a&s international nov 2014(trial version)

29

Upload: messe-frankfurt-new-era-business-media-ltd-taiwan-branch

Post on 06-Apr-2016

239 views

Category:

Documents


6 download

DESCRIPTION

The Leading International Security Magazine for Professional Buyers.

TRANSCRIPT

Page 1: a&s International Nov 2014(Trial version)

C

M

Y

CM

MY

CY

CMY

K

14B12P0403.00A+.pdf 1 2014/11/13 下午10:22

Page 2: a&s International Nov 2014(Trial version)

14 NOV 201422 www.asmag.com 22

Nov 2014CONTENTSIndustry Report

Intelligent Video Solution Special Feature

Time to Check-in: Video Analytics Automate Airport Security

Marine Control: Video Content Analytics Protecting the Seas

Up, Up and Away! "Supercloud" Rewrites Security

P.78

P.84 P.90

Time for Solutions!Prophecy From Security 50:

P.42

P.48

Security 50 Sets Trends for 2015

2014 Top 50 Rankings

P.34

C

14B12P0403.014-016.indd 14 2014/11/13 下午9:13

Page 3: a&s International Nov 2014(Trial version)

16 NOV 201422 www.asmag.com 22

CONTENTS

P.14 ContentsP.18 Editor’s Note P.20 Corporate News

P.30 Products of the MonthP.104 Show Calendar P.106 New Products

P.98 Show SpotlightP.109 Companies in This Issue

Product Exploration

Nov 2014

Vertical Market SMAhome

Hospitals Combine Forces and Security Systems

Oivicon Opens Its Door to Every Possibility

P.72 P.88

Creative Applications Illustrate Wonders of

RFIDIn many ways, RFID is like a paintbrush or building

blocks, allowing users to be as creative as they can to solve a particular problem or dilemma.

P.58

P.64 RFID: More Varied and Diverse Than Ever

14B12P0403.014-016.indd 16 14/11/13 上午4:09

Page 4: a&s International Nov 2014(Trial version)

EDITOR'S NOTE

18 NOV 201422 www.asmag.com 22

We are proud to present Security 50 for 2014 in this issue. In order to clearly pinpoint the trends for 2015, this year, a&s also included the financial reports of the first half of 2014. After cross referencing these two lists, we found that the trend to develop solutions has become very obvious, no matter on the manufacturer’s side or sales channel’s side. IP technologies have not only contributed to revolu-tionary changes to security products but also inspire and motivate many security companies to evolve.

Integration was never a major problem when analog products dominated the market. After IP technologies were introduced to security, compatibility and interoperability among devices have become a challenge. Even ONVIF or PSIA compatible products cannot guarantee full integration among devices. Plus, in different verticals, users meet various threats and challenges too. All these explain why suppliers have to grow solutions now. Another significant message that we can gain from Security 50 2014 is the penetration of IP video surveillance devices in the SMB sector. IP video has already been widespread in large-scale projects. Now, major IP video suppliers are aiming at the SMB sector for more growth.

Also, as seen in Security 50 reports, major Chinese companies continue to grow bigger and bigger. Unfortunately, this means other Asian manufacturers’ original market shares have been gradually taken. Some Taiwanese and Korean companies have continued to lose their market shares in this global market year on year. We predict that market consolidation will also soon happen among Asian security suppliers. Despite all this, we also see the transformation of some Asian companies, moving from devices to systems and even solutions due to the competition with other players. We foresee that these changes will turn out positively in the near future.

Security 50 sets the trends for the global security industry. We hope you enjoy reading it to catch up with the most updated trends in the market!

