a&s international july 2014(trial version)
DESCRIPTION
The Leading International Security Magazine for Professional Buyers.TRANSCRIPT
C
M
Y
CM
MY
CY
CMY
K
M00A.pdf 1 2014/7/7 下午11:05
14 JUL 201422 www.asmag.com 22
Multi-Channel Retailing Drives
MULTI-FACED
RETAIL MODELS
July 2014CONTENTSVertical Market
P.52
Special Feature Intelligent Video Solution
Cracking Down on Camera Hacks
Banking on Enhanced Security, Business with Intelligent Video
P.60 P.66
More and more, retailers are looking
into better and more efficient ways
to reach out to their customers and
enhance the shopping experience.
M014-016.indd 14 2014/7/7 下午9:27
16 JUL 201422 www.asmag.com 22
CONTENTS
P.14 ContentsP.18 Editor’s Note P.20 Corporate News
P.28 Products of the MonthP.88 Show Calendar P.90 New Products
P.109 Companies in This Issue
Product Exploration
P.40
The many benefits of wireless locks are becoming more apparent as electronic access control continues to gain popularity. Without extra wires and cables, wireless locks can provide many different verticals with an electronic access solution that is not only more cost-effective, but allows for more flexibility as it is easier to implement and manage.
Out with Keys, in with Smartphones
Bring Flexibility toElectronic Access
Wireless Locks
P.46
July 2014
News Feature SMAhome
Canon Europe Acquires Milestone Systems
Dissecting the Growing Cannabis Industry Hardware Takes a Backseat to
Software
P.32
P.34P.72
Have conversations and share information through a private social network. With the help of Bluetooth tags, you’ll
always know where you left your objects.
Adjust your energy consumption habits.
Never lose anobject again
Multiple Users
Your home is smart enough to recognize di�erent users and adjust itself accordingly.
Have access to your home, wherever you are
Set rules
If Door opens
And Sun has set
Then Turn on lights
Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.
IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.
Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered. 05:21
Your home knows where you are and how long it will take for you to get home
Geolocation
Security mode
When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.
Foster better energy consumption habits through gami�cation.
50%
MM014-015.indd 16 2014/7/4 下午9:22
EDITOR'S NOTE
18 JUL 201422 www.asmag.com 22
What has been most discussed in security for the past two months is Canon Europe acquiring Milestone Systems. Canon Europe’s intention to enter the network surveillance industry is pretty obvious, especially with the acquisition. But what is making the whole industry really curious is: “Will Milestone still stay open in the longer future?” Even though Canon claims that it will firmly follow the “standalone” and “independent” approach with Milestone, the acquisition still cannot help but make some of Milestone’s current camera partners worry and doubt. How Milestone’s partners will cope with the acquisition is something we should pay more attention in the coming months and years.
VMS plays a main role in a security system to manage cameras and storage devices. The VMS market, particularly, is usually very fragmented and full of many small companies, which sometimes are only able to dominate their local market, instead of expanding globally. In terms of product features, it is also very market/industry specific, but the technology itself, in general, has become more accessible to many vendors and users, over these years. From hardware companies’ point of view, it is a must to develop its software competency. From software companies’ point of view, they need hardware to create capital. After Canon’s acquisition of Milestone, will we start to see more VMS companies being acquired in the future? Will intelligent video software companies be next or what else? I would say the security market has gained the momentum for further market consolidation.
Jill [email protected]
A Wave of Market Consolidation? Parson Lee Publisher & Managing Director
Joseph Lee General Manager John Shi General Manager Editorial General Press [email protected] Lai Editor in Chief [email protected] Chang Senior Consultant [email protected] Strom Reporter [email protected] Chin Reporter [email protected] Pao Reporter [email protected] Chen Coordinator [email protected]
Art Design
Gaven Lee Executive Designer [email protected] Chang Designer [email protected] Wu Designer [email protected]
Circulation & Subscription Michelle Shi Coordinator [email protected]
Corporate Management
Collins Yuan Group Manager [email protected] Pin Account Manager [email protected] Lee IT Manager [email protected]
asmag.com Veronica Chen Group Manager [email protected]
Secutech Peggy Wu Trade Fair Manager [email protected] Lin Manager [email protected] Tsai Project Manager [email protected]
International Advertising [Headquarters] Juihui Lin Manager [email protected] Yang Operation Officer [email protected] Fang Coordinator [email protected] Pai Coordinator [email protected]
[Branches & Representatives] Bobbie Ferraro USA/Canada [email protected] Pattuelli Europe (Italy) [email protected] Cavus Europe (Turkey) [email protected] Consolos Europe (U.K.) [email protected] Hadzic Southeast Europe [email protected] Gandhi India [email protected] Lai China [email protected]. C. Suh Korea [email protected] Komori Japan [email protected] Thu Ha Vietnam [email protected]
a&s International, published by Messe Frankfurt New Era Business
Media Ltd., is a monthly professional publication for channel players
in the worldwide electronic security industry since 1997. It updates
importers, distributors, OEM/ODM searchers, system integrators
and other product purchasers on product sources and identifies
developments in CCTV, Digital Surveillance, Access Control,
Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home
Automation and other fields relevant to electronic security.
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, TaiwanPhone/886 2 2659 9080Fax/886 2 2659 9069Website/www.mfnewera.com
Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers.Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
Copyright© 2014 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
ISSN 1997-6267中華郵政北台字第1571號 執照登記為雜誌交寄
For changes of address or subscription problems, contact us at [email protected]
In this issue, we also explore the next
generation retail models — multi-channel
retailing. Among them, intelligent video plays
an important role to provide much valuable
information. Even in banking, intelligent video
helps banks to create business opportunities
from some perspective customers. On the
access control side, wireless locks have
gained quite a lot of attention recently.
a&s delved into the benefits and future
development of its technology and
applications. Hope you enjoy it!
M018.indd 18 2014/7/7 下午9:35
Corporate News
20 JUL 201422 www.asmag.com 22
Surveillance video standards organization HDcctv Alliance provided the European security sector with its first look at the new generation of HDcctv 2.0 surveillance technologies and products at at a major security show in Europe.
The HDcctv 2.0 standards, which were ratified in February of this year, have been developed and agreed for equipment able to produce high-fidelity HD video without transmission delay and without the need for IP cameras or new Ethernet cabling within a secured premises, meaning a significant cost-savings in many surveillance systems.
