboratory. The facility’s security team needed improved access control to maintain the safety of international scientists and staff, irreplaceable research data, and high-value assets. The solution needed to be accurate, quick, and reliable - all while maintaining a database of more than 10,000 registered people.

The Challenge

The requirements included the ability to manage a large database of scientist and staff identities, control access to CERN’s underground facilities, protect worker safety by limiting access to hazardous areas, and ensure scalability to meet the needs of new facilities.

The Solution

After completing a 2008 study of available access control options, CERN selected

an iris-recognition system from Iris ID to replace existing fingerprint readers for identity authentication. Along with greater speed and accuracy, the iris-based system was judged to be more hygienic and capable of supporting large-scale applications. CERN had 55 iris readers installed at the main entry and access points to certain work areas along the 27-kilometer circular Large Hadron Collider. The LHC is the main underground particle collider hosting most of the organization’s experiments. In 2015, another 25 iris-recognition-controlled access points were added to the radiological area of CERN’s Proton Synchrotron (PS) accelerator area.

The Results

The Iris ID system quickly moves 3,000 people daily through the collider’s and accelerator’s 80 access points. Identifying authentication now requires less than a second. The process is safe, involving no contact, lasers, or bright lights. The system helps keep CERN scientists and staff from accessing areas for which they

lack authorization and/or may be dangerous. About 20 additional Iris ID readers will be installed at access points for another CERN accelerator that is being refurbished and due to reopen in 2019. “The high value we place on the security of our people, our work, and our facilities demands tight security. The Iris ID system has been up to the task at 100 meters below ground”, says Pierre Ninin, CERN head of safety systems engineering.

About Iris ID Systems Inc.

Iris ID Systems Inc. has been active in iris recognition research, development, and production since 1997. Today U.S.based Iris ID Systems is a global player in the iris recognition business. IrisAccess® is the world’s leading deployed iris recognition platform and is found in thousands of locations, authenticating the identities of millions of persons. More people look to IrisAccess for iris-based authentication than to all other iris recognition products combined. For more information, visit www.irisid.com. n

48 www.asmideast.com PRODUCTS & SYSTEMS
n Source: Iris ID

SUPPORTING THE GLOBAL SECURITY COMMUNITY FOR 50 YEARS

16-18 MAY 2023 | EXCEL LONDON

Fueling security leaders with the expertise and innovation to keep people and assets safe

Connect face-to-face with the entire security supply chain and network with global security companies across access control, video surveillance, perimeter protection, cyber security and more.

The best exhibition for networking with professionals in the field, due to its privileged location. Add the chance to observe the trends and novelties in the security field, and then a prospective visit becomes worthwhile.

Advancis Software and Services

Setting new industry standards for quality and sustainability Official Sponsor
GET YOUR FREE TICKET NOW!
Official Installer Partner

CYBER SECURITY – CHATGPT AS A SECURITY PHENOMENON

ALLY OR WEAK LINK IN CYBER DEFENSE?

AFTER

The research company OpenAI recently confirmed that in March 2023, the widely popular ChatGPT AI bot was indirectly responsible for a data breach due to a bug that allowed the leakage of users’ private information. The disclosed information included subscribers’ names, email, and physical addresses, as well as the last four digits and expiration dates of their credit cards.

Leakage of Personal and Financial Data

The data breach also caused the ChatGPT to shut down temporarily, and users whose personal data were not compromised could at least see other users’ chat logs with the AI bot within their own app. OpenAI attributed the data breach to a bug in the open-source Redis library. As an additional damage control measure for the reputation of the popular bot, OpenAI announced that it would personally contact all users whose financial data were exposed during the incident. So, it’s the case closed now and everyone’s happy? Not quite.

Italy Shuts Down ChatGPT, EU Works on Umbrella Law

The year 2023 started badly for the AI service that was launched in November 2022, as evidenced by the Italian government’s decision to shut down ChatGPT due to the platform’s potential to compromise the privacy of its users. In early April, the Italian data protection authority ordered OpenAI to temporarily stop processing data from Italian users due to an investigation into the violation of European

privacy regulations. The explanation given was that users were allowed to see parts of the conversations that other users had with the chatbot. Italian regulators stated that there is currently no legal basis for this type of mass collection and processing of personal data. Due to this invasion of users’ privacy, OpenAI risks facing a fine of 20 million euros. Italy is not the only country whose regulators have found themselves in a difficult situation when it comes to the rapid pace of AI advancement and its implications for society. The European Union is currently working on an umbrella law on artificial intelligence that will also have a security component, with a focus on protecting the privacy of users. This is seen as a middle ground compared to the ban on ChatGPT that is

currently in force in countries like China, Iran, North Korea, and Russia. The downside of this approach is that the European AI law may not come into force for several years, by which time this technology will have evolved beyond recognition.

