a&s international may 2013 (trial version)

20

Upload: messe-frankfurt-new-era-business-media-ltd-taiwan-branch

Post on 10-Mar-2016

215 views

Category:

Documents


0 download

DESCRIPTION

The Leading International Security Magazine for Professional Buyers.

TRANSCRIPT

C

M

Y

CM

MY

CY

CMY

K

IN.00A.pdf 1 2013/5/8 下午9:46

14 MAY 201322 www.asmag.com 22

Viewpoint

34 Mind the Gap: The Impact of a Diverging IP Market

36 What to Look for in Buying HD-SDI Products

38 Major Conglomerates Fall Behind in Product Sales?

editor’s note

18 Will the Boston Marathon Bombing Create the Next Boom in Security?

product exploration

case study

May 2013

52 Understand How to Deploy Fisheye Cameras

44Fisheye cameras have been around for years, but real-life adoption seems to be limited. Two reasons for slow uptake were a limited number of fisheye offerings plus a limited amount of VMS integration.

Fisheye Cameras Do More with Less for Wide-Area Surveillance

The use of biometrics for authentication has gained momentum, as it reliably verifies identities. New solutions offer customizable features for security personnel to quickly adapt to various applications.

Value-Added Biometrics Create Better Services and Data Management 74

IN.014-016.indd 14 2013/5/7 下午8:39

16 MAY 201322 www.asmag.com 22

Vertical Market

14 Contents 20 Corporate News 20 Market Observer 30 Products of the Month

96 Show Calendar 98 New Products 103 Companies in This Issue

64

May 2013

special Feature coMpany spotlight

92 AxxonSoft Celebrates Tenth Anniversary and Product Launch at IFSEC 2013 and Secutech 2013

readers’ coluMn

94 What Readers Say About Us?

Getting the Most Out of Black GoldWith crude oil being an expensive commodity that holds the position of a key factor in each and every economy of the world, it is clear that oil rigs and refineries must be protected from threats. However, ensuring safe operations and efficiency can be just as crucial.

68 Constructing an Integrated Security System for Refineries

The security industry is experiencing a rapid transition to networked products, switching from traditional analog products to digital network products. Needless to say, key components in video surveillance products drive the revolution of technology.

Key Components Drive High Definition Surveillance

84

IN.014-016.indd 16 2013/5/7 下午8:39

18 MAY 201322 www.asmag.com 22

EDITOR'S NOTE

Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shih General Manager Editorial General Press [email protected] Lai Editor in Chief [email protected] Chang Senior Consultant [email protected] Wang Reporter [email protected] Fann Reporter [email protected] Chien Reporter [email protected] Lin Coordinator [email protected]

Art Design

Gaven Lee Executive Designer [email protected] Chang Designer [email protected] Wu Designer [email protected]

Circulation & Subscription Collins Yuan Group Manager [email protected] Shih Coordinator [email protected]

Corporate Management

Juihui Lin Assistant to [email protected] Managing Director Thomas Pin Account Manager [email protected] Lee IT Manager [email protected]

asmag.com Hayden Hsu Web Editor in Chief [email protected] Wu Assistant Sales Manager [email protected]

Secutech & Events (Overseas) Sandra Chen Project Manager [email protected] Chang Assistant Project Manager [email protected]

Secutech & Events (Domestic) Veronica Chen Group Manager [email protected]

International Advertising [Headquarters] Kay Yang Operation Officer [email protected] Fang Coordinator [email protected] Chen Coordinator [email protected] Lee Assistant [email protected]

[Branches & Representatives] Bobbie Ferraro USA/Canada [email protected] Pattuelli Europe (Italy) [email protected] Ilkan Europe (Turkey) [email protected] Consolos Europe (U.K.) [email protected] Hadzic Southeast Europe [email protected] Gandhi India [email protected] Shen China [email protected]. C. Suh Korea [email protected] Komori Japan [email protected] Thu Ha Vietnam [email protected]

a&s International, published by Messe Frankfurt New Era Business

Media Ltd., is a monthly professional publication for channel players

in the worldwide electronic security industry since 1997. It updates

importers, distributors, OEM/ODM searchers, system integrators

and other product purchasers on product sources and identifies

developments in CCTV, Digital Surveillance, Access Control,

Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home

Automation and other fields relevant to electronic security.

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, TaiwanPhone/886 2 2659 9080Fax/886 2 2659 9069Website/www.mfnewera.com

Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers.Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

Copyright© 2013 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

ISSN 1997-6267中華郵政北台字第1571號 執照登記為雜誌交寄

For changes of address or subscription problems, contact us at [email protected]

The Boston Marathon bombing in April was undoubtedly a successful story of using surveillance cameras to effectively assist crime investigation. This terrorist attack also later provoked many invaluable discussions on the security issue in countries worldwide. In Germany, we see some debates over the increase of public surveillance since privacy is usually the top consideration. However, in the U.K., where the most surveillance cameras are deployed in major metropolitan areas, market researchers still could not provide evidence to prove any strong correlation between the number of surveillance cameras and crime detection rates. "If CCTV had a direct relationship on crime rates, London would be the safest city in the world," says Nick Pickles, Director of Big Brother Watch in the BBC News.

If we went back to the history of the security industry in the past 10 to 15 years, it can be concluded that the biggest drivers are still the major terrorist attacks around the world. The 9/11 event in 2001 ignited the first boom of the security industry. Next, in the aftermath of the tragic events at Sandy Hook Elementary School in December, 2012, K-12 schools across the U.S. are reassessing their security plans and considering upgrades of current security equipment. Many suppliers we interviewed at ISC West last month also confirmed the increasing demand from educational institutes in the U.S. for the following two years.