The world market for video surveillance equipment grew by almost 7 percent in 2013. This is according to recently published estimates from IHS through its video surveillance intelligence service. The service also revealed that the ongoing transition from analog to network equipment accelerated in 2013 with revenues from network higher in all four major world regions analyzed (EMEA, Americas, China, and Asia).
According to principal analyst Jon Cropley, “IHS forecasts that the pace of transition will continue to be rapid in 2014 and 2015 before slowing slightly from 2016 onwards. In the next two years a number of major vendors will continue focusing their efforts on their network equipment at the expense of analog.”
Global video surveillance equipment revenue in 2014 is expected to rise to US$15 billion, up from $13.5 billion in 2013.
IHS: Global Video Surveillance Market Grows 7 Percent in 2013
HDcctv Alliance Provides Europe With First Look at HDcctv 2.0 Technologies and Products
NICE Safeguards 2014 FIFA World Cup Brazil
NICE Systems announced that a large city in Brazil has implemented NICE Situator to help secure its community and international soccer tournament, taking place in Brazil from June 12 to July 13, 2014. NICE Systems will continue working with local authorities following the tournament as part of a broader safe city initiative to protect its millions of citizens.
At the conclusion of the project, NICE Systems’ solution will be the centerpiece that integrates multiple video surveillance systems and connects to thousands of cameras and sensors. The solution will correlate data from behavioral analytics software, social media analysis, access control, and fire and intrusion detection systems. Operators will use the solution to monitor and manage security at the soccer stadium, hotels, roads, transit system, airport, and other locations in the city. The solution will also integrate computer aided dispatching, helping to manage incidents that are escalated by emergency service center operators.
M020-026.indd 20 2014/7/3 下午11:58
Corporate News
26 JUL 201422 www.asmag.com 22
Exertis Micro-P, a UK distributor within the IT channel, has been appointed a distributor for the complete range of Samsung Techwin’s IP network-based video surveillance solutions.
Exertis Micro-P has built a reputation for providing high levels of pre- and post-sales support. Extensive stock of over 22,000 items held at the company’s distribution center ensures that customers can expect next day fulfilment of orders for a comprehensive portfolio of IT-related products including printers, PC components, networks, servers, and storage, as well as IT security solutions.
CEM Systems, part of the security products business unit of Tyco, announced the industry renowned multi-functional touchscreen terminal has been installed in Heathrow Airport, U.K. As one of the world’s busiest airports, serving over 184 destinations across 80 countries, Heathrow Airport needed a reliable, innovative, intelligent device to ensure the highest levels of security as well as increase operational efficiency.
CEM Systems has been working with Heathrow Airport for over 20 years, securing all five terminals with CEM’s aviation specific access control and security management system.
Adding to the existing range of hardware, CEM’s access terminal is now installed in the Heathrow ID center and campus area. Featuring a touchscreen reader and controller in one, and built in voice over IP (VoIP) intercom functionality, removing the need for an additional intercom system, the access terminal enables data normally only available on CEM’s access control client PC to be accessed locally and securely at the door through its range of remote applications.
While the facial recognition app is not quite ready for smartphones, researchers are racing to develop reliable methods to match one person’s photo from millions of images for a variety of applications. The National Institute of Standards and Technology (NIST) reports that results from its 2013 test of facial recognition algorithms show that accuracy has improved up to 30 percent since 2010.
Four research groups enrolled in both the 2013 and the previous 2010 test, allowing NIST researchers to compare performance improvements over time. They found that those groups had improved their test performance by from 10 to almost 30 percent. One organization decreased its error rate from 8.9 percent in 2010 to 6.4 percent in 2013.
NIST: Performance of Facial Recognition Software Continues to Improve
Samsung Techwin and Exertis Micro-P Agree on Distribution Partnership
Heathrow Airport Installs CEM’s Intelligent Access Terminal
AT&T to Acquire DIRECTV
AT&T and DIRECTV announced that they have entered into a definitive agreement under which AT&T will acquire DIRECTV in a stock-and-cash transaction for US$95 per share. The agreement has been approved unanimously by the boards of directors of both companies.
The transaction combines complementary strengths to create a unique new competitor with unprecedented capabilities in mobility, video, and broadband services.
The combined company will be a content distribution leader across mobile, video, and broadband platforms. This distribution scale will position the company to better meet consumers’ future viewing and programming preferences, whether it be traditional paid TV, on-demand video services like Netflix or Hulu streamed over a broadband connection (mobile or fixed), or a combination of viewing preferences on any screen.
The transaction enables the combined company to offer consumers bundles that include video, high-speed broadband, and mobile services using all of its sales channels, AT&T’s 2,300 retail stores and thousands of authorized dealers and agents of both companies in the U.S.
M020-026.indd 26 2014/7/3 下午11:58
Products of the month
28 JUL 201422 www.asmag.com 22
The application of the rain-wash coating to the dome cover provides clearer visibility, allowing good security to be maintained even when the camera is installed in an environment subject to rain or water splashing. Good visibility is ensured even when water splashes on the dome cover. Dirt on the dome cover is washed off by rain water to allow clearer visibility. With the application of the rain-wash coating, water droplets on the camera dome become flat, which then minimizes blurring to the camera’s field of view and allows for clearer visibility. In addition, the coating helps to repel the attachment of dirt to the dome cover, and also allows dirt to be washed off easily during rainfall or other exposure to water.
The Tecnovideo stainless steel camera housing is made in AISI 316L stainless steel to make it suitable for applications such as marine, industrial, chemical, food industry, military, etc. The housing can be customized to suit every need. It is equipped with a germanium-front window with AR/DLC coating (anti-reflection/diamond-like coating) which protects the window allowing increased transmittance.
Constructed of thermo plastic polycarbonate material, the XSD are IP66 rated, lightweight camera enclosures designed with both the end users and integrators in mind.
The self-cleaning feature named the “Clear Image Difference” (CID) provides the user with a product that improves the video image quality during periods of harsh weather, and when the image is obscured due to accumulation of dust and grime on the camera dome.
The modular design provides the user field-configurable options to increase or decrease the capacity of the enclosure by up to 520 cubic inches by removing and replacing the lower half of the enclosure.
The smart technology integration provides the user with a two-way communication tool via the internet that enables remote trouble shooting; system resetting; scheduling of self-cleaning events; adjustments to heating and cooling systems; and visibility to temperature, humidity, and external climate conditions.
