a&s international july 2014(trial version)

25

Upload: messe-frankfurt-new-era-business-media-ltd-taiwan-branch

Post on 01-Apr-2016

219 views

Category:

Documents


4 download

DESCRIPTION

The Leading International Security Magazine for Professional Buyers.

TRANSCRIPT

Page 1: A&s international July 2014(trial version)

C

M

Y

CM

MY

CY

CMY

K

M00A.pdf 1 2014/7/7 下午11:05

Page 2: A&s international July 2014(trial version)

14 JUL 201422 www.asmag.com 22

Multi-Channel Retailing Drives

MULTI-FACED

RETAIL MODELS

July 2014CONTENTSVertical Market

P.52

Special Feature Intelligent Video Solution

Cracking Down on Camera Hacks

Banking on Enhanced Security, Business with Intelligent Video

P.60 P.66

More and more, retailers are looking

into better and more efficient ways

to reach out to their customers and

enhance the shopping experience.

M014-016.indd 14 2014/7/7 下午9:27

Page 3: A&s international July 2014(trial version)

16 JUL 201422 www.asmag.com 22

CONTENTS

P.14 ContentsP.18 Editor’s Note P.20 Corporate News

P.28 Products of the MonthP.88 Show Calendar P.90 New Products

P.109 Companies in This Issue

Product Exploration

P.40

The many benefits of wireless locks are becoming more apparent as electronic access control continues to gain popularity. Without extra wires and cables, wireless locks can provide many different verticals with an electronic access solution that is not only more cost-effective, but allows for more flexibility as it is easier to implement and manage.

Out with Keys, in with Smartphones

Bring Flexibility toElectronic Access

Wireless Locks

P.46

July 2014

News Feature SMAhome

Canon Europe Acquires Milestone Systems

Dissecting the Growing Cannabis Industry Hardware Takes a Backseat to

Software

P.32

P.34P.72

Have conversations and share information through a private social network. With the help of Bluetooth tags, you’ll

always know where you left your objects.

Adjust your energy consumption habits.

Never lose anobject again

Multiple Users

Your home is smart enough to recognize di�erent users and adjust itself accordingly.

Have access to your home, wherever you are

Set rules

If Door opens

And Sun has set

Then Turn on lights

Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.

IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.

Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered. 05:21

Your home knows where you are and how long it will take for you to get home

Geolocation

Security mode

When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.

Foster better energy consumption habits through gami�cation.

50%

MM014-015.indd 16 2014/7/4 下午9:22

Page 4: A&s international July 2014(trial version)

EDITOR'S NOTE

18 JUL 201422 www.asmag.com 22

What has been most discussed in security for the past two months is Canon Europe acquiring Milestone Systems. Canon Europe’s intention to enter the network surveillance industry is pretty obvious, especially with the acquisition. But what is making the whole industry really curious is: “Will Milestone still stay open in the longer future?” Even though Canon claims that it will firmly follow the “standalone” and “independent” approach with Milestone, the acquisition still cannot help but make some of Milestone’s current camera partners worry and doubt. How Milestone’s partners will cope with the acquisition is something we should pay more attention in the coming months and years.

VMS plays a main role in a security system to manage cameras and storage devices. The VMS market, particularly, is usually very fragmented and full of many small companies, which sometimes are only able to dominate their local market, instead of expanding globally. In terms of product features, it is also very market/industry specific, but the technology itself, in general, has become more accessible to many vendors and users, over these years. From hardware companies’ point of view, it is a must to develop its software competency. From software companies’ point of view, they need hardware to create capital. After Canon’s acquisition of Milestone, will we start to see more VMS companies being acquired in the future? Will intelligent video software companies be next or what else? I would say the security market has gained the momentum for further market consolidation.

Jill [email protected]

A Wave of Market Consolidation? Parson Lee Publisher & Managing Director

Joseph Lee General Manager John Shi General Manager Editorial General Press [email protected] Lai Editor in Chief [email protected] Chang Senior Consultant [email protected] Strom Reporter [email protected] Chin Reporter [email protected] Pao Reporter [email protected] Chen Coordinator [email protected]

Art Design

Gaven Lee Executive Designer [email protected] Chang Designer [email protected] Wu Designer [email protected]

Circulation & Subscription Michelle Shi Coordinator [email protected]

Corporate Management

Collins Yuan Group Manager [email protected] Pin Account Manager [email protected] Lee IT Manager [email protected]

asmag.com Veronica Chen Group Manager [email protected]

Secutech Peggy Wu Trade Fair Manager [email protected] Lin Manager [email protected] Tsai Project Manager [email protected]

International Advertising [Headquarters] Juihui Lin Manager [email protected] Yang Operation Officer [email protected] Fang Coordinator [email protected] Pai Coordinator [email protected]

[Branches & Representatives] Bobbie Ferraro USA/Canada [email protected] Pattuelli Europe (Italy) [email protected] Cavus Europe (Turkey) [email protected] Consolos Europe (U.K.) [email protected] Hadzic Southeast Europe [email protected] Gandhi India [email protected] Lai China [email protected]. C. Suh Korea [email protected] Komori Japan [email protected] Thu Ha Vietnam [email protected]

a&s International, published by Messe Frankfurt New Era Business

Media Ltd., is a monthly professional publication for channel players

in the worldwide electronic security industry since 1997. It updates

importers, distributors, OEM/ODM searchers, system integrators

and other product purchasers on product sources and identifies

developments in CCTV, Digital Surveillance, Access Control,

Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home

Automation and other fields relevant to electronic security.

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, TaiwanPhone/886 2 2659 9080Fax/886 2 2659 9069Website/www.mfnewera.com

Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers.Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

Copyright© 2014 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

ISSN 1997-6267中華郵政北台字第1571號 執照登記為雜誌交寄

For changes of address or subscription problems, contact us at [email protected]

In this issue, we also explore the next

generation retail models — multi-channel

retailing. Among them, intelligent video plays

an important role to provide much valuable

information. Even in banking, intelligent video

helps banks to create business opportunities

from some perspective customers. On the

access control side, wireless locks have

gained quite a lot of attention recently.

a&s delved into the benefits and future

development of its technology and

applications. Hope you enjoy it!

M018.indd 18 2014/7/7 下午9:35

Page 5: A&s international July 2014(trial version)

Corporate News

20 JUL 201422 www.asmag.com 22

Surveillance video standards organization HDcctv Alliance provided the European security sector with its first look at the new generation of HDcctv 2.0 surveillance technologies and products at at a major security show in Europe.

The HDcctv 2.0 standards, which were ratified in February of this year, have been developed and agreed for equipment able to produce high-fidelity HD video without transmission delay and without the need for IP cameras or new Ethernet cabling within a secured premises, meaning a significant cost-savings in many surveillance systems.