Jill [email protected]

Key Messages From Security 50 Parson Lee Publisher & Managing Director

Joseph Lee General Manager John Shi General Manager Editorial General Press [email protected] Lai Editor in Chief [email protected] Chang Senior Consultant [email protected] Strom Senior Editor [email protected] Chin Reporter [email protected] Pao Reporter [email protected] Hsu Reporter [email protected] Chen Coordinator [email protected]

Art Design

Gaven Lee Executive Designer [email protected] Chang Designer [email protected] Wu Designer [email protected]

Circulation & Subscription Michelle Shih Coordinator [email protected]

Corporate Management

Collins Yuan Group Manager [email protected] Pin Account Manager [email protected] Lee IT Manager [email protected]

asmag.com Jerry Wu Assistant Manager [email protected]

Secutech Peggy Wu Trade Fair Manager [email protected] Lin Manager [email protected] Tsai Project Manager [email protected]

International Advertising [Headquarters] Juihui Lin Manager [email protected] Yang Operation Officer [email protected] Fang Coordinator [email protected] Ho Sales Officer [email protected]

[Branches & Representatives] Bobbie Ferraro USA/Canada [email protected] Pattuelli Europe (Italy) [email protected] Cavus Europe (Turkey) [email protected] Consolos Europe (U.K.) [email protected] Hadzic Southeast Europe [email protected] Gandhi India [email protected] Lai China [email protected]. C. Suh Korea [email protected] Komori Japan [email protected] Thu Ha Vietnam [email protected]

a&s International, published by Messe Frankfurt New Era Business

Media Ltd., is a monthly professional publication for channel players

in the worldwide electronic security industry since 1997. It updates

importers, distributors, OEM/ODM searchers, system integrators

and other product purchasers on product sources and identifies

developments in CCTV, Digital Surveillance, Access Control,

Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home

Automation and other fields relevant to electronic security.

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, TaiwanPhone/886 2 2659 9080Fax/886 2 2659 9069Website/www.mfnewera.com

Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers.Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

Copyright© 2014 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

ISSN 1997-6267中華郵政北台字第1571號 執照登記為雜誌交寄

For changes of address or subscription problems, contact us at [email protected]

14B12P0403.018.indd 18 2014/11/13 下午9:17

Page 5: a&s International Nov 2014(Trial version)

Corporate News

20 NOV 201422 www.asmag.com 22

The Illinois State Police Department, U.S., have chosen Raytec’s infrared LED illuminators to provide surveillance lighting for an urban concert park. With large public events regularly taking place in the park, good lighting was required to improve video surveillance image quality for ensuring public safety and reducing crime.

The previous street lighting along the park’s pathways did not provide optimal illumination for nighttime surveillance. It produced a highly uneven spread of light and was not aligned with the camera field of view, leading to poor quality, unusable images with insufficient detail and dark areas. This resulted in some areas of the park being unmonitored and open for vandalizing.

Furthermore, the park surveillance system requires regular modification for different events, so a lighting solution was needed that could be quickly adapted. This led to the police department approaching Illinois-based security integration company Mobile Pro Systems, specialists in mobile and rapid deployment surveillance solutions ─ they recommended Raytec infrared LED lighting.

The illuminator’s holographic lens technology with hotspot reduction technology provided the even light distribution needed for the camera system to provide clear, sharp, and detailed images of the scene at night. Choosing an infrared LED solution also meant that there would be zero light pollution and no disturbance to the park events.

March Networks, a global provider of intelligent IP video solutions, announced the integration of its VMS software and NVRs with the integrated security management software from Pacom Systems. The certifications provide organizations with unified IP video surveillance and access control solutions that support better risk mitigation, rapid incident response times, and more efficient system management.

Zenitel, a global supplier of communication systems, announced a strategic technology partnership with Genetec, a provider of unified IP security solutions. In this relationship, Zenitel will become a preferred technology hardware supplier to Genetec end users with its globally deployed intercom system, leveraging session initiation protocol (SIP) for superior voice and video-over-internet protocol (VoIP) communications. By combining systems via integration with Genetec, end users will be able to set up a cohesive and powerful IP-based system that meets today’s demanding market requirements. The product line from Zenitel includes IP master stations and substations, with or without video, for a variety of indoor and outdoor applications.

Zenitel Announces Strategic Intercom Partnership With Genetec

Illinois State Police Deploys Raytec IR for Surveillance Lighting

March Networks Expands Intelligent Video Integrations With New Pacom Access Control System Certifications

HID’s Smartphone Door-opening Solution Passes University Test

The successful completion of a pilot project at Vanderbilt University has paved the way for using smartphones as a convenient and compelling new way to open doors from a distance with new technology from HID Global, an ASSA ABLOY Group company.