Key Features• Easyaccess• Constructedwithpolycarbonatematerial• Lockinglatchesprovidetheftprotectionfortheinternalenclosurecomponentsandaccessories
• Precisioncameralevelingimproveslinearityoftheimageacrosstheviewingarea
Supplier: X|StreamDesigns
URL: www.xstreamdesigns.com
Key Features• Vandal-resistantmechanism• Waterproofinganddust-proofingfunctioncompliantwithIP66
Supplier: PanasonicSystemCommunicationsCompany
URL: www.security.panasonic.com
Key Features• Washwiperversionavailable• IRversionforthermalimagingcamerasavailable• Explosion-proofcertified
Supplier: Tecnovideo
URL: www.tecnovideocctv.com
Editor’s Note: For installers, cleaning camera enclosures is usually not an easy task. Just imagine how much in labor costs and time are spent on it. a&s collected three types of camera enclosures that use either automatic self-cleaning systems or a special coating to save time and costs to maintain high video image quality.
cleaning camera enclosures could be an easy task
Xsd camera enclosure
Panasonic rain-Wash coating
tecnovideo eX129 series stainless steel camera housing
M028.indd 28 2014/7/4 下午9:26
News Feature
32 JUL 201422 www.asmag.com 22
In the security field, Canon has not really made a name for itself yet. With the recent acquisition of Milestone
Systems, a global market leader in IP video management software and solutions, Canon is demonstrating its strong determination to become a leader in network video surveillance. Even though the acquisition was done by Canon Europe, eventually, the influence will spread to other regional headquarters of Canon. According to both companies, in the future, the companies will still independently operate as two standalone companies, regardless of the acquisition.
Canon Europe previously acquired a Belgian-based solutions company, I.R.I.S. Group, which also continues to run independently as part of the Canon Group. This provides a good example of the future relationship between Canon and Milestone. So, “We will follow the same approach with Milestone which will see Milestone continuing to operate as a standalone company, while simulta-
neously collaborating strongly within the Canon Group to drive growth in the network video surveillance market,” said Julian Rutland, Planning and Strategy Director (Network Camera & Projector) of the Professional Imaging Group of Canon Europe.
Lars Thinggaard, President and CEO of Milestone Systems, said in a press release, “… Canon respects how we built our business with our partners and supports our strategy of providing open platform solutions and therefore the need to remain a standalone company within the Canon Group. We feel this step is right for taking both our business and support for suppliers and partners to a new level.”
“The key feature of Milestone is its open approach in the market, and this is firmly supported by Canon. Together, Canon and Milestone will become a strong player in this ever-changing market by combining the imaging technology of Canon with Milestone’s VMS software,” said Rutland.
Of course, in the future, it can be
n By JILL LAI
Canon Europe acquired Milestone Systems this June, causing a big sensation in the security industry. People are now wondering about the future operation of these two major companies and also how the acquisition will affect their existing business and partners. After all, it will still take time to evaluate the outcome.
Canon europe acquires Milestone systems
M032-033.indd 32 2014/7/4 上午12:12
33JUL 201422 www.asmag.com 22
Canon europe acquires Milestone systems
expected that there will be stronger integration and compatibility with Milestone’s software in Canon’s network cameras, in the long term. However, Milestone claims that the acquisition will not cause any conflict with their current business strategies to form partnerships with other camera manufacturers.
Canon and Milestone still work as integration partners to bring video solutions to their clients. “As an independent company within the Canon Group, Milestone will continue to work with Canon and our other camera, software, and channel partners to deliver video solutions and access control integrated systems; Canon will also continue to work with its VMS partners. The open platform agenda we have set for progress is taking hold in the industry, to the benefit of
all involved. We have seen that more and more end customers use video surveillance for more than just security. There are several new businesses we are looking into for greater enabling of video to improve customers’ business processes and services, elderly care, training, and education, to name a few. Milestone’s vision was first communi-cated in 2006 and is not changing: we aim to drive the convergence of video surveillance and business systems. This vision is becoming a reality, and it will now be strengthened further after the acquisition is completed, thanks to increased resources for market expansions and more innovations,” said Karl Erik Traberg, Head of Corporate Communications and Business Development of Milestone System.
About Canon Canon started to focus on
secur i ty two to three years ago. In 2013, Canon reorga-nized its business to set up an independent network camera division for video surveillance. From then on, the company has grown its focus on network video surveillance products via heavily investing in software and services. Now, Canon is a professional network camera provider, which partners with different software companies, to provide video solutions for customers.
M032-033.indd 33 2014/7/4 上午12:12
News Feature
34 JUL 201422 www.asmag.com 22
When people think of the cannabis industry, an image of illegal drug dealers and
drug addicts living in squalid apartment buildings still pops into their minds. To top things off, the controversial decision to legalize the recreational use of cannabis in the states of Washington and Colorado in the U.S. have done little to ease the stigma of cannabis, especially in the eyes of conservative lawmakers and more old-fashioned people. Still a relatively new phenomenon, the laws for the legalization of recreational use did not go into effect until January 1st of this year in Colorado (While it is legal in the state of Washington to possess and use cannabis now, legal dispensaries have not officially opened yet). Represented by the fact that cannabis usage is still illegal on the federal level, this has brought along a
Dissecting the Growing Cannabis IndustryThe recent legalization of recreational cannabis usage has brought about a storm of changes as well as surges in growth for both merchants and security providers alike. Various security solutions providers have already started to take notice of the fact that the cannabis business is a lucrative and fast-growing industry. n By Steve Chin
host of complications for the dispensaries as well as manufacturers.
On the business side of things, the cannabis industry is lucrative. Because of the high-priced merchandise that is cannabis, merchants have long sought better and more effective methods of securing their products. In fact, a pound of cannabis now sells for more than US$2,000 at the wholesale level, and as a result, growers and dispensaries have now become targets for criminals. Notwithstanding this, cannabis usage is still illegal under federal law, and pressure on banks have forced these various organizations to rely entirely on cash rather than storing
money in safer locations and depositories. A jar on display alone could be worth more than $20,000, while a floor safe could hold upwards of $100,000.
Unfortunately, because of its taboo nature, it’s nearly impossible to accurately calculate how much the cannabis industry is worth now. However, the US Department of Health & Human Services’ Substance Abuse & Mental Health Administration conducted a National Survey on Drug Use and Health a couple
M034-036.indd 34 2014/7/7 下午9:38
35JUL 201422 www.asmag.com 22
Dissecting the Growing Cannabis Industry
of years back and found that roughly 12 percent of the population above the age of 12 has used cannabis in the past year, while six percent has used it in any given month. Of all the monthly users, nearly 16 percent use marijuana on a daily or bi-daily basis.