Therefore, will the Boston Marathon bombing motivate the next boom of government spending toward city surveillance in the U.S. and also other major targeted countries for terrorists? According to the recent results from the Gallup Poll in the U.S., more than half of Americans consider another terror attack in the coming weeks. The report also shows Americans' confidence in the US government's ability to protect its citizens from terrorism declined to 70 percent, from 75 percent in 2011. Together with the previous observation, we can predict that US government spending will most likely pick up in the following years after the Boston Marathon bombing and “an increase in spending for video surveillance equipment could likely drive sales to exceed the already high expectations predicted for the global market,” also echoed IMS Research (an IHS company).

Last, we also cannot ignore the influence of the Boston Marathon bombing towards security at sports events. A sports event that attracts national or international attention is more likely to become a "soft target" for terrorism. The bombing showed sports events now are major targets for violence against athletes and also fans. We can expect more high-profiled security measures

and technologies for later international sports events as well.

Jill [email protected]

WIll ThE BOSTOn MARAThOn BOMBInG CREATE ThE nExT BOOM In SECURITy?

IN.018.indd 18 2013/5/7 下午8:46

20 MAY 201322 www.asmag.com 22

Corporate News

Checkpoint Intends to Sell Off Video and Intrusion Business

Checkpoint Systems announced the company’s intention to sell its US and Canadian video and intrusion business, CheckView. Following an extensive review of Checkpoint’s portfolio in 2012, the company board determined that CheckView will better serve its customers as an independent, entrepreneurial, and more focused organization.

Checkpoint will continue to pursue its redefined strategy to provide solutions that improve merchandise availability in retail stores. This planned divestiture is expected to enable focused attention and investment in both the CheckView business and Checkpoint’s core businesses. Checkpoint is committed to support CheckView throughout the sale process and the CheckView team is committed to ensure an orderly transition with full continuity of service to customers.

CEM Systems, part of Tyco Security Products, has been awarded the contract to secure Auckland Airport, New Zealand. ADT New Zealand was selected as the integrator in the project and will help install a security system at the airport’s domestic and international terminals.

The security system will utilize CEM’s visual imaging and pass production system to allow security personnel to produce passes and access rights for staff and visitors. The airport will also use a visitor management system which will enable system users to request and manage temporary cardholders via a standard web browser.

CEM’s time and attendance module will also be installed, and a failover system will also be deployed to create a system with a high level of redundancy. In the event that the main server fails, the failover server will immediately take over until the main server is restored.

In addition, the use of CEM’s portable card readers was key to the security upgrade at Auckland Airport. These readers enable on-site airport security staff to validate cards at remote sites or areas with no main power supply. The cards can also be used as mobile devices for random checks in emergency evacuations.

NFC-Enabled Devices to Boost in 2014

The number of NFC-enabled devices in use will exceed 500 million in 2014, according to ABI Research’s recent report. ABI calculated that a minimum of 285 million mobile and consumer electronics devices will ship in 2013 as OEMs continue to drive the market for NFC while mobile operators struggle to gain control and bring their services to market.

Mobile manufacturers moved ahead with NFC in 2012 whilst mobile network operators were still largely focused on payments, where they have struggled to deliver tangible services. This has allowed p r e d o m i n a n t l y A n d r o i d OEMs to seize the initiative as they have delivered new ser vices and features for connecting devices, sharing data and content, picking up information, and utilizing tags.

C o m p a n i e s s u c h a s Blackberry and Samsung have developed and implemented clear strategies around NFC. They are d i f ferent iat ing themselves as they look to generate new service-based revenue streams utilizing NFC. Other brands, such as LG and Sony, are taking a different path as they horizontally integrate NFC across their broad product portfolios.

Auckland Airport Chooses CEM Systems for Security Solution

NFC-enabled devices is looking to exceed 500 million in 2014

Higher NFC Phone shipments in 2014

Source: ABI Research

IN.020-026.indd 20 2013/5/6 下午11:02

22 MAY 201322 www.asmag.com 22

Corporate News

IKEA, the Swedish manufacturer of furniture and home products, deployed an intelligent POS surveillance system based on AxxonSoft's platform for its store in Murcia, Spain. A total of 32 cameras including both network and analog cameras were installed at the entrances, cash register, and checkout areas. The system was implemented by WAF Digital Structures and local installer Prosegur.

An integrated security system to combine smart store surveillance with monitoring of cash register areas, as well as to track and prevent fraud attempts, was installed. Special attention was paid to entrances and nearby spaces, as well as to cash register areas. A total

of 12 analog cameras and four IP cameras made by Brickcom were installed at the store. Among these were 1.3-megapixel dome network cameras with digital and optical zoom.

The checkout area was equipped with 12 cameras, while entrances were equipped with four. The integration also features alerts in case of repeated/unauthorized use of gift cards, which was a key requirement for a store like IKEA that regularly holds promotions and sales. The system includes two servers and a POS intellect module; three remote operators can use the system simultaneously.

Market for Computer Vision Processors Used in Automotive to Reach US$151M in 2013

Automotive applications such as lane departure warning and self-parking will be among the major growth drivers this year in the market for embedded vision, an area of technology concerned with enabling machines to “see” and interpret data from computer vision software.

Revenue in 2013 for special-purpose computer vision processors used in under-the-hood automotive applications is forecasted to reach US$151 million, up from $137 million last year and from $126 million in 2011, according to the Worldwide Comprehensive Processors 2012 Report from IMS Research (an IHS company). E x p a n s i o n w i l l c o n t i n u e d u r i n g t h e y e a r s a h e a d a t r a t e s r a n g i n g from 6 to 9 percent, confirming the solid prospects in store for embedded vision, one of the fastest-growing trends in technology. By 2016, revenue is expected to amount to $187 million, equivalent to a six-year compound annual growth rate of 8.2 percent.