The pilot was implemented at the US university using the HID Mobile Access solution with “twist and go” gesture technology that supports Bluetooth Smart and includes mobile IDs, mobile apps, mobile-enabled readers, and the HID Secure Identity Services portal for provisioning and revoking mobile IDs to a variety of Apple and Android mobile devices.

Fifteen participants used their existing smartphones to open doors at one or more of six possible campus entry points, including one parking garage. Entry points were equipped with HID’s mobile-enabled readers that were configured to work with existing smart cards as well as HID Global’s mobile IDs.

The participants cited convenience as the top attribute of HID Mobile Access, because their smartphones are always with them and they are less likely to lose them compared to an access card.

14B12P0403.020-026.indd 20 14/11/13 上午4:11

Page 6: a&s International Nov 2014(Trial version)

Corporate News

26 NOV 201422 www.asmag.com 22

Norfolk and Norwich University Hospital (NNUH) is a National Health Service academic teaching hospital located on the southern outskirts of Norwich and was the first new NHS teaching hospital built in England for more than 30 years.

Faced with a healthcare facility that included independent buildings and car parks, the building owner identified that the current legacy access control solution was coming to the end of its life cycle and was in need of future proofing to provide monitoring of entrances, exits and other sensitive areas ensuring a safe environment for patients, visitors and staff.

Since the beginning, it has concentrated on leveraging the latest technologies to create a digital hospital platform, which has allowed the providers to focus on patient care. In efforts to continually improve quality care, NNUH has deployed one of the advanced access control solutions available, to ensure the safety and overall protection of its patients, visitors, and staff. The TDSi integrated system enables NNUH to identify all areas on site, including specific live events where security can respond appropriately, whether this be a suspicious person or hazardous condition, they can react faster and more effectively.

Situated in South West London, U.K., Twickenham Studios offers a bespoke service to all media, including film and television, and can claim to be the only London-based studio that caters for both stage and post-production requirements. The latest Samsung Techwin video surveillance technology plays a key role in helping create a safe and secure environment for all who work on the studio site. First opened to the world of film in 1913, the studio went into administration and in 2012 seemed destined for demolition. However, following a successful Save Twickenham Studios campaign, the site was purchased by British businessman and property magnate Sunny Vohra, who quickly implemented a multi-million pound plan to modernize and re-equip the Studios.

With the assistance of Aray Architects, a tender process resulted in video surveillance specialists Securebase being awarded the contract to install a 28-camera IP-based system.

The images from all 28 cameras are simultaneously recorded on a Samsung Techwin SRN-1000 network video recorder which has 12-terabyte on-board storage capacity, enabling authorized personnel to quickly retrieve recorded video evidence of any suspicious activity.

Samsung Techwin Security Cameras Secure a Vital Part of British Film Heritage

Norfolk and Norwich University Hospital Makes Patient Safety a Priority With TDSi’s System

Morpho Makes Forensic Science More Accessible

In terms of police investigations and inspections, there is a trend toward making forensic tools accessible, particularly those that use biometrics. Professionals cannot deny the power of the Internet-connected mobile devices they use for private purposes, to the extent that the French Minister of the Interior has used the expression “police 3.0” several times over the past few months.

Morpho has already deployed mobile terminals in the U.S. that can check an individual’s identity and know in just a few seconds whether the individual’s digital fingerprints match the prints of someone being sought by police. Eventually, it will be possible to conduct these checks using ordinary tablets or smartphones equipped with special apps. For authentication operations, particularly those carried out on borders, Morpho has developed mobile equipment that can read data stored on the smart card of a biometric passport and compare it against the data retrieved on site.

In the future, police in the field will have mobile tools, like tablets, that will allow them to transmit digital fingerprints directly to an information system (IS) from a photo they took on the crime scene. These prints will be automatically analyzed by the IS, which will even be able to send the most likely correspondence directly back to the investigators. This is an advancement made possible thanks to considerable improvements in Morpho algorithms, which were just released on the FBI’s next generation system in the U.S.