Other numbers to point out include: an estimated 7,500 to 10,000 jobs created in the legal cannabis industry that currently exists in Colorado, according to a publication by the Huffington Post. The industry has further raised a total of $6.2 million in tax revenue for the state of Colorado in just the first two months of 2014. Furthermore, with all this tax revenue, the state has pledged to devote $40 million, all in tax revenue, to public school construction. Taking a look at the other state that has legalized recreational cannabis usage, Washington is further
projected to raise over $190 million in taxes and fees alone over the next four years, again according to the Huffington Post.
seCurIty ProvIDers seeING GreeN
It’s not difficult to see why security solutions providers are taking such a hard look at this unique and controversial industry. To put things in perspective, according to a publication by Medical Marijuana Inc., Dewmar International, a solutions provider for cannabis dispen-saries, has seen a 300 percent revenue growth in Q1 2014 alone. For Q4 2013, they saw a near 250 percent increase in demand. DirectView Security, a relative newcomer to the cannabis industry, has already experienced this rapidly growing demand for reliable
securing of these dispensaries. In fact, DirectView plans to open a Colorado office to support the expansion of its cannabis security industry and surveil-lance business. The company will initially staff two sales professionals to work conjunctively with Legacy Construction Company as well as other potential business partners and customers in Colorado and its surrounding areas. DirectView’s management believes that the establishment of a physical security office in Colorado will enable the company to capitalize on the growing number of opportunities in the state’s cannabis industry in regards to its video surveillance and security offerings as well as alarm monitoring and access controls. With an estimated 3,000 to 4,000 businesses in the United States producing marijuana legally already, this
M034-036.indd 35 2014/7/4 下午9:37
Product ExPloration
40 JUL 201422 www.asmag.com 22
Product ExPloration
In 2014 alone, IHS estimates a growth of about 7.4 percent for the global access control market, including electronic locks (mechatronic, digital
cylinder, and electromechanical). The rise in electronic access control adoption is paving the way for wireless access devices like wireless locks to come into play. Whereas electronic access control systems still require expensive cabling and wiring, wireless solutions provide a less price-inhibiting solution for prospective users. Without the need for extra or new cabling or wiring, wireless devices such as wireless locks are making electronic access control possible for those looking for a more efficient, convenient, and cost-friendly solution.
tyPEs of WirElEss locksWhile there are several ways to differentiate between
different types of wireless locks, one way is by how they communicate to the controlling software, according to Daniel Stewart, Product Integration Manager at Stanley Security, a division of Stanley Black & Decker. Naming three of the “key varieties” in the current market, Stewart noted that each standard has positive aspects and drawbacks. Ultimately, “The decision a user usually needs to make is one of convenience versus control.”
Aside from communication standards, wireless locks can also be categorized by physical make-up. For example, for commercial use there are electronic
The many benefits of wireless locks are becoming more apparent as electronic access control continues to gain popularity. Without extra wires and cables, wireless locks can provide many different verticals with an electronic access solution that is not only more cost-effective, but allows for more flexibility as it is easier to implement and manage.
n By EIFEH STROM
Bring flexibility toElectronic access
Wireless locks
M040-044.indd 40 2014/7/4 上午12:40
41JUL 201422 www.asmag.com 22
Three Key Communication Standards for Wireless Locks
Daniel Stewart, Product Integration Manager at Stanley Security, a division of Stanley Black & Decker, outlined the three key communi-
cation standards most commonly used in today’s wireless locks.Wi-Fi: Wi-Fi locks utilize a user’s existing wireless network
installation to communicate with the controlling software. Deployment of Wi-Fi locks is easy for a user to do because there is very little infrastructure that would need to be added.
The majority of users today have an existing Wi-Fi network with ample coverage of their buildings. Deploying Wi-Fi locks then allows
the user to simply install the locks and connect them to the network. The downside to Wi-Fi locks is that it is a very power hungry protocol. This
limits the frequency that the locks can communicate to the controlling software down to only a few times a day, in order to be able to maintain a reasonable
battery life.900 MHz: 900 MHz locks utilize a frequency outside of the majority of wireless
devices today in order to maintain clear communication with the devices. In a typical 900 MHz configuration, the wireless lock communicates to a receiver that will translate the signals from the lock and output them to the control panels for the access system that communicate back to the software. The frequency wave and power behind a 900 MHz signal allow for long and more thorough penetration through a user’s building, helping to maximize their investment by reducing the number of receivers that are needed. The downside here is the infrastructure that needs to be added to a facility to support the installation of these products. Wires need to be run between the receiver and the access control panels to facilitate their communication.
Zigbee (802.15.4): This is a low-power wireless protocol that utilizes the same frequency range as Wi-Fi. This protocol allows for channel selection outside of the standard Wi-Fi channels, though, to facilitate interoperability with the existing Wi-Fi devices — for example wireless computer networks — that a user may have in place. The protocol’s low-power consumption allows these locks to communicate more often, as frequently as every minute, and maintain a reasonable battery life. The typical installation requires a receiver that will connect to a user’s Ethernet network to communicate back to a controlling software. Range from the receiver to the wireless lock is comparable to the range that a user would have with a Wi-Fi lock from a wireless access point. The downside to these products is, again, the infrastructure that needs to be put in place to facilitate communication to the controlling software.
cylinders, escutcheons, handles, and locks paired with RFID readers. They can also be customized with different credential readers including keypads, magnetic stripes, or multi-technology that can read both proximity and smart technology,
explained Karen Keating, Portfolio Marketing Manager of Electronic Access Control at Allegion. “Wireless locks can combine all the hardware components required for a complete access control system into one integrated design that
M040-044.indd 41 2014/7/4 上午12:40
Product ExPloration
46 JUL 201422 www.asmag.com 22
The idea of wireless locks is picking up in the residential sector as interest in smart homes grows. Taking advantage of this are several companies who have come out with smart locks for home use. By taking advantage of consumer desires for convenient, mobile solutions, smart locks are making their home debut.n By EifEh Strom
Product ExPloration
out with Keys, in with Smartphones
Wireless locks are finding their footing in more verticals. That includes the residential
sector, which is seeing some traction in wireless lock adoption. With the mobile trend playing a big role in the smart home and home automation market, as well as the desire for everything to be more convenient, keyless locks seem like a natural next step. Enter smart locks. As the popularity of smart homes continues to grow and the number of smartphone users continues to multiply, the convenience of being able to control everything from lighting to entertainment from a smart device has become more than just novelty: it’s become a requirement.