IKEA in Spain Deploys Smart POS

Solar Powered Radar and Video Surveillance Solution Completes Trial in Abu Dhabi

Navtech Radar, the designer and manufacturer of commercial millimeter wave intelligent radar solutions for outdoor commercial applications, has completed a proof of concept trail with their Abu Dhabi-based integration partner Alliance Security, a division of Abu Dhabi-based alliance traffic systems, for a fully integrated radar and video surevillance site surveillance solution entirely run by solar energy. T h e m i l l i m e t e r surveillance radar system is ideal when integrated with the latest video surveil-lance and solar panel te c h n o l o g y. Th e complete solution is specifically designed to enable full site surveillance in some of the most remote and chal lenging locations as the radar has a low power consumption that draws only 18-20 watts and is able to withstand at up to 65-degree Celsius.

US$1.6 Billion

US$364.4 Million2009

2016

$377 million

$35.4 million

2011 2014

$918 million

2016

Analog

IP

2014

17.9%Others

44.2% Employee theft

25.8%Shoplifting and

organized retail crime

12.1%Administrative

error

1. Commerical and government builidngs

2. Green builidngs

3. Potential green savings

The revenue is expected to hit US$187 million by 2016

Automotive Computer Vision Processor Expects Strong Growth

Source: IMS Research

IN.020-026.indd 22 2013/5/6 下午11:03

24 MAY 201322 www.asmag.com 22

Norwegian Mountain Resort Turns to Wireless Locks

The 369 roomed Park Inn Trysil Mountain Resort in Norway recently deployed 471 electromechanical locks and 32 wall-mounted RFID readers supplied by Vingcard Elsafe to cover its 33,000-square meters facility. The inn, which is part of the Rezidor Hotel Group, Skistar and Peab, reopened on December 19, 2011 in the Norwegian ski resort of Trysil. Vingcard Elsafe, an Assa Abloy company, was commissioned to develop an access control solution to make it easier for technicians and reception staff to manage the doors, while providing guests with increased security and flexibility. Moreover, the newly developed software by Vingcard Elsafe's R&D department enables Skidata guests to use their lift pass to open the door of their hotel room at the resort and other participating facilities.

Gemalto Selected to Implement Ghana’s Visa and Border Management System

Gemalto, the digital security solution provider, has been appointed as prime contractor and turnkey supplier to provide Ghana Immigration Services (GIS) with a highly secure electronic visa and border management solution. This initiative is part of the eGhana project, an ambitious plan with backing from the World Bank to create a modern IT infrastructure that can support the country’s sustainable development plans in the years ahead.

Gemalto acts as prime contractor and will take responsibility for integrating the advanced visa and border management solution, including change in management, transitional training, and maintenance services. The company will deploy border management systems at Ghana’s main ports of arrival and will implement a fully comput-erized system for processing and issuing visa and permit applications, with the collabo-ration of Avalon Biometrics. The project also covers the set up of an online portal service for visa application and the implemen-tation of electronic gates at Accra’s Kotoka International Airport for rapid, convenient, automated border control of arrivals and departures.

Dutch Brewery Deploys Comprehensive Security Management

Established since 1718, Bavaria is one of the second oldest family-owned businesses in the Netherlands. The brewery employs about 1,000 employees both domestically and abroad, and exports 65 percent of its products to more than 120 countries. The company, which produces more than six million hectolitres of beer annually, needed a new security management system as its old security system faced retirement.

The company replaced its aging security management system with Nedap's security management platform. The project included the installation of card readers, IP cameras, intercom, and visitor registration, all integrated with the security management platform. The system was implemented by Dutch system integrator Imtech.

A decisive factor in deploying the security management platform is due to its open standards and technology. It also combines features including access control, IP video management, and intercom in a security controller. The platform's scalability is future-proof and can meet the growing needs of Bavaria.

IQinVision, the provider of HD megapixel IP cameras, announced that the Woodhouse Day Spa in Indiana, U.S., has deployed its megapixel cameras at their facility to enhance guests’ security and overall quality experience. Homeland Technology Group is the integrator for this project.

Working with Homeland Technology Group, the spa owners decided to remove the exisiting analog system and upgrade to IP video surveil-lance. Now, the Woodhouse Day Spa has 34 megapixel cameras deployed in various public areas, such as at the check-in and check-out

counters, in the retail shop and laundry room, and outside the front entrance of the 10,000-square foot facility (no cameras are installed in any treatment rooms). Video from the cameras is managed by Exacq Mobile video management software.

The system is utilized 90 percent of the time for live monitoring and the rest for incident review. The security upgrade allows staff to monitor video at the check-in and check-out desks, as well as the employee break room; the spa manager can keep tabs on activities from a 52-inch monitor in the office.

Day Spa Improves Customer Experience with IP

Corporate News

IN.020-026.indd 24 2013/5/6 下午11:03

26 MAY 201322 www.asmag.com 22

Corporate News

Great Yarmouth Borough Council in Norfolk, U.K., is pioneering a video surveillance approach set to transform wiring expenses into a revenue stream that supports local business and helps residents get connected. By teaming up with The Cloud, the British Sky Broadcasting Group's public access WiFi provider, the council converted its 60-camera analog surveillance system ran on a leased fiber network into a wireless system. The idea was put forward and implemented by Quadrant Security Group, a Synectics company and the council's long-standing video surveillance integration partner. By implementing its own wireless video surveillance system, moving

away from leasing a fiber network, and teaming up with The Cloud, the council is on track to make the system cost neutral and eventually generate revenue for the town.

Under the new partnership agreement, The Cloud provides free WiFi across the town center. This enables the local population to go online, browse emails and social networks, and also use streaming services from their mobile device. Once the initial outlay for the system is covered, the income generated will help fund for local services.

Ghana Airports Company Limited (GACL) recently deployed FingerTec fingerprint readers to provide a higher level of security for the company server room. The system was implemented as part of GACL's plans of not only becoming a provider of world-class airport facilities and services, but also to meet the needs of their valued customers and stakeholders’ expectations. The system was implemented after the airport operator consulted with an authorized FingerTec distributor, Telecomputer Network Systems.