The world market for video surveillance equipment grew by almost 7 percent in 2013. This is according to recently published estimates from IHS through its video surveillance intelligence service. The service also revealed that the ongoing transition from analog to network equipment accelerated in 2013 with revenues from network higher in all four major world regions analyzed (EMEA, Americas, China, and Asia).

According to principal analyst Jon Cropley, “IHS forecasts that the pace of transition will continue to be rapid in 2014 and 2015 before slowing slightly from 2016 onwards. In the next two years a number of major vendors will continue focusing their efforts on their network equipment at the expense of analog.”

Global video surveillance equipment revenue in 2014 is expected to rise to US$15 billion, up from $13.5 billion in 2013.

IHS: Global Video Surveillance Market Grows 7 Percent in 2013

HDcctv Alliance Provides Europe With First Look at HDcctv 2.0 Technologies and Products

NICE Safeguards 2014 FIFA World Cup Brazil

NICE Systems announced that a large city in Brazil has implemented NICE Situator to help secure its community and international soccer tournament, taking place in Brazil from June 12 to July 13, 2014. NICE Systems will continue working with local authorities following the tournament as part of a broader safe city initiative to protect its millions of citizens.

At the conclusion of the project, NICE Systems’ solution will be the centerpiece that integrates multiple video surveillance systems and connects to thousands of cameras and sensors. The solution will correlate data from behavioral analytics software, social media analysis, access control, and fire and intrusion detection systems. Operators will use the solution to monitor and manage security at the soccer stadium, hotels, roads, transit system, airport, and other locations in the city. The solution will also integrate computer aided dispatching, helping to manage incidents that are escalated by emergency service center operators.

M020-026.indd 20 2014/7/3 下午11:58

Page 6: A&s international July 2014(trial version)

Corporate News

26 JUL 201422 www.asmag.com 22

Exertis Micro-P, a UK distributor within the IT channel, has been appointed a distributor for the complete range of Samsung Techwin’s IP network-based video surveillance solutions.

Exertis Micro-P has built a reputation for providing high levels of pre- and post-sales support. Extensive stock of over 22,000 items held at the company’s distribution center ensures that customers can expect next day fulfilment of orders for a comprehensive portfolio of IT-related products including printers, PC components, networks, servers, and storage, as well as IT security solutions.

CEM Systems, part of the security products business unit of Tyco, announced the industry renowned multi-functional touchscreen terminal has been installed in Heathrow Airport, U.K. As one of the world’s busiest airports, serving over 184 destinations across 80 countries, Heathrow Airport needed a reliable, innovative, intelligent device to ensure the highest levels of security as well as increase operational efficiency.

CEM Systems has been working with Heathrow Airport for over 20 years, securing all five terminals with CEM’s aviation specific access control and security management system.

Adding to the existing range of hardware, CEM’s access terminal is now installed in the Heathrow ID center and campus area. Featuring a touchscreen reader and controller in one, and built in voice over IP (VoIP) intercom functionality, removing the need for an additional intercom system, the access terminal enables data normally only available on CEM’s access control client PC to be accessed locally and securely at the door through its range of remote applications.

While the facial recognition app is not quite ready for smartphones, researchers are racing to develop reliable methods to match one person’s photo from millions of images for a variety of applications. The National Institute of Standards and Technology (NIST) reports that results from its 2013 test of facial recognition algorithms show that accuracy has improved up to 30 percent since 2010.

Four research groups enrolled in both the 2013 and the previous 2010 test, allowing NIST researchers to compare performance improvements over time. They found that those groups had improved their test performance by from 10 to almost 30 percent. One organization decreased its error rate from 8.9 percent in 2010 to 6.4 percent in 2013.

NIST: Performance of Facial Recognition Software Continues to Improve

Samsung Techwin and Exertis Micro-P Agree on Distribution Partnership

Heathrow Airport Installs CEM’s Intelligent Access Terminal

AT&T to Acquire DIRECTV

AT&T and DIRECTV announced that they have entered into a definitive agreement under which AT&T will acquire DIRECTV in a stock-and-cash transaction for US$95 per share. The agreement has been approved unanimously by the boards of directors of both companies.

The transaction combines complementary strengths to create a unique new competitor with unprecedented capabilities in mobility, video, and broadband services.

The combined company will be a content distribution leader across mobile, video, and broadband platforms. This distribution scale will position the company to better meet consumers’ future viewing and programming preferences, whether it be traditional paid TV, on-demand video services like Netflix or Hulu streamed over a broadband connection (mobile or fixed), or a combination of viewing preferences on any screen.

The transaction enables the combined company to offer consumers bundles that include video, high-speed broadband, and mobile services using all of its sales channels, AT&T’s 2,300 retail stores and thousands of authorized dealers and agents of both companies in the U.S.

M020-026.indd 26 2014/7/3 下午11:58

Page 7: A&s international July 2014(trial version)

Products of the month

28 JUL 201422 www.asmag.com 22

The application of the rain-wash coating to the dome cover provides clearer visibility, allowing good security to be maintained even when the camera is installed in an environment subject to rain or water splashing. Good visibility is ensured even when water splashes on the dome cover. Dirt on the dome cover is washed off by rain water to allow clearer visibility. With the application of the rain-wash coating, water droplets on the camera dome become flat, which then minimizes blurring to the camera’s field of view and allows for clearer visibility. In addition, the coating helps to repel the attachment of dirt to the dome cover, and also allows dirt to be washed off easily during rainfall or other exposure to water.

The Tecnovideo stainless steel camera housing is made in AISI 316L stainless steel to make it suitable for applications such as marine, industrial, chemical, food industry, military, etc. The housing can be customized to suit every need. It is equipped with a germanium-front window with AR/DLC coating (anti-reflection/diamond-like coating) which protects the window allowing increased transmittance.

Constructed of thermo plastic polycarbonate material, the XSD are IP66 rated, lightweight camera enclosures designed with both the end users and integrators in mind.

The self-cleaning feature named the “Clear Image Difference” (CID) provides the user with a product that improves the video image quality during periods of harsh weather, and when the image is obscured due to accumulation of dust and grime on the camera dome.

The modular design provides the user field-configurable options to increase or decrease the capacity of the enclosure by up to 520 cubic inches by removing and replacing the lower half of the enclosure.

The smart technology integration provides the user with a two-way communication tool via the internet that enables remote trouble shooting; system resetting; scheduling of self-cleaning events; adjustments to heating and cooling systems; and visibility to temperature, humidity, and external climate conditions.