Smart locks that use smart devices as keys may sound like a practical idea since physical keys are easily lost and copied; however, security concerns regarding automatic unlocking and lost phones, among others, makes some consumers nervous. So, is there a market for it? According to Chris Bone, VP of Access Control Solutions for EMEA at ASSA ABLOY, there seems to be. “In the residential sector, it’s more about local attitudes to keyless entry,” pointed out Bone. “Scandinavia and parts of Asia, in particular, have been early adopters of wireless entry systems. But these new technologies are moving up the agenda everywhere. Mechanical keys are an old-fashioned technology and people are looking for new solutions that make sense in a digital world.”
Currently the most talked about and/or most anticipated smart locks on the market include: the August Smart Lock, Goji Smart Lock, Lockitron, and Kwikset Kevo powered by UniKey.
Mechanical keys are an old-fashioned technology and people are looking for new solutions that make sense in a digital world.
M046-049.indd 46 2014/7/4 上午12:22
47JUL 201422 www.asmag.com 22
Bluetooth low energy (Bluetooth LE), Z-Wave, and ZigBee, lock companies are looking to appeal to consumers by providing them with easy ways to connect with the protocols most commonly used in home automation and smart home devices.
Bluetooth LELike Classic Bluetooth, Bluetooth LE is
able to maintain a similar communication range using the same 2.4 Ghz frequencies; however, compared to Classic Bluetooth the amount of power consumed by Bluetooth LE has been considerably reduced, making it ideal for home and security applications such as smart locks. However, one drawback is that Bluetooth LE, also known as Smart Bluetooth, is only available on newer smartphones. For example, Bluetooth LE is available on iPhone 4s, which debuted in October 2011, and newer models, but is only available on Android 4.3 and later, which was only released in July 2013. However, it is interesting to note that even though Bluetooth LE is still quite a new communication protocol, it is the most widely used for smart locks. In fact, August, Goji, Kwikset Kevo, and Lockitron
StartuPS caSh inEven though the market for smart locks
is new, there is definitely a following of techies eager to get their hands on the technology. As a result, several startups have seen strong support by curious and anxious consumers. Startups like August, Goji, and Lockitron have all become well-known names in the smart lock realm. However, the newness of the smart lock idea is made apparent when trying to buy one from any of the aforementioned companies, as delays have plagued all three of the companies, not an uncommon occurrence for startups. Regardless, the promise of these products and their innovation are keeping home automation and smart home consumers intrigued.
dEadBoltS GEt drESSEd uP
There are several types of smart locks coming out for consumers to choose from. Things to consider when choosing a smart lock include preference for a lock made to fit over an existing deadbolt or one that replaces the deadbolt. Also, consideration of what type of deadbolt is already in place needs to be made if retrofitting is the chosen option, as
certain solutions only work for single-cylinder deadbolts. For example, the August Smart Lock can only be retrofitted onto a single-cylinder deadbolt — the most common type of deadbolt
found in North America — and is not compatible
with mortise or European-style cylinders. For those not in
North America or with other types of deadbolts, offerings like Goji’s smart
lock that replaces the existing deadbolt claims to fit most doors in the U.S. and Europe, according to their website. Questions regarding whether a certain smart lock will fit an existing door can be addressed by each individual company, all of which offer to assess whether or not their solution is compatible if a photo of the existing deadlock is emailed to their support team.
Smart connEctionSOther things to consider when
choosing a smart lock is the type of wireless communication protocol the lock uses. By using popular communication protocols such as
▲�A patent-pending technology claims to be able to detect whether or not the authorized device is inside or outside, preventing unwanted access.
M046-049.indd 47 2014/7/4 上午12:22
52 JUL 201422 www.asmag.com 22
Vertical Market
Television
Multi-Channel Retailing Drives
MULTI-FACE D
RETAIL MO DELS
Networked
Support
Brick-and-MortarStores
Multi-ChannelAdvertising
Omni-ChannelRetailing AppStores
Cross-Cha
nnel
Support
Online
Stores
52 JUL 201422 www.asmag.com 22
Vertical Market
M052-059.indd 52 2014/7/7 下午9:42
53JUL 201422 www.asmag.com 22
Television
Multi-Channel Retailing Drives
MULTI-FACE D
RETAIL MO DELS
Networked
Support
Brick-and MortarStores
Multi-ChannelAdvertising
Omni-ChannelRetailing AppStores
Cross-Channel
Support
Online
Stores
53JUL 201422 www.asmag.com 22
More and more, retailers are looking into
better and more efficient ways to reach
out to their customers and enhance their
shopping experience. Traditional shopping
rules are being set aside for technological
advancements and multi-channel retailing.
n By Steve Chin
M052-059.indd 53 2014/7/4 下午9:47
60 JUL 201422 www.asmag.com 22
Special Feature
on
HacksRecent reports on baby cam hacks raised new concerns over malicious intrusion into networked security devices. The threat is even more imminent for home and small business users who are not as well protected as their enterprise counterparts. Luckily for them, most of today’s network camera manufacturers work hard to keep flaws to a minimum and equip their products with various security features.
n By William Pao
Two recent incidents where baby cams were attacked by hackers caught the attention of vendors
and users alike. One happened in Ohio just in April, when a couple was awoken late at night by strange sounds coming from the baby cam in their toddler’s room, only to find that the camera had been taken control over by a hacker. A similar incident happened last year, when a Houston couple heard a man swearing through the baby cam in their infant’s room and found out the Wi-Fi-connected device was hacked. In both cases, it was found that the cameras, made by the same vendor, contained security flaws that could easily be exploited.
In fact, hacking can happen to not just cameras but also practically any device on the Internet. Last year, the NAS device of a particular vendor was found to have a vulnerability potentially allowing attackers to execute arbitrary commands on the system. The vendor has since
released a patch to solve this problem.The above incidents illustrate the
danger facing users of network cameras and other security devices, which may be targets for malicious intruders. That danger is even more imminent for home and SMB users who, unlike their enterprise counterparts, are not protected by firewalls or advanced perimeter defense software. What
they can do to protect themselves has therefore become an urgent issue.