After consultation sessions between the two companies, Telecomputer acknowl-edged GACL's needs for a higher security level in its server room while not necessarily overlooking the verification logs, even though they were not currently keen on using time management functions. With this fact established, GACL was presented the fingerprint reader, which comes with bundled time attendance management software. With the software provided, it was possible for them to easily view any transaction records and configure the terminal's functions.

UK Council Capitalizes on Wireless Surveillance

Ghana Airports Operator Keeps All Hands on Servers

Eyelock Partners with Capco to Better Cater to Banks

Italian Incinerator Kisses Military Presence Goodbye with IP

EyeLock announced a partnership with Capco, a global business and technology consul-tancy dedicated to the financial services industry, to implement iris authentication security solutions across the financial services sector.

Capco recently launched its secure banking and capital markets practice. The goal of this practice is to increase security for financial institutions by implementing EyeLock's iris authentication technology as the cornerstone of the practice.

Eyelock's solutions include cost-out physical security strategies such as keyless branch conversion. Additionally, solutions are aimed at increasing logical security for customer-facing applications, online and mobile systems, such as ATM access, account opening, check clearing, wire transfers, and mobile banking, among others. EyeLock estimates that by implementing this technology, tier one banks will be able to eliminate annual recurring costs of approximately US$45 million over the course of the first two years by using keyless bank entry for employees and vendors alone.

The incinerator at Acerra is a waste-to-energy plant built in 2009 in the province of Naples, Italy. The plant has received widespread attention from the media, partly due to the presence of the Italian army brought in to monitor the site due to protests and demonstra-tions against the plant’s construction. In order to bring an end to military surveillance of this area, Partenope Ambiente, the waste management company for the plant, chose to deploy an IP-based video surveillance system. I.R.T.E.T. is the system integrator for the project.

A total of 28 fixed HD network cameras and six PTZ domes were installed at choke points, such as pedestrian walkways and vehicle routes, allowing for strategic, timely monitoring of activity. The fixed HD network camera was chosen with regard to identi-fication, color reproduction, and high transmission speed. The model uses H.264 compression standard, and offers motion detection and audio tampering alarms. The domes come with wide-angle 35x zoom, and a function that enables the cameras to be rotated and tilted to 20 degrees above the horizon, which is especially useful for monitoring uneven ground.

Replacing human eyes with cameras, the deployment of the video surveillance system puts an end to military supervision and alleviates media attention.

More on Tablets.

Download “a&s Magazine” app now.

IN.020-026-Corporate News 檔案夾.indd 26 2013/5/7 下午8:50

30 MAY 201322 www.asmag.com 22

Products of the month

The FARGO HDP8500LE Industrial Card Laser Engraver from HID Global allows seamless integration of ID card printing, encoding, laser, engraving, and laminating into one machine, enabling increased credential and organizational security in a single pass. Leveraging the highly versatile laser engraving technology in card identity systems, the solution introduces laser-engraved high security features onto ID cards and delivers a highly secure method of monochrome card personalization that etches features into the card body itself for tamper-proof and highly durable personalization. Moreover, the technology creates multiple security attributes, including surface relief for tactile authentication, detailed microtext which defies duplication caused by standard desktop printers, and lenticular personalization for distinctive multiple laser images and

changeable laser images. Attempts to alter engraved information will result in visible card damage. The HDP8500LE is recognized by the government-to-citizen ID market for its superior tamper-evident personalization and its interoperability with the HDP8500 printer/encoder, enabling full-color and laser-engraved personalization of polycarbonate cards that are commonly required in extended-life government identity credentials.

StarDot Digital TV Security Cameras

HID Global FARGO HDP8500LE Industrial Laser Engraver

Using digital television standards instead of IP, StarDot’s multi-channel long distance coaxial cameras (MCLDC) utilize ordinary RG59 or RG6 cabling allowing up to 16 cameras to run on the same cable for a distance of 1,000 feet. Similar to how digital content is delivered to household television, camera images were compressed in H.264 format and transmitted through the television “channels” inside the cable.

A receiver box transmits the streams to a NVR via the familiar IP network. Digital television tuner cards can also be integrated into the NVR, eliminating the IP bottlenecks. The integration process is very much like that used with analog cameras, except that MCLDC streams are available in high megapixel ranges and has zero compression issue. The

transmission method is also more reliable. The data is carried on as many as 1,700 slower pathways per camera stream, with full data duplication and Reed Solomon error correction. This technology is fully compliant with European digital television standards and will work with a whole range of existing equipment.

StarDot’s technology includes 80 billion operations-per- second color processing with exotic features such as smart sharpen with full 30 degree resolution edge detection on each pixel, and one clock per sample dual compressors. This new technology was recently featured at ISC West 2013.

Key Features•Upto16camerasonasingle1000feetcablerun,andupto3000feetwithonecamera

•Easytoreplaceinexistinganaloginstallations•Self-healingnetworkbenefitsprovided•NoITprofessionalformaintenanceneeded•Highresolutionandcostlesstobuild

Supplier•StarDotTechnologies

URL•www.stardot-tech.com

Key Features•Tactilesurfacerelief•Customizablemicrotext•Multiple/changeablelaserimage•Sub-surfaceimage•Dye-sublimationprinting

Supplier•HIDGlobal

URL•www.hidglobal.com

IN.030.indd 30 2013/5/6 下午11:04

VIEWPOINT

38 MAY 201322 www.asmag.com 22

The message from the market seems clear; major conglomerates in the security business have given up on their long standing strategy of growth

through acquisition. With the exception of Tyco, none of them has made a significant acquisition since 2010. In the five years prior to that they were all active in acquiring businesses both large and small, increasing their geographic scope and updating their technology.

Instead the market now faces what Martin Gren from Axis Communications calls, “consolidation by starvation.” Axis fully expects that in 10 years time, the top ten companies in the world will own about 90 percent of the total video surveillance product market. This statement does not suggest that the major conglomerates will be excluded from the top 10, but they would have to either commit more resources to R&D or acquire some leading edge technology companies.