Key Features• Easyaccess• Constructedwithpolycarbonatematerial• Lockinglatchesprovidetheftprotectionfortheinternalenclosurecomponentsandaccessories

• Precisioncameralevelingimproveslinearityoftheimageacrosstheviewingarea

Supplier: X|StreamDesigns

URL: www.xstreamdesigns.com

Key Features• Vandal-resistantmechanism• Waterproofinganddust-proofingfunctioncompliantwithIP66

Supplier: PanasonicSystemCommunicationsCompany

URL: www.security.panasonic.com

Key Features• Washwiperversionavailable• IRversionforthermalimagingcamerasavailable• Explosion-proofcertified

Supplier: Tecnovideo

URL: www.tecnovideocctv.com

Editor’s Note: For installers, cleaning camera enclosures is usually not an easy task. Just imagine how much in labor costs and time are spent on it. a&s collected three types of camera enclosures that use either automatic self-cleaning systems or a special coating to save time and costs to maintain high video image quality.

cleaning camera enclosures could be an easy task

Xsd camera enclosure

Panasonic rain-Wash coating

tecnovideo eX129 series stainless steel camera housing

M028.indd 28 2014/7/4 下午9:26

Page 8: A&s international July 2014(trial version)

News Feature

32 JUL 201422 www.asmag.com 22

In the security field, Canon has not really made a name for itself yet. With the recent acquisition of Milestone

Systems, a global market leader in IP video management software and solutions, Canon is demonstrating its strong determination to become a leader in network video surveillance. Even though the acquisition was done by Canon Europe, eventually, the influence will spread to other regional headquarters of Canon. According to both companies, in the future, the companies will still independently operate as two standalone companies, regardless of the acquisition.

Canon Europe previously acquired a Belgian-based solutions company, I.R.I.S. Group, which also continues to run independently as part of the Canon Group. This provides a good example of the future relationship between Canon and Milestone. So, “We will follow the same approach with Milestone which will see Milestone continuing to operate as a standalone company, while simulta-

neously collaborating strongly within the Canon Group to drive growth in the network video surveillance market,” said Julian Rutland, Planning and Strategy Director (Network Camera & Projector) of the Professional Imaging Group of Canon Europe.

Lars Thinggaard, President and CEO of Milestone Systems, said in a press release, “… Canon respects how we built our business with our partners and supports our strategy of providing open platform solutions and therefore the need to remain a standalone company within the Canon Group. We feel this step is right for taking both our business and support for suppliers and partners to a new level.”

“The key feature of Milestone is its open approach in the market, and this is firmly supported by Canon. Together, Canon and Milestone will become a strong player in this ever-changing market by combining the imaging technology of Canon with Milestone’s VMS software,” said Rutland.

Of course, in the future, it can be

n By JILL LAI

Canon Europe acquired Milestone Systems this June, causing a big sensation in the security industry. People are now wondering about the future operation of these two major companies and also how the acquisition will affect their existing business and partners. After all, it will still take time to evaluate the outcome.

Canon europe acquires Milestone systems

M032-033.indd 32 2014/7/4 上午12:12

Page 9: A&s international July 2014(trial version)

33JUL 201422 www.asmag.com 22

Canon europe acquires Milestone systems

expected that there will be stronger integration and compatibility with Milestone’s software in Canon’s network cameras, in the long term. However, Milestone claims that the acquisition will not cause any conflict with their current business strategies to form partnerships with other camera manufacturers.

Canon and Milestone still work as integration partners to bring video solutions to their clients. “As an independent company within the Canon Group, Milestone will continue to work with Canon and our other camera, software, and channel partners to deliver video solutions and access control integrated systems; Canon will also continue to work with its VMS partners. The open platform agenda we have set for progress is taking hold in the industry, to the benefit of

all involved. We have seen that more and more end customers use video surveillance for more than just security. There are several new businesses we are looking into for greater enabling of video to improve customers’ business processes and services, elderly care, training, and education, to name a few. Milestone’s vision was first communi-cated in 2006 and is not changing: we aim to drive the convergence of video surveillance and business systems. This vision is becoming a reality, and it will now be strengthened further after the acquisition is completed, thanks to increased resources for market expansions and more innovations,” said Karl Erik Traberg, Head of Corporate Communications and Business Development of Milestone System.

About Canon Canon started to focus on

secur i ty two to three years ago. In 2013, Canon reorga-nized its business to set up an independent network camera division for video surveillance. From then on, the company has grown its focus on network video surveillance products via heavily investing in software and services. Now, Canon is a professional network camera provider, which partners with different software companies, to provide video solutions for customers.

M032-033.indd 33 2014/7/4 上午12:12

Page 10: A&s international July 2014(trial version)

News Feature

34 JUL 201422 www.asmag.com 22

When people think of the cannabis industry, an image of illegal drug dealers and

drug addicts living in squalid apartment buildings still pops into their minds. To top things off, the controversial decision to legalize the recreational use of cannabis in the states of Washington and Colorado in the U.S. have done little to ease the stigma of cannabis, especially in the eyes of conservative lawmakers and more old-fashioned people. Still a relatively new phenomenon, the laws for the legalization of recreational use did not go into effect until January 1st of this year in Colorado (While it is legal in the state of Washington to possess and use cannabis now, legal dispensaries have not officially opened yet). Represented by the fact that cannabis usage is still illegal on the federal level, this has brought along a

Dissecting the Growing Cannabis IndustryThe recent legalization of recreational cannabis usage has brought about a storm of changes as well as surges in growth for both merchants and security providers alike. Various security solutions providers have already started to take notice of the fact that the cannabis business is a lucrative and fast-growing industry. n By Steve Chin

host of complications for the dispensaries as well as manufacturers.

On the business side of things, the cannabis industry is lucrative. Because of the high-priced merchandise that is cannabis, merchants have long sought better and more effective methods of securing their products. In fact, a pound of cannabis now sells for more than US$2,000 at the wholesale level, and as a result, growers and dispensaries have now become targets for criminals. Notwithstanding this, cannabis usage is still illegal under federal law, and pressure on banks have forced these various organizations to rely entirely on cash rather than storing

money in safer locations and depositories. A jar on display alone could be worth more than $20,000, while a floor safe could hold upwards of $100,000.

Unfortunately, because of its taboo nature, it’s nearly impossible to accurately calculate how much the cannabis industry is worth now. However, the US Department of Health & Human Services’ Substance Abuse & Mental Health Administration conducted a National Survey on Drug Use and Health a couple

M034-036.indd 34 2014/7/7 下午9:38

Page 11: A&s international July 2014(trial version)

35JUL 201422 www.asmag.com 22

Dissecting the Growing Cannabis Industry

of years back and found that roughly 12 percent of the population above the age of 12 has used cannabis in the past year, while six percent has used it in any given month. Of all the monthly users, nearly 16 percent use marijuana on a daily or bi-daily basis.