Luckily for them, today’s network camera makers work hard to minimize flaws and equip their products with various security features, which users should take advantage of to reduce the risk of these devices being hacked. “In general it is not possible to guarantee that computers and network devices do
▲Fred Juhlin, Senior Consultant for Solution Management, Axis Communications
▲Ben Huang, Senior Marketing Supervisor, Zinwell
▲Konrad Simon, Product Manager for IP Video, Bosch Security Systems
cracking Down camera
M060-063.indd 60 2014/7/4 上午12:47
61JUL 201422 www.asmag.com 22
not contain flaws that may be exploited for malicious attack. However, there are measures that can be taken in order to reduce the risk considerably and eliminate the obvious flaws,” said Fred Juhlin, Senior Consultant for Solution Management at Axis Communications, whose Companion series targets home and SMB users.
acceSSUnauthorized access to a system can
be prevented by a simple yet effective method called password protection. Most network cameras today allow users to create their own usernames and passwords, which can be secured through various means. Zinwell, which makes power line-based home security cameras, has patented a technology that keeps passwords from being sent out to the Internet. “In that case, hackers won’t be able to get passwords from the Web,” said Ben Huang, Senior Marketing Supervisor at Zinwell.
Encryption of passwords is another protection method. “The user has the option to let the system remember passwords, and if so the client protects the password with encryption,” said Juhlin.
Once a user accesses the camera, it’s a good idea for the device to have multilevel access control based on the user’s privilege. For example, a regular user may only view streaming video, while an administrator may access the camera’s storage or control the device. In fact, most network cameras today offer this functionality. “This means users can control exactly who can see what in their system, and that their video is safe from any form of third-party manipulation,” Juhlin said.
encryptionMany IP cams also allow encryption.
The videos can be encrypted before being sent over to the network to make sure that unauthorized persons cannot
Even though camera manufacturers have included various security features in their devices, one security expert thinks these features are still not enough to protect users against intrusion.
“Recently, security flaws have been exposed on various devices, including security devices. For hackers, they are not difficult targets,” said Bowen Hsu, Security Researcher at Devcore, which provides penetration tests for network device manufacturers, including those that make network cameras. “Even with maximal precautions taken by vendors and users, there is still a chance that security devices will be attacked.”
In Hsu’s view, the reasons for this are manifold. For one, vendors and software developers are generally unknowl-edgeable of the methods of intrusion. As an example, most cameras have web interfaces that set specific rules to thwart hackers’ efforts to inject malicious commands into the device. “Yet most of these defense mechanisms are at the client side and can easily be bypassed using certain proxy programs,” Hsu said. “If there isn’t a second line of defense at the camera side, there is a high possibility that intrusion into the camera will succeed.”
Another reason is that the methods of attack are ever-changing, and manufac-turers simply haven’t caught up with them. One example was Heartbleed, a bug within the OpenSSL program that is used as an encryption method in many security cameras. Devices that are not properly and effectively patched against this flaw would be subject to a leak of vital and sensitive information — for example the customers’ usernames and passwords. A hacker who obtains that information could intrude into a camera and, at best, view videos streamed by it and, at worst,
An Information Security Expert’s Take on Network Camera SafetySet up strong passwords
and change them regularly
Refrain from creating too many accounts that may be stolen
Do not open suspicious links that may lead to the creation of backdoor accounts
Limit access of device to only a few trusted IP addresses
Isolate the device from the local network to avoid further intrusion
Self-Protection Tips for Users of IP Cameras
M060-063.indd 61 2014/7/4 上午12:47
IntellIgent VIdeo SolutIon
64 JUL 201422 www.asmag.com 22
No other verticals need surveillance more than banks, which process a
humongous amount of money daily and are constantly faced with the need to secure
themselves against robberies and fraudsters who steal money with more complex schemes. In fact, fraud has become quite costly for banks around the world. According to the European ATM Security Team, total ATM-related fraud incidents increased from 20,244 in 2011 to 22,450 in 2012, and losses resulting from these incidents rose by 13 percent from US$318.2 million to $360.4 million. As for the U.S., the Secret Service reported $8.5 billion is lost annually through credit card fraud schemes, including ATM skimming.
Fraudulent activities are indeed issues that
banks have to deal with on a regular basis. Skimming, or the capturing of users’ bank card and PIN numbers via skimming devices and pinhole cameras strategically installed on ATMs, is quite rampant. “Catch Me If You Can” type of deals, where fraudsters cash fake checks at different bank branches, also happens from time to time.
While banks have been using video surveil-lance for quite a while, traditional technologies only offer a reactive solution — investigating events after they happen. But now, with more intelligence in video solutions, banks can take a more proactive approach for crime detection and prevention. For example, through VCA, or analytics, bank security personnel can detect loitering, objects left behind in a facility,
on enhanced Security, Business with
Intelligent VideoSecurity has long been the primary focus of
management at banks. But security aside, banks are also looking for ways to reach out to more potential
customers and get business from them. Intelligent video offers a solution for both objectives: modern
video analytics helps banks fight crimes more easily, at the same time enabling them to identify who their
potential customers are and how to get to them.n By William Pao
Banking
M064-068.indd 64 2014/7/7 下午9:44
IntellIgent VIdeo SolutIon
66 JUL 201422 www.asmag.com 22
unauthorized personnel entry, ATM skimming, and other security breaches and do something about it. “Banks are becoming more aware of these benefits. Security directors and other stakeholders are exploring how they can leverage these benefits to other departments and users within their organization,” said Jim Moran, Product Management Director of Intelligent DVRs at Verint Systems.
CraCkIng down on Fraud
As fraudulent transactions at ATMs happen frequently, VCA solutions are available to help banks deal with them. For example, someone loitering at the ATM area but not making any transactions may be up to something, for instance trying to pull a skimming scheme. An alarm would then be sent to relevant authorities who can take actions. “A video analytics solution can effectively monitor people or vehicles loitering in a specific area around the ATM. The solutions now also have the intelligence to detect people running through a scene, which can be a sign of suspicious behavior following an incident,” said Daniel Wan, Channel Marketing Manager for UK & IRE at Honeywell Security Group.
By linking surveillance video with transaction data, stealing money from ATMs can be investigated with more ease and facility. Just enter the account number from which the money was stolen, and the system will return images of all ATM withdrawals associated with that account number over a certain period. This will enable fraud investigators to easily spot withdrawals by someone not associated with that account. If facial recognition is included in the solution, the system would immediately pull all images of the suspect visiting the branch over a period, say a month, instead of having the investigator examine piles upon piles of videos. “Supposed there are 36 cameras at a branch, times one month,
that’s about 26,000 hours of videos,” said Masa Karahashi,
Senior VP of Engineering at 3VR. “If I didn’t have facial recognition, there’s no way I could look for videos where a specific person comes up.”