Warnings From Europol

Lawmakers may react more quickly if they take seriously the warnings about ChatGPT that Europol issued in March of this year. According to them, criminals are already well aware of the possibilities of such artificial intelligence platforms for their goals. This involves its use for phishing and the dissemination of disinformation and malware. As a first step, criminals could use ChatGPT to significantly

50 www.asmideast.com
THE POPULAR CHATGPT RECENTLY SUFFERED A DATA BREACH, EUROPOL AND SECURITY COMPANIES SCRUTINIZED IT AS A POTENTIAL ALLY BUT ALSO AS A SUSPICIOUS PHENOMENON IN THE VIRTUAL PERIMETER OF CYBER SECURITY
INSIGHTS
Phishing emails were once easily recognizable by poor syntax and unconvincing content. Today, ChatGPT can get the job done at a professional level

speed up the research process in fields they are not familiar with. The bot can easily help them create convincing texts to lure victims into fraudulent schemes and provide them with information related to terrorism, cybercrime, and illegal activities. “Although ChatGPT uses protective measures such as content moderation policy and refuses to answer questions described as harmful or biased, attackers can easily bypass them with smart instructions given to the AI,” Europol stated. In this regard, the chatbot’s ability to mimic writing styles emerges as an important tool for future phishing attacks. Because of the apparent authenticity of this content, users will be more likely to click on fake links that require them to leave personal data.

Also, by using ChatGPT, even attackers who are not native English or any other language speakers can create flawless and seemingly legitimate emails. At the same time, creating such messages using ChatGPT is a fast and massive process, with content personalization based on imitation of the tone, style, and details obtained from the collected personal data of the victim.

A More Positive Role

However, there are two sides to every arms race, so many in the cyber community also see ChatGPT as an ally in the fight against crime. Ethical hackers are already using existing AI tools to assist in vulnerability reporting, code sample creation, and key trend identification in large datasets. What AI, including ChatGPT, can really help security teams with is speed as a key ingredient in vulnerabil-

Misinformation and Coding

The ability of ChatGPT to quickly produce seemingly authentic text makes it an ideal platform for spreading propaganda and misinformation with relatively little effort. ChatGPT can also be used to write computer code, especially for less skilled criminals who do not know how to code but want to use it to infiltrate a desired website, according to Europol. The countermeasure, advised by Europol experts, is to raise awareness about the potential misuse of ChatGPT to ensure the timely closure of legal and technological loopholes before they open wider shortcuts for cybercrime.

ity management. Just as much as ChatGPT can help attackers create authentic phishing messages, the same potential can be used to identify this content. Over time, AI advocates believe that ChatGPT will become a useful tool to determine whether suspected phishing content is generated with malicious intent or is authentic. Additionally, even at this stage, ChatGPT can become a valuable tool in

“war games” that simulate hacking attacks and defense against them.

ChatGPT as a Defensive Player

In simulations conducted by several cyber companies, this bot provided detailed responses to inquiries about vulnerabilities in software often used by system security testers, such as Nmap. ChatGPT even provided advanced suggestions for desirable defense update scripts, all with illustrations in the form of written lines of code. As cyber-attacks become more frequent and complex, AI tools like ChatGPT can become valuable defensive players on overloaded IT teams, primarily because they are capable of processing huge amounts of data and predicting trends based on them. With the advancement of complementary machine learning and natural language processing technologies, this process will be even faster and will help strengthen the reputation of ChatGPT and related systems as a supportive pillar of cyber defense instead of the image of a dystopian ally of high-tech crime. n

51 www.asmideast.com
INSIGHTS 51 www.asmideast.com

SECOND WORLD POLICE SUMMIT HELD IN DUBAI

A STEP TOWARDS A GLOBAL PLATFORM FOR COMBATING HIGH-TECH CRIME

THE EVENT RECORDED A RECORD NUMBER OF VISITORS, WITH NUMEROUS DIGNITARIES FROM THE HOST COUNTRY, INTERPOL, FBI, EUROPOL, AND GLOBAL TECH COMPANIES

As a city that regularly tops the list of safest places to live in the world, choosing Dubai to host the second World Police Summit seems almost logical. For those who want to emulate the exceptional security achievements of the host city, the second World Police Summit was the best address to review the latest technological trends and best practices for global police and security structures.