Other numbers to point out include: an estimated 7,500 to 10,000 jobs created in the legal cannabis industry that currently exists in Colorado, according to a publication by the Huffington Post. The industry has further raised a total of $6.2 million in tax revenue for the state of Colorado in just the first two months of 2014. Furthermore, with all this tax revenue, the state has pledged to devote $40 million, all in tax revenue, to public school construction. Taking a look at the other state that has legalized recreational cannabis usage, Washington is further

projected to raise over $190 million in taxes and fees alone over the next four years, again according to the Huffington Post.

seCurIty ProvIDers seeING GreeN

It’s not difficult to see why security solutions providers are taking such a hard look at this unique and controversial industry. To put things in perspective, according to a publication by Medical Marijuana Inc., Dewmar International, a solutions provider for cannabis dispen-saries, has seen a 300 percent revenue growth in Q1 2014 alone. For Q4 2013, they saw a near 250 percent increase in demand. DirectView Security, a relative newcomer to the cannabis industry, has already experienced this rapidly growing demand for reliable

securing of these dispensaries. In fact, DirectView plans to open a Colorado office to support the expansion of its cannabis security industry and surveil-lance business. The company will initially staff two sales professionals to work conjunctively with Legacy Construction Company as well as other potential business partners and customers in Colorado and its surrounding areas. DirectView’s management believes that the establishment of a physical security office in Colorado will enable the company to capitalize on the growing number of opportunities in the state’s cannabis industry in regards to its video surveillance and security offerings as well as alarm monitoring and access controls. With an estimated 3,000 to 4,000 businesses in the United States producing marijuana legally already, this

M034-036.indd 35 2014/7/4 下午9:37

Page 12: A&s international July 2014(trial version)

Product ExPloration

40 JUL 201422 www.asmag.com 22

Product ExPloration

In 2014 alone, IHS estimates a growth of about 7.4 percent for the global access control market, including electronic locks (mechatronic, digital

cylinder, and electromechanical). The rise in electronic access control adoption is paving the way for wireless access devices like wireless locks to come into play. Whereas electronic access control systems still require expensive cabling and wiring, wireless solutions provide a less price-inhibiting solution for prospective users. Without the need for extra or new cabling or wiring, wireless devices such as wireless locks are making electronic access control possible for those looking for a more efficient, convenient, and cost-friendly solution.

tyPEs of WirElEss locksWhile there are several ways to differentiate between

different types of wireless locks, one way is by how they communicate to the controlling software, according to Daniel Stewart, Product Integration Manager at Stanley Security, a division of Stanley Black & Decker. Naming three of the “key varieties” in the current market, Stewart noted that each standard has positive aspects and drawbacks. Ultimately, “The decision a user usually needs to make is one of convenience versus control.”

Aside from communication standards, wireless locks can also be categorized by physical make-up. For example, for commercial use there are electronic

The many benefits of wireless locks are becoming more apparent as electronic access control continues to gain popularity. Without extra wires and cables, wireless locks can provide many different verticals with an electronic access solution that is not only more cost-effective, but allows for more flexibility as it is easier to implement and manage.

n By EIFEH STROM

Bring flexibility toElectronic access

Wireless locks

M040-044.indd 40 2014/7/4 上午12:40

Page 13: A&s international July 2014(trial version)

41JUL 201422 www.asmag.com 22

Three Key Communication Standards for Wireless Locks

Daniel Stewart, Product Integration Manager at Stanley Security, a division of Stanley Black & Decker, outlined the three key communi-

cation standards most commonly used in today’s wireless locks.Wi-Fi: Wi-Fi locks utilize a user’s existing wireless network

installation to communicate with the controlling software. Deployment of Wi-Fi locks is easy for a user to do because there is very little infrastructure that would need to be added.

The majority of users today have an existing Wi-Fi network with ample coverage of their buildings. Deploying Wi-Fi locks then allows

the user to simply install the locks and connect them to the network. The downside to Wi-Fi locks is that it is a very power hungry protocol. This

limits the frequency that the locks can communicate to the controlling software down to only a few times a day, in order to be able to maintain a reasonable

battery life.900 MHz: 900 MHz locks utilize a frequency outside of the majority of wireless

devices today in order to maintain clear communication with the devices. In a typical 900 MHz configuration, the wireless lock communicates to a receiver that will translate the signals from the lock and output them to the control panels for the access system that communicate back to the software. The frequency wave and power behind a 900 MHz signal allow for long and more thorough penetration through a user’s building, helping to maximize their investment by reducing the number of receivers that are needed. The downside here is the infrastructure that needs to be added to a facility to support the installation of these products. Wires need to be run between the receiver and the access control panels to facilitate their communication.

Zigbee (802.15.4): This is a low-power wireless protocol that utilizes the same frequency range as Wi-Fi. This protocol allows for channel selection outside of the standard Wi-Fi channels, though, to facilitate interoperability with the existing Wi-Fi devices — for example wireless computer networks — that a user may have in place. The protocol’s low-power consumption allows these locks to communicate more often, as frequently as every minute, and maintain a reasonable battery life. The typical installation requires a receiver that will connect to a user’s Ethernet network to communicate back to a controlling software. Range from the receiver to the wireless lock is comparable to the range that a user would have with a Wi-Fi lock from a wireless access point. The downside to these products is, again, the infrastructure that needs to be put in place to facilitate communication to the controlling software.

cylinders, escutcheons, handles, and locks paired with RFID readers. They can also be customized with different credential readers including keypads, magnetic stripes, or multi-technology that can read both proximity and smart technology,

explained Karen Keating, Portfolio Marketing Manager of Electronic Access Control at Allegion. “Wireless locks can combine all the hardware components required for a complete access control system into one integrated design that

M040-044.indd 41 2014/7/4 上午12:40

Page 14: A&s international July 2014(trial version)

Product ExPloration

46 JUL 201422 www.asmag.com 22

The idea of wireless locks is picking up in the residential sector as interest in smart homes grows. Taking advantage of this are several companies who have come out with smart locks for home use. By taking advantage of consumer desires for convenient, mobile solutions, smart locks are making their home debut.n By EifEh Strom

Product ExPloration

out with Keys, in with Smartphones

Wireless locks are finding their footing in more verticals. That includes the residential

sector, which is seeing some traction in wireless lock adoption. With the mobile trend playing a big role in the smart home and home automation market, as well as the desire for everything to be more convenient, keyless locks seem like a natural next step. Enter smart locks. As the popularity of smart homes continues to grow and the number of smartphone users continues to multiply, the convenience of being able to control everything from lighting to entertainment from a smart device has become more than just novelty: it’s become a requirement.