And intelligent video solutions do not just end at the ATM vestibule. What’s going on inside the bank can also be monitored and analyzed by VCA to guard against fraud. Typically, fraudsters cash bogus checks in amounts too small for banks to take further actions. The fraudster then goes to other banks and does the same thing. Again, incidents like these underscore the importance of VCA with facial recognition, which can capture the face of the suspect and call up all videos in which the suspect has appeared over a particular period of time. This will facilitate the investigation and prosecution procedures by law enforcement officials.
What’s more, video surveillance at banks not only clamps down on fraud, the mere presence of it serves as a visual deterrent that tells potential fraudsters “We’re watching you.” “For example, some banks use public view monitors that display the camera images to show customers they are being recorded,” said Moran. “There is also signage advising
customers of video surveillance.”
� Jim Moran, Product Management Director of Intelligent DVRs, Verint Systems�Daniel Wan, Channel Marketing Manager, UK & IRE, Honeywell Security Group�Masa Karahashi, Senior VP of Engineering, 3VR�Matt Frowert, Director of Marketing, Financial Services, and Government, Tyco Integrated Security
� � � �
M064-068.indd66 2014/7/4上午12:51
Exploration
72 JUL 201422 www.asmag.com 22
Have conversations and share information through a private social network. With the help of Bluetooth tags, you’ll
always know where you left your objects.
Adjust your energy consumption habits.
Never lose anobject again
Multiple Users
Your home is smart enough to recognize di�erent users and adjust itself accordingly.
Have access to your home, wherever you are
Set rules
If Door opens
And Sun has set
Then Turn on lights
Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.
IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.
Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered. 05:21
Your home knows where you are and how long it will take for you to get home
Geolocation
Security mode
When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.
Foster better energy consumption habits through gami�cation.
50%
Have conversations and share information through a private social network.With the help of Bluetooth tags, you’ll
always know where you left your objects.
Adjust your energy consumption habits.
Never lose anobject again
Multiple Users
Your home is smart enough to recognize di�erent users and adjust itself accordingly.
Have access to your home, wherever you are
Set rules
If Door opens
And Sun has set
Then Turn on lights
Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.
IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.
Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered.05:21
Your home knows where you are and how long it will take for you to get home
Geolocation
Security mode
When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.
Foster better energy consumption habits through gami�cation.
50%
SMahome
SoftwareHardware takeS
a BackSeat to
M072-078.indd 72 2014/7/4 上午3:32
73JUL 201422 www.asmag.com 22
Have conversations and share information through a private social network. With the help of Bluetooth tags, you’ll
always know where you left your objects.
Adjust your energy consumption habits.
Never lose anobject again
Multiple Users
Your home is smart enough to recognize di�erent users and adjust itself accordingly.
Have access to your home, wherever you are
Set rules
If Door opens
And Sun has set
Then Turn on lights
Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.
IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.
Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered. 05:21
Your home knows where you are and how long it will take for you to get home
Geolocation
Security mode
When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.
Foster better energy consumption habits through gami�cation.
50%
Have conversations and share information through a private social network.With the help of Bluetooth tags, you’ll
always know where you left your objects.
Adjust your energy consumption habits.
Never lose anobject again
Multiple Users
Your home is smart enough to recognize di�erent users and adjust itself accordingly.
Have access to your home, wherever you are
Set rules
If Door opens
And Sun has set
Then Turn on lights
Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.
IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.
Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered.05:21
Your home knows where you are and how long it will take for you to get home
Geolocation
Security mode
When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.
Foster better energy consumption habits through gami�cation.
50%
Software
The ultimate appeal of a smart home is the anticipation that one day we will have systems in our homes that have the intelligence to understand and predict our behavior, and adjust the environment to the users preferences, which it learns autonomously. This level of automation is currently impossible to do mechanically, making software the only viable option. Moreover, the days have long gone where a user has to fiddle with dozens of buttons to operate a system — in its place, we now have touch screens and tablets with adaptive and programmable user interfaces.n By a&s SMAhome
In 1982, Alan Kay, a computer pioneer, said in a talk: “People who are really serious about software should make their own hardware.” Some companies have found huge success in this approach, such as Apple.
Microsoft is also moving in this direction with its Surface tablets and its acquisition of Nokia’s mobile phone division.
However, it is easier said than done. “Hardware can mean so many things — processor, board, system plus accessories. To build an ecosystem, it can be very expensive and time-consuming, and it is certainly better to take a more evolutionary route, to bootstrap, leverage, and to stand on the shoulders of giants,” said Wei-Chao Chen, co-founder of Skywatch. “Software improvements beget hardware changes, and vice versa. I think we are at the onset of smart home services, and software is the primary limiting factor where the battles would be carried out.”
Nick Evans, CEO of Tile, thinks it is worth it. In a talk at the 2014 International CES, Evan says: “It’s very challenging to develop a product like [Tile], but at the end of the day, you have your teams working very closely together. If you can’t do this mechanically, we’ll figure out a way to do this in software; in software if that’s going to be kind of clunky to set it up, we’ll put a button on [the device]. We’ll make the button very hard to see on the Tile, but it’s actually still there.”
“This is the direction everything’s going: to not have everything so modular, to not throw stuff over the fence and have this integration. It’s the only way you can really build fantastic, magical products that just work. It’s definitely worth it at the end of the day,” Evans added.
toucH panel VS. SmartpHone appIt was only a few years ago that integrators and end users needed a
dedicated touch panel to control home automation systems. Apple’s introduction of the iPad and the subsequent explosion of tablets has made it much more affordable to add a touch screen panel to a home automation system. They are also much more convenient due to their support for general purpose computing and multitasking capabilities.
However, users have also come to expect certain standards when it comes to user interfaces. In terms of user experience, a good user experience goes beyond UI design. It encompasses hardware functionality and pleasing aesthetics to allow users to take full advantage of their devices
“I thInk we are at the onset of
smart home servIces, and software Is the prImary
lImItIng factor where
the battles would be
carrIed out.”