Record Numbers

This year’s Summit raised the bar compared to its predecessor and hosted 13,500 visitors from 110 countries. Over 3 days, attendees took part in 140 sessions, with 240 speakers discussing key topics for the future of policing, including crime prevention, operational innovations, strengthening defense capabilities, combating financial and cyber-crime, counter-narcotics, forensics, drone use, and the use of police dogs. The attendees had the opportunity to learn about the contemporary challenges faced by police forces on a global level, many of which are common to all law enforcement agencies and security structures regardless of state borders. In response to them, the latest technological achievements, strategies, and innovations in the field of public safety protection and law enforcement were presented during the Summit.

Transnational Crime a Huge Challenge

Yet, the WPS is not all about technology, and the Dubai City Police, as the event’s host, has been well aware of that. That

Investigations are slow, money moves fast

As part of the Summit, a conference on financial crime and money laundering sponsored by the UAE National Anti Money Laundering and Combatting Financing of Terrorism and Financing of Illegal Organizations Committee was held. One of its notable speakers was Jonathan Joyce, a special agent of the Federal Bureau of Investigation (FBI) in this field. He focused on the importance of international cooperation in the fight against money laundering because, according to him, “investigations can take a long time, while money circulates very quickly”.

is why the Summit served as a platform within which the global police community can share experiences and best practices, as well as focus on creating common approaches to solving the challenges facing law enforcement agencies across the globe.

The Summit was opened by His Highness Sheikh Hamdan bin Mohammed bin Rashid Al Maktoum, Crown Prince of Dubai and Chairman of the Executive Council of Dubai, who commented on the

role of police forces in an increasingly networked world. He emphasized the importance of international cooperation in preserving global security and fighting crime in the most efficient manner.

Maktoum praised the police bodies of the United Arab Emirates for their activities in maintaining the achieved high levels of security, expressing his desire for the local law enforcement agencies to regularly cooperate with police structures from all over the world.

52 www.asmideast.com
EVENTS

Record-Breaking Results of the Local Police

The second edition of the Summit was held at the right time as it is evident that a new security environment is now emerging in the world, characterized by cross-border criminal activities and the increasing use of new technologies by transnational criminal organizations. This devolution of the environment in which crime takes place has only emphasized the importance of international cooperation between law enforcement agencies and other security professionals. The first step on that path is creating a joint platform for cooperation, and the World Police Summit is currently the best address for that, claim the attendees.

Addressing the delegates at the opening ceremony, His Excellency Lieutenant General Abdullah Khalifa Al Marri, Commander-in-Chief of Dubai Police, joined His Highness Sheikh Hamdan bin Mohammed’s appeal for international cooperation in creating a safer world.

Investigations Are Slow, Money Moves Fast

In addition to the aforementioned exhibitors, the distinguished guests at the WPS included His Excellency Mohammed bin Taliah, Head of Government Services of the UAE Government, Ali Faisal Baalawi, Chief of the UAE Financial Intelligence Unit, Sujit Kumar Mohanty, Chief of Regional Office for the Arab States with the United Nations Office for Disaster Risk Reduction, Maj. Anood Al Saadi, President of the Dubai Police Women’s Council, Sébastien Moras, Chief of Staff of Europol, Elvira Zsinkai, President of Roadpol, Ernesto Bianchi, Director of Investigations at the European Anti-Fraud Office, Chady El-Khoury, Deputy Unit Chief for the Financial Integrity at International Monetary Fund and many others.

“As part of our commitment towards assisting friendly nations and international organizations, the UAE, represented by the Ministry of Interior and Dubai Police, is proud to have helped our international partners to arrest hundreds of fugitives and disarm tens of criminal organizations over the last two years,” added Al Marri. The Commander-in-Chief of the Dubai Police also presented the record-breaking results of the local police in international operations that took place between 2020 and 2022. They culminated in the arrest of 597 international fugitives from more than 101 countries.

Hideaki Ito, Deputy Director of the Drugs and Firearms Division of Japan’s National Police Agency (NPA), illustrated this by describing a highly successful police operation that was made possible by information sharing between Dubai Police and the NPA. “Last December, Dubai Police gave us information about methamphetamine being concealed in a passenger’s baggage on a flight to Japan. Based on this information, we were able to arrest the criminal who smuggled the drug to Japan and seized about 2.4 kg of methamphetamine,” said Ito.