Smart locks that use smart devices as keys may sound like a practical idea since physical keys are easily lost and copied; however, security concerns regarding automatic unlocking and lost phones, among others, makes some consumers nervous. So, is there a market for it? According to Chris Bone, VP of Access Control Solutions for EMEA at ASSA ABLOY, there seems to be. “In the residential sector, it’s more about local attitudes to keyless entry,” pointed out Bone. “Scandinavia and parts of Asia, in particular, have been early adopters of wireless entry systems. But these new technologies are moving up the agenda everywhere. Mechanical keys are an old-fashioned technology and people are looking for new solutions that make sense in a digital world.”

Currently the most talked about and/or most anticipated smart locks on the market include: the August Smart Lock, Goji Smart Lock, Lockitron, and Kwikset Kevo powered by UniKey.

Mechanical keys are an old-fashioned technology and people are looking for new solutions that make sense in a digital world.

M046-049.indd 46 2014/7/4 上午12:22

Page 15: A&s international July 2014(trial version)

47JUL 201422 www.asmag.com 22

Bluetooth low energy (Bluetooth LE), Z-Wave, and ZigBee, lock companies are looking to appeal to consumers by providing them with easy ways to connect with the protocols most commonly used in home automation and smart home devices.

Bluetooth LELike Classic Bluetooth, Bluetooth LE is

able to maintain a similar communication range using the same 2.4 Ghz frequencies; however, compared to Classic Bluetooth the amount of power consumed by Bluetooth LE has been considerably reduced, making it ideal for home and security applications such as smart locks. However, one drawback is that Bluetooth LE, also known as Smart Bluetooth, is only available on newer smartphones. For example, Bluetooth LE is available on iPhone 4s, which debuted in October 2011, and newer models, but is only available on Android 4.3 and later, which was only released in July 2013. However, it is interesting to note that even though Bluetooth LE is still quite a new communication protocol, it is the most widely used for smart locks. In fact, August, Goji, Kwikset Kevo, and Lockitron

StartuPS caSh inEven though the market for smart locks

is new, there is definitely a following of techies eager to get their hands on the technology. As a result, several startups have seen strong support by curious and anxious consumers. Startups like August, Goji, and Lockitron have all become well-known names in the smart lock realm. However, the newness of the smart lock idea is made apparent when trying to buy one from any of the aforementioned companies, as delays have plagued all three of the companies, not an uncommon occurrence for startups. Regardless, the promise of these products and their innovation are keeping home automation and smart home consumers intrigued.

dEadBoltS GEt drESSEd uP

There are several types of smart locks coming out for consumers to choose from. Things to consider when choosing a smart lock include preference for a lock made to fit over an existing deadbolt or one that replaces the deadbolt. Also, consideration of what type of deadbolt is already in place needs to be made if retrofitting is the chosen option, as

certain solutions only work for single-cylinder deadbolts. For example, the August Smart Lock can only be retrofitted onto a single-cylinder deadbolt — the most common type of deadbolt

found in North America — and is not compatible

with mortise or European-style cylinders. For those not in

North America or with other types of deadbolts, offerings like Goji’s smart

lock that replaces the existing deadbolt claims to fit most doors in the U.S. and Europe, according to their website. Questions regarding whether a certain smart lock will fit an existing door can be addressed by each individual company, all of which offer to assess whether or not their solution is compatible if a photo of the existing deadlock is emailed to their support team.

Smart connEctionSOther things to consider when

choosing a smart lock is the type of wireless communication protocol the lock uses. By using popular communication protocols such as

▲�A patent-pending technology claims to be able to detect whether or not the authorized device is inside or outside, preventing unwanted access.

M046-049.indd 47 2014/7/4 上午12:22

Page 16: A&s international July 2014(trial version)

52 JUL 201422 www.asmag.com 22

Vertical Market

Television

Multi-Channel Retailing Drives

MULTI-FACE D

RETAIL MO DELS

Networked

Support

Brick-and-MortarStores

Multi-ChannelAdvertising

Omni-ChannelRetailing AppStores

Cross-Cha

nnel

Support

Online

Stores

52 JUL 201422 www.asmag.com 22

Vertical Market

M052-059.indd 52 2014/7/7 下午9:42

Page 17: A&s international July 2014(trial version)

53JUL 201422 www.asmag.com 22

Television

Multi-Channel Retailing Drives

MULTI-FACE D

RETAIL MO DELS

Networked

Support

Brick-and MortarStores

Multi-ChannelAdvertising

Omni-ChannelRetailing AppStores

Cross-Channel

Support

Online

Stores

53JUL 201422 www.asmag.com 22

More and more, retailers are looking into

better and more efficient ways to reach

out to their customers and enhance their

shopping experience. Traditional shopping

rules are being set aside for technological

advancements and multi-channel retailing.

n By Steve Chin

M052-059.indd 53 2014/7/4 下午9:47

Page 18: A&s international July 2014(trial version)

60 JUL 201422 www.asmag.com 22

Special Feature

on

HacksRecent reports on baby cam hacks raised new concerns over malicious intrusion into networked security devices. The threat is even more imminent for home and small business users who are not as well protected as their enterprise counterparts. Luckily for them, most of today’s network camera manufacturers work hard to keep flaws to a minimum and equip their products with various security features.

n By William Pao

Two recent incidents where baby cams were attacked by hackers caught the attention of vendors

and users alike. One happened in Ohio just in April, when a couple was awoken late at night by strange sounds coming from the baby cam in their toddler’s room, only to find that the camera had been taken control over by a hacker. A similar incident happened last year, when a Houston couple heard a man swearing through the baby cam in their infant’s room and found out the Wi-Fi-connected device was hacked. In both cases, it was found that the cameras, made by the same vendor, contained security flaws that could easily be exploited.

In fact, hacking can happen to not just cameras but also practically any device on the Internet. Last year, the NAS device of a particular vendor was found to have a vulnerability potentially allowing attackers to execute arbitrary commands on the system. The vendor has since

released a patch to solve this problem.The above incidents illustrate the

danger facing users of network cameras and other security devices, which may be targets for malicious intruders. That danger is even more imminent for home and SMB users who, unlike their enterprise counterparts, are not protected by firewalls or advanced perimeter defense software. What

they can do to protect themselves has therefore become an urgent issue.