M072-078.indd 73 2014/7/4 下午9:57
109JUL 201422 www.asmag.com 22
Companies in This Issue
Next IssueProduct Exploration NETWORK STORAGE/SERVERVertical MarketCOMMERCIAL BUILDINGSIntelligent Video SolutionSAFE CITY Special FeatureTHE 2014 FIFA WORLD CUP
Products of the Month• PANASONIC SYSTEM COMMUNICATIONS
COMPANY• TECNOVIDEO• X|STREAM DESIGNS
News Feature • CANON EUROPE• MILESTONE SYSTEMS
Product Exploration
• ALLEGION• ASSA ABLOY• EVVA• ISEO• STANLEY SECURITY
Intelligent Video Solution• 3VR• HONEYWELL SECURITY GROUP• TYCO INTEGRATED SECURITY• VERINT SYSTEMS
Special Feature• AXIS COMMUNICATIONS• BOSCH SECURITY SYSTEMS• DEVCORE• ZINWELL
Vertical Market• 360IQ• 3VR• RETAILNEXT • VERINT SYSTEMS
M109.indd 109 2014/7/4 下午10:03
ADVERTISER INDEX *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
SURVEILLANCEPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL21 3S VISION IP CAMERA / NVR / VIDEO SERVER TAIWAN [email protected] AXIS COMMUNICATIONS AB NETWORK VIDEO SOLUTIONS SWEDEN [email protected] BOSCH SECURITY SYSTEMS CCTV GERMANY [email protected], 31 CNB TECHNOLOGY INC. CCTV KOREA [email protected] COMART SYSTEM CO., LTD. CCTV / DVR / HD-SDI / HIGH-SPEED CAMERA KOREA [email protected] COMMAX CO., LTD. SURVEILLANCE KOREA [email protected] DOOR, INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected] DALLMEIER ELECTRONIC GMBH & CO.KG SURVEILLANCE GERMANY [email protected] DEEPLET TECHNOLOGY CORP. DVR TAIWAN [email protected] DONGYANG UNITECH CO., LTD. CCTV KOREA [email protected] DYNACOLOR INC. IP CAMERA / NVR TAIWAN [email protected] CARD EVERFOCUS ELECTRONICS CORP. CAMERA / DVR / IP CAMERA TAIWAN [email protected] FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER CHINA [email protected] GKB SECURITY CORPORATION IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR TAIWAN [email protected] HDPRO CO., LTD. CCTV KOREA [email protected] HI SHARP ELECTRONICS CO., LTD. CCTV / DVR / MONITOR / IP CAMERA / HD-SDI / TVI / AHD TAIWAN [email protected] COVER HIKVISION DIGITAL TECHNOLOGY CO., LTD. DVR CHINA [email protected] ICATCH INC. DVR TAIWAN [email protected], 70 IOTEO S.A. CAMERA BELGIUM [email protected] ITE TECH. INC. ccHDtv Tx / Rx chipsets TAIWAN [email protected] ITXSECURITY CO,. LTD. CAMERA KOREA [email protected] KCE CO., LTD. SURVEILLANCE KOREA [email protected] KINGDOM COMMUNICATION ASSOCIATED LTD. IP CAMERA / MOBILE DVR / 960H DVR / HYBIRD DVR TAIWAN [email protected] KUMOH ELECTRONICS CO., LTD. SURVEILLANCE KOREA [email protected] COVER MERIT LILIN ENT CO., LTD. IP CAMERA / NVR TAIWAN [email protected] MINRRAY INDUSTRY CO., LTD. SPEED DOME / CAMERA CHINA [email protected] MINTRON ENTERPRISE CO., LTD. CAMERA TAIWAN [email protected], 39 NEXTCHIP CO., LTD. CHIP KOREA [email protected] NUUO INC. NVR/VMS TAIWAN [email protected] OB TELECOM ELECTRONICS CO., LTD. FIBER OPTIC TRANSCEIVER CHINA [email protected] BACK COVER PANASONIC SYSTEM NETWORKS CO., LTD. DIGITAL SURVEILLANCE JAPAN ---71 POWERTECH ELECTRONICS CO., LTD. CCTV KOREA [email protected] QNAP SYSTEMS, INC. NVR / VMS TAIWAN [email protected] RIFATRON CO., LTD. DVR KOREA [email protected] SECUBEST CO., LTD. CAMERA KOREA [email protected] SEEEYES CO., LTD. SURVEILLANCE KOREA [email protected] SHENZHEN COMMANDER TECHNOLOGY CO., LTD. CASING CHINA [email protected], 77 SHENZHEN SUNELL TECHNOLOGY CORPORATION CAMERA CHINA [email protected] SHENZHEN ZNV TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected] SJ MICROTECH CO., LTD. CCTV KOREA [email protected] SUPERIOR ELECTRONICS CORP. CCTV / ACCESS CONTROL / SENSORS TAIWAN [email protected] TAMRON CO., LTD. CAMERA JAPAN [email protected] THEIA VIDEO SURVEILLANCE USA [email protected] TVLOGIC CO., LTD. DVR KOREA [email protected], 57 VIDEOTEC S.P.A. IP CAMERA / SOFTWARE / VIDEOSERVER ITALY [email protected] VIVOTEK INC. IP CAMERA / SOFTWARE / VIDEO SERVER TAIWAN [email protected] WEBGATE INC. DVR KOREA [email protected] ZHEJIANG DALI TECHNOLOGY CO., LTD. CCTV CHINA [email protected]
ACCESS CONTROLPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL45 CEM SYSTEMS ACCESS CONTROL UNITED KINGDOM [email protected] EVVA SICHERHEITSTECHNOLOGIE GMBH CARD, CARD READER, LOCK AUSTRIA [email protected] FINGERTEC WORLDWIDE SDN. BHD. FINGERPRINT MALAYSIA [email protected] GIGA-TMS INC. RFID MODULE / LOCK / READER TAIWAN [email protected] KMT CO., LTD. ALARM KOREA [email protected] LI SHYANG TECH CO.,LTD ELECTRIC LOCKS TAIWAN [email protected] NEDAP NV SECURITY MANAGEMENT ACCESS CONTROL NETHERLANDS [email protected] SENSORPRO CO., LTD. INTRUDER DETECTION KOREA [email protected] SUPREMA INC. FINGERPRINT KOREA [email protected] UWC ELECTRIC (M) SDN. BHD. ACCESS CONTROL MALAYSIA [email protected]
INTRUSION ALARMPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL79 SMANOS HOLDING ALARM THE NETHERLANDS [email protected] SICURIT ALARMITALIA S.P.A. ALARM ITALY [email protected] TYCO SECURITY PRODUCTS SURVEILLANCE UNITED KINGDOM [email protected] VENITEM S.R.L. ALARM ITALY [email protected]
OTHERPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL108 SCENE ELECTRONICS (HK) CO., LTD. ILLUMINATOR CHINA [email protected], 13 SONY CORPORATION DSBG. SYSTEM LSI DIVISION SEMICONDUCTOR JAPAN -
M110.indd 142 2014/7/7 下午9:59