Global Tensions Demand a Joint Response

The participants were also addressed by Jürgen Stock, Secretary General with

lINTERPOL, who echoed the sentiment of the event’s hosts. He blamed growing tensions on the international stage for the creeping sense of general insecurity which forced countries to focus more on their internal problems.

“Tensions are rising internationally, crises are bringing national priorities inward and towards more traditional comfort zones. Yet that is precisely where global solutions are most needed. That is how we forge and enhance partnerships, that is how we ultimately bridge security gaps across regions, sectors, actors, and geopolitical blocs,” said Stock.

Security Technologies Can Also Support Business

At the exhibition area of the Summit, over 170 companies had the opportunity to connect, network, and socialize with their new and existing users, and show them the cutting-edge products and technologies that can support their business. That’s why this year’s Summit hosted many leading technology companies that are transforming the global security environment in innovative ways.

One of them is Schneider Electric whose representative Manuel Rodrigues addressed the participants as the Vice President for the company’s Secure Power division in the Gulf region. He described the WPS as a key platform for the exchange of ideas and cooperation with all stakeholders in achieving their goals.

“The World Police Summit is critical in driving this as it provides a unique platform to share ideas and collaborate with key stakeholders toward achieving these goals,” he added, summing up the general perception of the WPS as a resounding success for both the hosts and the attendees who are already marking their dates for its next iteration. n

53 www.asmideast.com
EVENTS
53 www.asmideast.com
Our general manager at the a&s Middle East stand with Sanita Lisica, counselor for economic affairs at the Embassy of Bosnia and Herzegovina in the UAE

The Security Event 2023

DESIGNED BY THE INDUSTRY, FOR THE INDUSTRY

The Security Event UK’s best Award-Winning Commercial, Enterprise and Domestic Security Show 2023 witnessed a record breaking response. Exhibitors from all around the world flocked to Birmingham to participate in the event supported by eight founding partners.

Hosted at the UK’s best-connected venue, the NEC Birmingham is ideally located to create a truly national event for professional security installers, system integrators, consultants, specifiers and commercial end users from all corners of the UK.

The event was developed with support from a group of the industry’s major players to deliver a world class exhibition dedicated to UK security professionals, installers and integrators, providing opportunities for direct engagement across the supply chain.

“A lot of our partners are here. The other thing that is quite important is a different type of client that comes here is really important. We have been here every year and it’s been a very successful event for us in the past.”

Pip Courcoux, head of production in ASSA ABLOY UK

“We are looking typically anywhere between five to ten million dollars in opportunities and we have definitely seen that probably already in terms of conversations we have been having. There has been great foot traffic and a lot of people in terms of events. This is absolutely one of the biggest in the UK and that is why we have been here for three years.”

Connor Chatterton, Axon enterprise account executive Adjacent to Birmingham Airport that welcomes over 12m passengers per year with over 150 direct flights from Europe, Middle East and USA, thus making The Security Event easily accessible from around the globe.

The ‘series of events’ provide our exhibitors with additional access to highly qualified and diverse audiences whilst adding even more value and return to our visitors with seamless access to all events. n

54 www.asmideast.com
EVENTS
Adis Hodžić, Global Security LCC executive director and Amar Pap, business development manager

Key Security Events in 2023/2024

Key Security Events in 2023

MAY

Security Middle East Conference

9 May, Riyadh, Saudi Arabia

https://securitymiddleeastconference.com

SEP

ISAF Fuari

14-17 September 2023, Istanbul, Türkiye

https://www.isaffuari.com/en/isaf-security/

OCT

OFSEC, Oman Fire, Safety and Security Event

9-10 October 2023, Oman

https://www.ofsecevent.com/

MAY

IFSEC International

16 – 18 May, London, UK

www.ifsecglobal.com

OCT

Intersec Saudi Arabia

3 - 5 October 2023 at Riyadh, Saudi Arabia

https://intersec-ksa.ae.messefrankfurt.com/ ksa/en.html

OCT

Adria Security Summit Powered by Intersec

25-26 October 2023, Ljubljana, Slovenia

https://www.adriasecuritysummit.com

MAY

SICUREZZA, International Security & Fire Exhibition

15-17 november 2023, Rho Fiera Milano, Italy

https://www.sicurezza.it

International Exhibition for National Security & Resilience

21-23 May 2024, ADNEC, Abu Dhabi, UAE

https://isnrabudhabi.com

56 www.asmideast.com
NOV

Market & Contacts

Bosch empowers you to build a safer, more secure and enjoyable world

Robert Bosch Middle East FZE

Address: DAFZA, Block A701, West wing 5, Dubai Airport Free Zone, Dubai, United Arab Emirates