Luckily for them, today’s network camera makers work hard to minimize flaws and equip their products with various security features, which users should take advantage of to reduce the risk of these devices being hacked. “In general it is not possible to guarantee that computers and network devices do

▲Fred Juhlin, Senior Consultant for Solution Management, Axis Communications

▲Ben Huang, Senior Marketing Supervisor, Zinwell

▲Konrad Simon, Product Manager for IP Video, Bosch Security Systems

cracking Down camera

M060-063.indd 60 2014/7/4 上午12:47

Page 19: A&s international July 2014(trial version)

61JUL 201422 www.asmag.com 22

not contain flaws that may be exploited for malicious attack. However, there are measures that can be taken in order to reduce the risk considerably and eliminate the obvious flaws,” said Fred Juhlin, Senior Consultant for Solution Management at Axis Communications, whose Companion series targets home and SMB users.

acceSSUnauthorized access to a system can

be prevented by a simple yet effective method called password protection. Most network cameras today allow users to create their own usernames and passwords, which can be secured through various means. Zinwell, which makes power line-based home security cameras, has patented a technology that keeps passwords from being sent out to the Internet. “In that case, hackers won’t be able to get passwords from the Web,” said Ben Huang, Senior Marketing Supervisor at Zinwell.

Encryption of passwords is another protection method. “The user has the option to let the system remember passwords, and if so the client protects the password with encryption,” said Juhlin.

Once a user accesses the camera, it’s a good idea for the device to have multilevel access control based on the user’s privilege. For example, a regular user may only view streaming video, while an administrator may access the camera’s storage or control the device. In fact, most network cameras today offer this functionality. “This means users can control exactly who can see what in their system, and that their video is safe from any form of third-party manipulation,” Juhlin said.

encryptionMany IP cams also allow encryption.

The videos can be encrypted before being sent over to the network to make sure that unauthorized persons cannot

Even though camera manufacturers have included various security features in their devices, one security expert thinks these features are still not enough to protect users against intrusion.

“Recently, security flaws have been exposed on various devices, including security devices. For hackers, they are not difficult targets,” said Bowen Hsu, Security Researcher at Devcore, which provides penetration tests for network device manufacturers, including those that make network cameras. “Even with maximal precautions taken by vendors and users, there is still a chance that security devices will be attacked.”

In Hsu’s view, the reasons for this are manifold. For one, vendors and software developers are generally unknowl-edgeable of the methods of intrusion. As an example, most cameras have web interfaces that set specific rules to thwart hackers’ efforts to inject malicious commands into the device. “Yet most of these defense mechanisms are at the client side and can easily be bypassed using certain proxy programs,” Hsu said. “If there isn’t a second line of defense at the camera side, there is a high possibility that intrusion into the camera will succeed.”

Another reason is that the methods of attack are ever-changing, and manufac-turers simply haven’t caught up with them. One example was Heartbleed, a bug within the OpenSSL program that is used as an encryption method in many security cameras. Devices that are not properly and effectively patched against this flaw would be subject to a leak of vital and sensitive information — for example the customers’ usernames and passwords. A hacker who obtains that information could intrude into a camera and, at best, view videos streamed by it and, at worst,

An Information Security Expert’s Take on Network Camera SafetySet up strong passwords

and change them regularly

Refrain from creating too many accounts that may be stolen

Do not open suspicious links that may lead to the creation of backdoor accounts

Limit access of device to only a few trusted IP addresses

Isolate the device from the local network to avoid further intrusion

Self-Protection Tips for Users of IP Cameras

M060-063.indd 61 2014/7/4 上午12:47

Page 20: A&s international July 2014(trial version)

IntellIgent VIdeo SolutIon

64 JUL 201422 www.asmag.com 22

No other verticals need surveillance more than banks, which process a

humongous amount of money daily and are constantly faced with the need to secure

themselves against robberies and fraudsters who steal money with more complex schemes. In fact, fraud has become quite costly for banks around the world. According to the European ATM Security Team, total ATM-related fraud incidents increased from 20,244 in 2011 to 22,450 in 2012, and losses resulting from these incidents rose by 13 percent from US$318.2 million to $360.4 million. As for the U.S., the Secret Service reported $8.5 billion is lost annually through credit card fraud schemes, including ATM skimming.

Fraudulent activities are indeed issues that

banks have to deal with on a regular basis. Skimming, or the capturing of users’ bank card and PIN numbers via skimming devices and pinhole cameras strategically installed on ATMs, is quite rampant. “Catch Me If You Can” type of deals, where fraudsters cash fake checks at different bank branches, also happens from time to time.

While banks have been using video surveil-lance for quite a while, traditional technologies only offer a reactive solution — investigating events after they happen. But now, with more intelligence in video solutions, banks can take a more proactive approach for crime detection and prevention. For example, through VCA, or analytics, bank security personnel can detect loitering, objects left behind in a facility,

on enhanced Security, Business with

Intelligent VideoSecurity has long been the primary focus of

management at banks. But security aside, banks are also looking for ways to reach out to more potential

customers and get business from them. Intelligent video offers a solution for both objectives: modern

video analytics helps banks fight crimes more easily, at the same time enabling them to identify who their

potential customers are and how to get to them.n By William Pao

Banking

M064-068.indd 64 2014/7/7 下午9:44

Page 21: A&s international July 2014(trial version)

IntellIgent VIdeo SolutIon

66 JUL 201422 www.asmag.com 22

unauthorized personnel entry, ATM skimming, and other security breaches and do something about it. “Banks are becoming more aware of these benefits. Security directors and other stakeholders are exploring how they can leverage these benefits to other departments and users within their organization,” said Jim Moran, Product Management Director of Intelligent DVRs at Verint Systems.

CraCkIng down on Fraud

As fraudulent transactions at ATMs happen frequently, VCA solutions are available to help banks deal with them. For example, someone loitering at the ATM area but not making any transactions may be up to something, for instance trying to pull a skimming scheme. An alarm would then be sent to relevant authorities who can take actions. “A video analytics solution can effectively monitor people or vehicles loitering in a specific area around the ATM. The solutions now also have the intelligence to detect people running through a scene, which can be a sign of suspicious behavior following an incident,” said Daniel Wan, Channel Marketing Manager for UK & IRE at Honeywell Security Group.

By linking surveillance video with transaction data, stealing money from ATMs can be investigated with more ease and facility. Just enter the account number from which the money was stolen, and the system will return images of all ATM withdrawals associated with that account number over a certain period. This will enable fraud investigators to easily spot withdrawals by someone not associated with that account. If facial recognition is included in the solution, the system would immediately pull all images of the suspect visiting the branch over a period, say a month, instead of having the investigator examine piles upon piles of videos. “Supposed there are 36 cameras at a branch, times one month,

that’s about 26,000 hours of videos,” said Masa Karahashi,

Senior VP of Engineering at 3VR. “If I didn’t have facial recognition, there’s no way I could look for videos where a specific person comes up.”

And intelligent video solutions do not just end at the ATM vestibule. What’s going on inside the bank can also be monitored and analyzed by VCA to guard against fraud. Typically, fraudsters cash bogus checks in amounts too small for banks to take further actions. The fraudster then goes to other banks and does the same thing. Again, incidents like these underscore the importance of VCA with facial recognition, which can capture the face of the suspect and call up all videos in which the suspect has appeared over a particular period of time. This will facilitate the investigation and prosecution procedures by law enforcement officials.