REASONS BEHIND THE DECLINE IN M&AAs the major conglomerates have turned off the

acquisition tap, the flow of innovative products has declined and with it, market share has been lost. So why are they doing it?

• Theydon’tthinkitistherighttimetobuyastheexitvaluesofcompanieswillfall?Trading conditions in the last three years have been

difficult and margins have tightened. However, many medium and small specialist companies have grown rapidly and demand for their products is running annually well into double figures. Such companies can only be bought for a premium and buying unproven

technology at low exit values is not the answer.•Difficultyinraisingtherequiredcash?

This cannot be the reason as the conglomerates are cash rich and have access to plentiful supplies of low interest finance. • Theyseebetteropportunitiestoinvestinotherareasoftheirbusiness?This is a strong possibility for companies such as

Honeywell, Schneider Electric (Pelco), Siemens, UTC, Panasonic, and Samsung etc. Some are strong in energy conservation, smart grid, and aerospace, where they have made significant investments over the last three years.

While conglomerates are turning away from growth through M&A, a “new economy” is now taking hold and nullifying a major advantage of these large companies — size. As venture capitalist Paul Graham put it in his statement, “It turns out that the rule ‘large and disciplined organizations win’ should be appended with ‘at games that change slowly.’”

“NEW ECONOMY” CHANGES INDUSTRY STRUCTURE

There are three main reasons why we expect the “new economy” to change the structure of the physical security industry.

1. The strong brand and channel infrastructure of the conglomerates which gave reach and efficiencies in marketing across the globe can now be achieved by small companies through the Internet at a low cost.

2. The pace of innovation is speeding up, not slowing down. Edge-based storage and advances in analytics

Major conglomerates in the security industry appear to have cooled down their acquisition activity, decreasing the flow of product innovation and market share. At the same time, smaller specialist product manufacturers are altering the structure of the physical security industry through the forces of the Internet, innovation, and open standards. The security products business is now characterized by intense competition, but it is still possible for the major conglomerates to leverage their size and global reach in a market strategy that is to their advantage.Submitted by MeMoori Business intelligence

Major Security Conglomerates Fall Behind in Product Sales?

IN.038-040.indd 38 2013/5/8 下午9:55

VIEWPOINT

40 MAY 201322 www.asmag.com 22

are creating more and more applications for IP video.3. Open standards are starting to take a hold and

eventually the best of breed will be de rigueur. This will open up competition even further and will reduce entry barriers for smaller companies. Real competition will then kill off weaker companies and consolidation will come about through open market forces.

We have, for the last three years, argued the case that a new model for the products business has kicked in with new innovative solutions that provide more than just better security. This has been achieved through advances in technology and by taking time out to focus on what customers need. Pretty basic, you would think, but moving to IP networking products has allowed security to integrate with the business enterprise, deliver true synergy, and win market share.

The fact that products become more important in the “new economy” is not the reason why security conglomerates will be forced into decline. The reason why some are falling behind is that they are not matching the relative new starts in bringing new innovative products to market, and for some reason have abandoned their normal product strategy of acquiring a regular flow of new companies with such products.

The second reason is that some are not clearly separating their product business from their systems business, and this causes confusion in the supply chain. System integrators are not keen to buy products from the major conglomerates who appears to be in competition with their systems operation, particularly when they believe that internal pricing will likely put them at a disadvantage. They need to be satisfied that there is no cross communications between the two operations.

Whatever the reason, many are finding the security products business tough, but they are achieving more success in the system and integration business where size and scale is a basic requirement. It would seem that they feel more comfortable here. So the question is will they focus more on total solutions systems business that integrates security with their other activities in building controls, fire detection and lighting controls, and sell off their products business. We think that this is a strategy that could well be under review by some companies, but there are other possibilities.

Leveraging Size and gLobaL reachThe major conglomerates have a strong advantage

when it comes to leveraging size and global reach in some of the fastest growing BRIC markets and some have had a presence there for many years. Analog systems still take the largest share of the video surveillance business in all these markets. In China, the biggest market by far, partly contributing to the dominance of analog systems may be that it is difficult to make the breakthrough with IP systems until the distribution chain strengthens. Local manufacturers who have entered late in the race are now moving ahead with this technology, but are still way behind western products.

Some 15 years ago, fire detection systems in China moved almost overnight to analog addressable systems that cost double the price and no local manufacturers could supply them. Imported products flooded in and the local system installers quickly learned how to install them. Although moving from analog to IP requires more skills, it will happen and when it does, it will come quickly. Price is no longer king in western markets but cost of ownership made up of many factors is; this will also apply to China as IP takes hold and offers many different and improved solutions.

Does this now leave the door wide open for the conglomerates and other specialist manufacturers of IP products to make the breakthrough with IP systems? We will watch with interest to see if this becomes a strategy that bears fruit.

For more information on the physical security market including market sizing, structure, technology and investment visit the report page — http://www.memoori.com/portfolio/the-physical-security-business-in-2012/

▲ Allan McHale, Director, Memoori Business Intelligence

IN.038-040.indd 40 2013/5/7 下午9:34

Product Exploration

Fisheye Cameras Do More with Less for Wide-Area Surveillance

Product Exploration

44 MAY 201322 www.asmag.com 22

IN.044-050.indd 44 2013/5/6 下午11:52

Fisheye cameras have been around for years, but real-life adoption seems to be limited. Two reasons for the slow uptake were a limited number of fisheye offerings plus a limited amount of VMS integration. Things are changing as more camera manufacturers and management software providers pay more attention to fisheye optics and its benefits. We share the latest information on fisheye camera developments, advantages, and tips for selection and installation.