TECHNICAL PROTECTION

Vendor-neutral Physical Security Information Management (PSIM)

Advancis Middle East

P.O. Box 73309

Abu Dhabi, United Arab Emirates

Tel. +971 2 444 2503

Email: info@advancis.ae

Web: https://advancis.net

The global leader in door opening solutions

United Arab Emirates

Qatar Egypt Saudi Arabia

info.me.open@assaabloy.com www.assaabloy.com/ae

Tel.: +971 4 212 3300 www.boschsecurity.com

CCTV Products

Honeywell Commercial Security offers integrated security solutions within:

* Video Surveillance

* Access Control

* Intruder Detection both as standard and cloud based systems.

Contact: Dubai: +971 4 4505 800 Abu Dhabi: +971 2 2349 101 https://www.honeywell.com/ae

Dahua Technology Co., Ltd.

IP Solutions

1187 Bin’an Rd., Binjiang, Huangzhou, Zhejiang 310053, China

Tel: (86-571)8768 8883, 2893 9666 | Fax: (86-571)8768 8815

Email: overseas@dahuatech.com | www.dahuatech.com

Video surveillance products and solutions

A global player in sensing technologies

Indoor intrusion sensors

Outdoor beam sensors

Outdoor intrusion sensors

Vehicle detector for gate and parking systems

People counting www.optex-fa.com

ELECTRONIC LOCKING SOLUTIONS FOR HOSPITALITY

Tel.: +34 943 344 550 Email: hospitality@saltosystems.com www.saltohospitality.com

www.hikvision.com

Magazine Topics

Man Guarding

Technical protection

• Video surveillance

• Access control

• Intrusion detection

• Item theft protection

• IP and network solutions

• Perimeter protection

• Fire detection

• Gas detection

Mechanical protection

Cash/valuables-in-transit

Cyber security

Digital forensics

Software solutions

Smart home

Internet of things

Security management Investigations

Building management

Market research

Legislation and standards

The world leader in access control, time & attendance and biometric solutions

m.shenawy@supremainc.com) Tel: +971 4 2357 996 www.supremainc.com

Public safety, public communication and public space design

TOA Electronics Europe GmbH www.toa.eu marketing@toa-eu.com +49

FD9387-FR-v2 10,000 Faces on the EDGE

Please contact: Tel: +966 920033372 info@inteleye.sa

57 www.asmideast.com
19 0 Public
TOA 1
(0)40 25 17
communication public
58 www.asmideast.com Index of Advertisers PAGE ADVERTISER COUNTRY E-MAIL WEBSITE PRODUCTS AND SERVICES 9 ADI GLOBAL DISTRIBUTION USA sales.me@adiglobal.com www.adiglobal.com 7 ARIGAMIX SLOVENIA info@arigamix.com www.arigamix.com 3 ASSA ABLOY SWEDEN info@assaabloy.com www.assaabloy.com 13 INTEGRATE MIDDLE EAST UAE IntegrateME@dwtc.com www.integrateme.com 11 TAWASOL JORDAN info@tawasoltrading.com www.tawasoltrading.com 17 TP-LINK CHINA info.mea@tp-link.com www.tp-link.com 5 VIVOTEK TAIWAN info@inteleye.sa www.inteleye.sa OTHER 55 ASMAG TAIWAN info@taiwan.messefrankfurt.com www.asmag.com 15 ADRIA SECURITY SUMMIT BOSNIA-HERZEGOVINA summit@asadria.com www.adriasecuritysummit.com 49 IFSEC GREAT BRITAIN james.moore@informa.com https://www.ifsecglobal.com 60 ISNR UAE info@idexuae.ae https://isnrabudhabi.com 21 OFSEC OMAN nk@muscat-expo.com www.ofsecevent.com 57 SICUREZZA ITALY paolo.pizzocaro@fieramilano.it www.sicurezza.it E-mail: info@connect2bnet.com Web: www.connect2bnet.com B2B Platform: https://pro.connect2bnet.com ü PARTICIPANTS PROFILES ü MARKETPLACE ü EFFECTIVE MACHMAKING ü VIDEO CALL & MESSAGING ü VIRTUAL EVENT MANAGEMENT Maximized matchmaking connectivity in Security, Automation, IoT, ICT, Mobility, and Smart Solutions industry
IN A WORD, MANY SOLUTIONS. www.sicurezza.it fireshow.com.br www.exposec.com.br ONE PLACE. FOUR EXHIBITIONS INTERNATIONAL NETWORK
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.