What’s more, video surveillance at banks not only clamps down on fraud, the mere presence of it serves as a visual deterrent that tells potential fraudsters “We’re watching you.” “For example, some banks use public view monitors that display the camera images to show customers they are being recorded,” said Moran. “There is also signage advising

customers of video surveillance.”

� Jim Moran, Product Management Director of Intelligent DVRs, Verint Systems�Daniel Wan, Channel Marketing Manager, UK & IRE, Honeywell Security Group�Masa Karahashi, Senior VP of Engineering, 3VR�Matt Frowert, Director of Marketing, Financial Services, and Government, Tyco Integrated Security

� � � �

M064-068.indd66 2014/7/4上午12:51

Page 22: A&s international July 2014(trial version)

Exploration

72 JUL 201422 www.asmag.com 22

Have conversations and share information through a private social network. With the help of Bluetooth tags, you’ll

always know where you left your objects.

Adjust your energy consumption habits.

Never lose anobject again

Multiple Users

Your home is smart enough to recognize di�erent users and adjust itself accordingly.

Have access to your home, wherever you are

Set rules

If Door opens

And Sun has set

Then Turn on lights

Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.

IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.

Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered. 05:21

Your home knows where you are and how long it will take for you to get home

Geolocation

Security mode

When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.

Foster better energy consumption habits through gami�cation.

50%

Have conversations and share information through a private social network.With the help of Bluetooth tags, you’ll

always know where you left your objects.

Adjust your energy consumption habits.

Never lose anobject again

Multiple Users

Your home is smart enough to recognize di�erent users and adjust itself accordingly.

Have access to your home, wherever you are

Set rules

If Door opens

And Sun has set

Then Turn on lights

Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.

IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.

Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered.05:21

Your home knows where you are and how long it will take for you to get home

Geolocation

Security mode

When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.

Foster better energy consumption habits through gami�cation.

50%

SMahome

SoftwareHardware takeS

a BackSeat to

M072-078.indd 72 2014/7/4 上午3:32

Page 23: A&s international July 2014(trial version)

73JUL 201422 www.asmag.com 22

Have conversations and share information through a private social network. With the help of Bluetooth tags, you’ll

always know where you left your objects.

Adjust your energy consumption habits.

Never lose anobject again

Multiple Users

Your home is smart enough to recognize di�erent users and adjust itself accordingly.

Have access to your home, wherever you are

Set rules

If Door opens

And Sun has set

Then Turn on lights

Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.

IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.

Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered. 05:21

Your home knows where you are and how long it will take for you to get home

Geolocation

Security mode

When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.

Foster better energy consumption habits through gami�cation.

50%

Have conversations and share information through a private social network.With the help of Bluetooth tags, you’ll

always know where you left your objects.

Adjust your energy consumption habits.

Never lose anobject again

Multiple Users

Your home is smart enough to recognize di�erent users and adjust itself accordingly.

Have access to your home, wherever you are

Set rules

If Door opens

And Sun has set

Then Turn on lights

Complex rules can be set with simple logic and an easy-to-use UI. As users set more rules to �t their needs, the system eventually achieves a level of automation that eliminates mundane or inconvenient tasks.

IndoorTrackingEventually smart home will be able to pinpoint users’ locations as they move throughout the home.

Time to leaveHave your home �ash the lights when you absolutely have to leave the home. You’ll never be late for a movie again, because tra�c and procrastination have all been considered.05:21

Your home knows where you are and how long it will take for you to get home

Geolocation

Security mode

When you leave, the smart home system can shut o� all unneeded appliances to avoid wasting electricity and set an alarm for security purposes.

Foster better energy consumption habits through gami�cation.

50%

Software

The ultimate appeal of a smart home is the anticipation that one day we will have systems in our homes that have the intelligence to understand and predict our behavior, and adjust the environment to the users preferences, which it learns autonomously. This level of automation is currently impossible to do mechanically, making software the only viable option. Moreover, the days have long gone where a user has to fiddle with dozens of buttons to operate a system — in its place, we now have touch screens and tablets with adaptive and programmable user interfaces.n By a&s SMAhome

In 1982, Alan Kay, a computer pioneer, said in a talk: “People who are really serious about software should make their own hardware.” Some companies have found huge success in this approach, such as Apple.

Microsoft is also moving in this direction with its Surface tablets and its acquisition of Nokia’s mobile phone division.

However, it is easier said than done. “Hardware can mean so many things — processor, board, system plus accessories. To build an ecosystem, it can be very expensive and time-consuming, and it is certainly better to take a more evolutionary route, to bootstrap, leverage, and to stand on the shoulders of giants,” said Wei-Chao Chen, co-founder of Skywatch. “Software improvements beget hardware changes, and vice versa. I think we are at the onset of smart home services, and software is the primary limiting factor where the battles would be carried out.”

Nick Evans, CEO of Tile, thinks it is worth it. In a talk at the 2014 International CES, Evan says: “It’s very challenging to develop a product like [Tile], but at the end of the day, you have your teams working very closely together. If you can’t do this mechanically, we’ll figure out a way to do this in software; in software if that’s going to be kind of clunky to set it up, we’ll put a button on [the device]. We’ll make the button very hard to see on the Tile, but it’s actually still there.”

“This is the direction everything’s going: to not have everything so modular, to not throw stuff over the fence and have this integration. It’s the only way you can really build fantastic, magical products that just work. It’s definitely worth it at the end of the day,” Evans added.

toucH panel VS. SmartpHone appIt was only a few years ago that integrators and end users needed a

dedicated touch panel to control home automation systems. Apple’s introduction of the iPad and the subsequent explosion of tablets has made it much more affordable to add a touch screen panel to a home automation system. They are also much more convenient due to their support for general purpose computing and multitasking capabilities.

However, users have also come to expect certain standards when it comes to user interfaces. In terms of user experience, a good user experience goes beyond UI design. It encompasses hardware functionality and pleasing aesthetics to allow users to take full advantage of their devices

“I thInk we are at the onset of

smart home servIces, and software Is the prImary

lImItIng factor where

the battles would be

carrIed out.”