Wide-Area SurveillanceBy Tevin Wang

45MAY 201322 www.asmag.com 22

IN.044-050.indd 45 2013/5/6 下午11:52

Product Exploration

46 MAY 201322 www.asmag.com 22

Fisheye? Panoramic?Panoramic and hemispheric lenses

have been used by photographers for decades. Nowadays, one can literally shoot images with panoramic or fisheye effects with smartphones. S t i l l , what i s common in the consumer electronics industry may be exotic in security.

The panoramic camera offers both the 180-degree and 360-degree panoramic view using a single fisheye lens or several normal lenses. “For a panoramic camera using several lenses, the panoramic image is produced by stitching the images shot by each of the lenses,” said Osborne Fang, Marketing Manager at Brickcom. “On the other hand, the fisheye camera provides the panoramic image with a single lens. Due to the extremely wide viewing angle of the fisheye lens, the image is distorted and dewarping technology is needed to turn the image into a normal one, readable to the human eye. Hence, dewarping is one of the keys to the final image quality of the fisheye camera.”

P e t r a B e n n e r m a r k , P ro d u c t Manager at Axis Communications, added, “A panoramic camera refers to either a camera that is mounted on a wall and gives a 180-degree view from the wall or a ceiling-mounted

camera that gives a 360-degree view of the area below the ceiling. A camera with a 180-degree fisheye lens consti tutes one technical solution to such a camera. So I would say that a fisheye camera is a subset of panoramic cameras.”

One way to envision a 180-degree view is to imagine standing in the center of an alley with your back against a wall. “Cameras mounted where your head is would be able to see the whole alley including both ends and the wall that your head is against,” said Ellen Cargill, Director of Product Development for Scallop Imaging (a division of Tenebraex).

Pluses and trade-oFFsI t i s i m p o r t a n t t h a t u s e r s

understand what they get and what

they do not get from fisheye cameras. Fixed cameras, however mounted, cover narrow fields of view and multiple cameras are required to give adequate coverage of wide areas. PTZ cameras, on the other hand, require manual control and are therefore most often pointing to the wrong place at the wrong time. “A fisheye camera mounted on a wall or on the ceiling in the center of a room or area can cover a vast area with no blind spots, no moving parts, and no manual control required,” said David Myers, CTO at AMG Systems. “While not totally replacing fixed and PTZ cameras, fisheye cameras provide total coverage and reduce both the number of cameras required and the infrastructure required. The ability to follow a subject on a single

▲PTZ cameras require manual control and might therefore be pointing to the wrong place at the wrong time.

Petra Bennermark, Product Manager, Axis Communications

Greg Alcorn, Director of Global Sales, Oncam Grandeye

Steve Ma, Executive VP, VivotekOsborne Fang, Marketing Manager, Brickcom

IN.044-050.indd 46 2013/5/6 下午11:52

Product Exploration

52 MAY 201322 www.asmag.com 22

Fisheye cameras are all about seeing everything in a scene more efficiently and effectively

than with multiple cameras. A 360-degree solution enhances situational awareness. This can sometimes be difficult as fixed or PTZ cameras have blind spots. The environment in which they are deployed may also make surveillance difficult. Fisheye cameras are also economical as they reduce licensing costs by requiring only one license instead of multiple cameras and licenses to cover the same area.

By expanding horizontally, fisheye cameras allow security managers to cover an entire scene in a logical way without gaps or missing areas of coverage. “Previous solutions have involved installing cameras in strategic locations, supplemented by additional cameras with PTZ

functionality,” said Alf Chang, Senior Consultant at a&s. “Now there are other options that allow the user to effectively reduce the number of blind spots in their field of interest and to achieve total situational awareness.”

Below are what users can expect from fisheye cameras:• A huge field-of-view, hence total

coverage with no blind spots• Unbroken surveillance on a single

camera, no camera switching required

• Massively reduced camera counts when covering large areas

• The ability to go back and pan-tilt-zoom around the scene during playback, which is impossible with traditional PTZ camerasIndeed, installing a single camera

offering a 360-degree view provides greater situational awareness than a single camera normally provides.

However, fisheye cameras are not a cure-all for fixed or PTZ cameras in every scenario, as the loss of detail plus pixel density drops are still their Achilles’ heel. “Depending on camera mounting height and distance from the subjects, what the user may not get from the 360 camera could be face recognition shots or car number plates. In these cases, the use of an additional fixed camera may be required, usually at an entrance or exit,” said David Myers, CTO at AMG Systems.

Verticalscommercial: retail and atms

Fisheye cameras are a great fit for retail stores, with wide-angle viewing for nondetailed monitoring and a more cost-effective solution, said Beesha Lin, Sales & Marketing Director at Airlive.

Greg Alcorn, Director of Global Sales at Oncam Grandeye agreed. “More than 10,000 retail stores are currently using Oncam Grandeye technology, making it one of our most successful verticals. Customers are using our technology for two main reasons. Firstly, for situational awareness because 360-degree technology provides end users with coverage that has no blind spots and retrospectively analyzes a scene with speed and accuracy that no

Understand How to Deploy Fisheye CamerasFisheye cameras provide views from all angles, but must be set up properly to be effective. In this article, we take a closer look at suitable applications, what to expect, and installation tips.By Tevin Wang

David Myers, CTO, AMG Systems Beesha Lin, Sales & Marketing Director, Airlive

Claire Huang, Product Marketing Specialist, Dynacolor

IN.052-054.indd 52 2013/5/6 下午11:54

68 MAY 201322 www.asmag.com 22

Vertical Market

Constructing an Integrated Security System for Refineries a&s looks into the details and basic infrastructure of an integrated security system for refineries. According to different site requirements, the level of integration is also varied. The integration of access control, video surveillance, intrusion alarm, perimeter solution, fire and saftey, and refinery process control is standard in oil and gas industry. BY The a&s ediTorial Team

Oil and gas plants are turning to industrial IT-enabling technologies to provide

integrated power and automation solutions with open interconnectivity to enhance safety, profitability, and improve resources recovery. The level of integration varies according to site requirements. For example, high risk, mission-critical locations — vulnerable to even the slightest change in temperature, or gas exposure — require more detailed monitoring. “An integrated system can be programmed to detect temperature change, gas, smoke etc. to the smallest degree and immediately alert on site or remote surveillance teams with high definition coverage of the area in question should fluctuations be detected,” said Amedeo Simonetto, Business Development Manager at Synectics. “It has become a standard approach with most of the sites we

work with to integrate our security management platform with multiple third-party systems including fire and gas systems.” In addition, such a system can also be designed to guide safety and security teams through, for example, evacuation procedures while also overriding security pass requirements for nearest exits. “All the systems’ processes and actions

can be simultaneously viewed on screen and recorded for

later retrieval and analysis, and even as evidence for use by any necessary authorities,” added Simonetto.