M072-078.indd 73 2014/7/4 下午9:57

Page 24: A&s international July 2014(trial version)

109JUL 201422 www.asmag.com 22

Companies in This Issue

Next IssueProduct Exploration NETWORK STORAGE/SERVERVertical MarketCOMMERCIAL BUILDINGSIntelligent Video SolutionSAFE CITY Special FeatureTHE 2014 FIFA WORLD CUP

Products of the Month• PANASONIC SYSTEM COMMUNICATIONS

COMPANY• TECNOVIDEO• X|STREAM DESIGNS

News Feature • CANON EUROPE• MILESTONE SYSTEMS

Product Exploration

• ALLEGION• ASSA ABLOY• EVVA• ISEO• STANLEY SECURITY

Intelligent Video Solution• 3VR• HONEYWELL SECURITY GROUP• TYCO INTEGRATED SECURITY• VERINT SYSTEMS

Special Feature• AXIS COMMUNICATIONS• BOSCH SECURITY SYSTEMS• DEVCORE• ZINWELL

Vertical Market• 360IQ• 3VR• RETAILNEXT • VERINT SYSTEMS

M109.indd 109 2014/7/4 下午10:03

Page 25: A&s international July 2014(trial version)

ADVERTISER INDEX *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

SURVEILLANCEPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL21 3S VISION IP CAMERA / NVR / VIDEO SERVER TAIWAN [email protected] AXIS COMMUNICATIONS AB NETWORK VIDEO SOLUTIONS SWEDEN [email protected] BOSCH SECURITY SYSTEMS CCTV GERMANY [email protected], 31 CNB TECHNOLOGY INC. CCTV KOREA [email protected] COMART SYSTEM CO., LTD. CCTV / DVR / HD-SDI / HIGH-SPEED CAMERA KOREA [email protected] COMMAX CO., LTD. SURVEILLANCE KOREA [email protected] DOOR, INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected] DALLMEIER ELECTRONIC GMBH & CO.KG SURVEILLANCE GERMANY [email protected] DEEPLET TECHNOLOGY CORP. DVR TAIWAN [email protected] DONGYANG UNITECH CO., LTD. CCTV KOREA [email protected] DYNACOLOR INC. IP CAMERA / NVR TAIWAN [email protected] CARD EVERFOCUS ELECTRONICS CORP. CAMERA / DVR / IP CAMERA TAIWAN [email protected] FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER CHINA [email protected] GKB SECURITY CORPORATION IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR TAIWAN [email protected] HDPRO CO., LTD. CCTV KOREA [email protected] HI SHARP ELECTRONICS CO., LTD. CCTV / DVR / MONITOR / IP CAMERA / HD-SDI / TVI / AHD TAIWAN [email protected] COVER HIKVISION DIGITAL TECHNOLOGY CO., LTD. DVR CHINA [email protected] ICATCH INC. DVR TAIWAN [email protected], 70 IOTEO S.A. CAMERA BELGIUM [email protected] ITE TECH. INC. ccHDtv Tx / Rx chipsets TAIWAN [email protected] ITXSECURITY CO,. LTD. CAMERA KOREA [email protected] KCE CO., LTD. SURVEILLANCE KOREA [email protected] KINGDOM COMMUNICATION ASSOCIATED LTD. IP CAMERA / MOBILE DVR / 960H DVR / HYBIRD DVR TAIWAN [email protected] KUMOH ELECTRONICS CO., LTD. SURVEILLANCE KOREA [email protected] COVER MERIT LILIN ENT CO., LTD. IP CAMERA / NVR TAIWAN [email protected] MINRRAY INDUSTRY CO., LTD. SPEED DOME / CAMERA CHINA [email protected] MINTRON ENTERPRISE CO., LTD. CAMERA TAIWAN [email protected], 39 NEXTCHIP CO., LTD. CHIP KOREA [email protected] NUUO INC. NVR/VMS TAIWAN [email protected] OB TELECOM ELECTRONICS CO., LTD. FIBER OPTIC TRANSCEIVER CHINA [email protected] BACK COVER PANASONIC SYSTEM NETWORKS CO., LTD. DIGITAL SURVEILLANCE JAPAN ---71 POWERTECH ELECTRONICS CO., LTD. CCTV KOREA [email protected] QNAP SYSTEMS, INC. NVR / VMS TAIWAN [email protected] RIFATRON CO., LTD. DVR KOREA [email protected] SECUBEST CO., LTD. CAMERA KOREA [email protected] SEEEYES CO., LTD. SURVEILLANCE KOREA [email protected] SHENZHEN COMMANDER TECHNOLOGY CO., LTD. CASING CHINA [email protected], 77 SHENZHEN SUNELL TECHNOLOGY CORPORATION CAMERA CHINA [email protected] SHENZHEN ZNV TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected] SJ MICROTECH CO., LTD. CCTV KOREA [email protected] SUPERIOR ELECTRONICS CORP. CCTV / ACCESS CONTROL / SENSORS TAIWAN [email protected] TAMRON CO., LTD. CAMERA JAPAN [email protected] THEIA VIDEO SURVEILLANCE USA [email protected] TVLOGIC CO., LTD. DVR KOREA [email protected], 57 VIDEOTEC S.P.A. IP CAMERA / SOFTWARE / VIDEOSERVER ITALY [email protected] VIVOTEK INC. IP CAMERA / SOFTWARE / VIDEO SERVER TAIWAN [email protected] WEBGATE INC. DVR KOREA [email protected] ZHEJIANG DALI TECHNOLOGY CO., LTD. CCTV CHINA [email protected]

ACCESS CONTROLPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL45 CEM SYSTEMS ACCESS CONTROL UNITED KINGDOM [email protected] EVVA SICHERHEITSTECHNOLOGIE GMBH CARD, CARD READER, LOCK AUSTRIA [email protected] FINGERTEC WORLDWIDE SDN. BHD. FINGERPRINT MALAYSIA [email protected] GIGA-TMS INC. RFID MODULE / LOCK / READER TAIWAN [email protected] KMT CO., LTD. ALARM KOREA [email protected] LI SHYANG TECH CO.,LTD ELECTRIC LOCKS TAIWAN [email protected] NEDAP NV SECURITY MANAGEMENT ACCESS CONTROL NETHERLANDS [email protected] SENSORPRO CO., LTD. INTRUDER DETECTION KOREA [email protected] SUPREMA INC. FINGERPRINT KOREA [email protected] UWC ELECTRIC (M) SDN. BHD. ACCESS CONTROL MALAYSIA [email protected]

INTRUSION ALARMPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL79 SMANOS HOLDING ALARM THE NETHERLANDS [email protected] SICURIT ALARMITALIA S.P.A. ALARM ITALY [email protected] TYCO SECURITY PRODUCTS SURVEILLANCE UNITED KINGDOM [email protected] VENITEM S.R.L. ALARM ITALY [email protected]

OTHERPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL108 SCENE ELECTRONICS (HK) CO., LTD. ILLUMINATOR CHINA [email protected], 13 SONY CORPORATION DSBG. SYSTEM LSI DIVISION SEMICONDUCTOR JAPAN -

M110.indd 142 2014/7/7 下午9:59