The overall objective for existing as well as new sites remain unchanged — maintain operations and avoid unscheduled shutdowns. “The cost of a shutdown is many times the cost of preventing one, especially through safety equipment failure or false signals. Over complication often introduces opportunities for faults

Jan Johansson, Senior Director

of Business Development,

APAC, Tyco

Amedeo Simonetto,

Business Development

Manager, Synectics

IN.068-072.indd 68 2013/5/7 下午10:39

69MAY 201322 www.asmag.com 22

and mistakes,” pointed out Johansson. He also adds, “Companies are still interested in solutions that provide remote diagnostics capabilities, and monitoring of safety equipment to minimize people visiting production sites for inspections.”

“With our security management platform, integration with process control systems is achieved for data (alarms/transactional data) using OPC/MODBUS industry standard, a communication protocol which enables two-way communication

between the process control system and synergy, and for video via ActiveX or SDK,” shared Simonetto. Examples of typical configurations that are applied:• Storage of recorded footage at

different frame rates and resolutions to fit the various processes, whilst streamlining information transmitted and stored.

• Events and alarms are stored, including associated recorded video, which can be accessed through the Process Control system when an alarm occurs.

• Process Control alarms can be linked to live video, as well as recorded pre-alarm video, which can be played and displayed at the same time.

• Any number of cameras can be controlled by the Process Control system — with live and recorded video footage displayed simultane-ously.

It has become a standard approach with most of the sites we work with to integrate our security management platform with multiple third-party systems including fire and gas systems.

Fire and safety devices can be integrated with video surveillance to enhance site safety.

IN.068-072.indd 69 2013/5/7 下午10:39

Special Feature

84 MAY 201322 www.asmag.com 22

Special Feature

The security industry is experiencing a rapid transition to networked products, switching from traditional analog products to digital network products. Needless to say, key components in video surveil-lance products drive the revolution of technology. Just as we are entering a new era, so are the products of high-definition (HD), networked video surveillance. Manufacturers and end users are increasingly searching for products that can record better, provide clearer images, offer a wider view, enable smoother flow, and so on. With the overwhelming amount of such requests, it is only a matter of time until key components will witness a transformation in technology and application. In this feature, a&s explores updates for various key components.

Key Components DriveHigh Definition Surveillance

By Alf ChAng, a&s ConsultAnt

84 MAY 201322 www.asmag.com 22

IN.084-090.indd 84 2013/5/7 上午12:19

85MAY 201322 www.asmag.com 22

Image SenSorSThere are two common solutions

used by surveillance cameras to capture images. The first solution features a SoC bundled with CCD or CMOS sensor and an image signal processor (ISP), which provides the greatest cost benefits. Image results from this solution depend mainly on the features of the integrated ISP from chipset manufacturers, such as the 3A’s (further details later) or wide dynamic range (WDR). The

main advantage of this solution lies in its flexibility, so the solution can be customized according to the application by controlling the frame rates or how the images are captured.

The second most commonly used solution incorporates a front-end camera module, typically from Pixim, Hitachi, or Sony, to act as the image capturing device. The module is used in combination with either an application-specific integrated circuit (ASIC) or digital signal processor

(DSP) to perform video encoding, transmission, and compression. In comparison, this solution is much more costly, as it uses a professional camera module to provide better raw images. Therefore, the performance of the network cameras are largely based on the integrated compression and transmission module, such as the ability to maintain a clear image in real-time even after compression.

Manufacturers also take into consideration the following require-

Before delving deeper into key components, it is important to first understand the industry's

supply chain and product technol-ogies related to it. The following analysis is shown in Figure 1:• Key Components Supply: This

section of the chain is mainly composed of sensors, DSP/ISP, and optical lenses. Most manufac-turers do not make their own components and source them from Japanese or Korean chip-makers such as Sony, Sharp, Panasonic, and Nextchip.

• Device Manufacturing: Most of the manufacturers focus on finished products, including

those who manufacture, produce, and assemble video surveillance products.

• Sales Channels: Most security vendors in th is sec t ion se l l their products through dealers and distributors, but system i n t e g r a t o r s , b u i l d e r s , a n d contractors are used as one of the main sales channels as well.F i g u r e 2 d e p i c t s t h e c o r e

technology of key components used in both the front and back end.

HD DevelopmentSIn 2012, HD surveillance products

exploded into the market and quickly became the center of the

spotlight. HD demand accelerated the migration to IP video. Seeing its potential, several vendors entered this field, which in turn, greatly expanded the product market. Not long after, the market became saturated with HD products, such as HD IP solutions from SoC suppliers like HiSilicon, Texas Instruments, Nextchip, and Intersil. With so many options available, choosing the right HD IP solution became the primary concern. Though the market is teeming with various solutions, most conform to two basic architec-tures — image sensors and DSP/ISP processors.

85MAY 201322 www.asmag.com 22

Key Components Drive

Supply Chain and Related Technologies

SensorImage Processing Chip

Optical Lens

CCD

Sony, NEC, Toshiba, Sharp

CMOS

Aptina, Sony, Omnivision

DSP Chip

TI, Philips

SoC

Nextchip, ST, A+ Logics, Pentamicro, Vineyard, NXP, Altera, Intersil, Ambarella, Altera, TI, Grain Media, HiSilicon

Optical Lens

Nikon, Ricoh, Canon, Tamron

Multinational System Integrators Wholesaler/Distributor

Reseller

Importer/Exporter

Manufacturers of Video Surveillance System

Image Capture Card

Image Processor

Server

Surveillance Camera

Video Recorder

Produce, Manufacture, Assemble

System Design and Installation

Channelè è è

Figure 1

IN.084-090.indd 85 2013/5/7 下午10:56

ADVERTISER INDEX *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCEPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL89 ACTIONTOP ELECTRONICS (SHENZHEN) CO., LTD SURVEILLANCE CHINA [email protected] A-TEC SUBSYSTEM INC. IP CAMERA / NVR TAIWAN [email protected] AXIS COMMUNICATIONS AB NETWORK VIDEO SOLUTIONS SWEDEN [email protected] FRONT COVER, 1 CNB TECHNOLOGY INC. CCTV KOREA [email protected] COMART SYSTEM CO., LTD. DVR KOREA [email protected] DOOR, 13 DAHUA TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected] DALLMEIER CAMERA GERMANY [email protected] DYNACOLOR INC. IP CAMERA / NVR TAIWAN [email protected],61 EVERFOCUS ELECTRONICS CORP. CAMERA / DVR / IP CAMERA TAIWAN [email protected] FITIVISION TECHNOLOGY INC. IP CAMERA / NVR TAIWAN [email protected] FUHO TECHNOLOGY CO., LTD. CAMERA/DVR TAIWAN [email protected] FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER CHINA [email protected] GKB SECURITY CORPORATION CAMERA / DVR / IP CAMERA TAIWAN [email protected] HDPRO CO., LTD. CCTV KOREA [email protected] COVER HIKVISION DIGITAL TECHNOLOGY CO. LTD. DVR CHINA [email protected] ICATCH INC. DVR TAIWAN [email protected] ITXSECURITY CO,. LTD. CAMERA KOREA [email protected] COVER,62,63 MERIT LILIN ENT CO., LTD. IP CAMERA / NVR TAIWAN [email protected] MICRO DIGITAL INC. CAMERA / IP CAMERA / HD-SDI CAMERA / DVR KOREA [email protected] MINTRON ENTERPRISE CO., LTD. CAMERA TAIWAN [email protected], 43 NEXTCHIP CO., LTD. CHIP KOREA [email protected] OB TELECOM ELECTRONICS CO., LTD. FIBER OPTIC TRANSCEIVER CHINA [email protected] BACK COVER PANASONIC SYSTEM NETWORKS CO., LTD. DIGITAL SURVEILLANCE JAPAN ---5 PINETRON CO., LTD. DVR KOREA [email protected] RIFATRON CO., LTD. DVR KOREA [email protected] SHENZHEN COMMANDER TECHNOLOGY CO., LTD CASING CHINA [email protected] SHENZHEN HUANGHE DIGITAL TECHNOLOGY CO., LTD SURVEILLANCE CHINA [email protected] SHENZHEN LAUNCH DIGITAL TECHNOLOGY CO., LTD. CCTV CHINA [email protected] SHENZHEN LESHI VIDEO TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected] SHENZHEN TVT DIGITAL TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected] SUN MYUNG ELECTRO-TELECOM CO., LTD. DVR KOREA [email protected], 83 SUNELL ELECTRONICS CO., LTD. CAMERA CHINA [email protected] T.O.M. TECHNOLOGY INC. DVR KOREA [email protected] TAMRON CO., LTD. CAMERA JAPAN [email protected] THEIA VIDEO SURVEILLANCE USA [email protected] THREE BRAIN TECHNOLOGY CCTV KOREA [email protected] TRUEN CO., LTD. CAMERA KOREA [email protected] TYCO SECURITY PRODUCTS SURVEILLANCE UNITED KINGDOM [email protected] UNITECHNO CORPORATION CAMERA TAIWAN [email protected] VIDEOTEC S.P.A. IP CAMERA / SOFTWARE / VIDEOSERVER ITALY [email protected] VIVOTEK INC. IP CAMERA/ SOFTWARE/VIDEO SERVER TAIWAN [email protected] WEBGATE INC. DVR KOREA [email protected]

ACCESS CONTROLPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL39 ANSON (SHENZHEN) TECHNOLOGY CO., LTD ACCESS CONTROL CHINA [email protected] FINGERTEC WORLDWIDE SDN BHD FINGERPRINT MALAYSIA [email protected] GIGA-TMS INC. RFID MODULE / LOCK / READER TAIWAN [email protected] SAMSUNG SNS CO., LTD. HOME NETWORKING KOREA [email protected] SUPREMA INC. FINGERPRINT KOREA [email protected] ZKTECO INC. BIOMETRIC, ATTENDANCE CHINA [email protected]

INTRUSION ALARMPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL53 ATSUMI ELECTRIC CO., LTD. ALARM JAPAN [email protected] KMT CO., LTD ALARM KOREA [email protected] SENSORPRO CO., LTD. INTRUDER DETECTION KOREA [email protected] SICURIT ALARMITALIA S.P.A. INTRUDER DETECTION ITALY [email protected]

OTHERPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL95 ASIS INTERNATIONAL EVENT USA [email protected] HT INC. SEMICONDUCTOR KOREA [email protected] PIXELPLUS CO., LTD SEMICONDUCTOR KOREA [email protected] SEAGATE TECHNOLOGY LLC STORAGE SIGNAPORE [email protected] SHENZHEN HOROAD ELECTRONIC TECHNOLOGY DEVELOPMENT CO., LTD PARKING METER CHINA [email protected], 29 SONY CORPORATION DSBG. SYSTEM LSI DIVISION SEMICONDUCTOR JAPANAdvertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

IN.110.indd 110 2013/5/8 下午10:05