14B12P0403.020-026.indd 26 2014/11/14 下午9:26

Page 7: a&s International Nov 2014(Trial version)

Products of the month

30 NOV 201422 www.asmag.com 22

The NVT model NV-ER1808i and NV-ER1816i TBus Ethernet-over-coax/UTP receiver hubs are 19-inch rack mountable bus-architected media switches that have eight or 16 TBus ports, together capable of supporting more than 16 TBus transmitters and their subsequent 10/100 BaseT Ethernet and PoE+ powered devices.

The TBus transmission medium can be coax, two-wire/UTP, or shielded twisted-pair. Data rates up to 150 Mbps are achievable, making these devices the ideal choice in new or legacy installations where existing cable is re-deployed as part of an upgrade to IP cameras. These hubs feature an internal 250 watt power supply. TBus hubs can also use an NVT external 250 watt NV-PS56-250W auxiliary/redundant power supply for high power applications. No IP or MAC addressing configuration is required, yet is available for browser-based monitoring and control. This provides exceptional yet simple configuration and diagnostics for the installer or remote monitoring facility. Status LEDs indicate power, auxiliary power, and link connectivity/activity.

The ET4200CPp-RS16 receiver works with the transmitter of one port Ethernet extender over coax with PoC (ET1100CPp-T) to provide Ethernet extension of 16 channel 10/100 base-TX over coaxial cable to four-port 10/100/1000 Mbps Ethernet. The maximum transmission distance is 800 meters. The product supports PoC, hence, no power point is required on the camera side for the transmitter (ET1100CPp-T) and its connected IP camera if the camera support Power over Ethernet (PoE). The Ethernet data received by any one of the coax data port (1-16) at the receiver is transferred to all four Ethernet ports (P1-P4). The product is good for retrofit of analog video surveillance systems by using the existing coaxial cable infrastructure.

Key Features• Transmit10/100BaseTEthernetupto8,000ftoverRG-59/U,2,000ftover2-wire/UTPor1,300ftovershieldedtwistedpair

• TheTBusarchitectureallowsmultipointoperationinanystarordaisy-chainedtopology,withanycombinationofwiretypes

• Transparentlysupportsallnetworkingprotocols(UDP,TCP/IP,HTTP,MulticastwithIGMP,etc.)usingadvanced128-bitAESencryption

• 10/100/1000uplinkEthernetconnectivity• Easyconfiguration,noPCrequired• 56VDCisdistributedovertheTBustoallconnectedequipment.PoE,PoE+,orhighpowerPoEcameras(orotherPoEdevices),upto50wattsaresupported

Supplier: NetworkVideoTechnologies

URL: www.nvt.com

Key Features• Connectingupto16xET1100CPp-TandIPcameras• Withfullswitchingcapability• 1,000Mbpsfull-duplexcommunication• PoweroverCoaxial(max.400W/800Wtotaloutput)• Datarateperportupto:40Mbps(downlink),10Mbps(uplink)

• Max.distance:800movercoax(RG59/U)• AutoMDI/MDI-X• ACpowerinput• 19”1Urack-mount

Supplier: OTSystems

URL: www.ot-systems.com

hybrid transmission device simplifies Project complexity

nVt nV-er1808i (8-Port) and nV-er1816i (16-Port) tBus ethernet receiver

ot systems et4200cPp-rs16 series receiver (rack-mount receiver of 16-port coax to 4-port 10/100/1000 mbps ethernet switch With Poc)

IB8367-R is the first network camera designed with embedded extender to allow PoE input and PoE output. Users can implement a total PoE solution perfectly. Incorporating a number of advanced features standard for VIVOTEK cameras, the IB8367/IB8367-R are the ideal solutions for outdoor surveillance needs.

Key FeaturesFortheCamera:• EmbeddedPoEExtenderDesigntoSupportbothPoEInput&Output(IB8367-R)

FortheExtender:• Extensiondistance:max.300m(nolocalpowerrequired)

• PoEoutput:12-48W• Bandwidth:max.100Mbps• Megapixel/D1/VGAsupported• H.264/MJPEG/MPEG-4supported• FastEthernet10/100Mps:3

Supplier: VIVOTEK

URL: www.vivotek.com

VIVoteK IB8367/67-r network camera (With embedded extender and transmission cable)

14B12P0403.030-Product of the month 檔案夾.indd 30 2014/11/13 下午9:24

Page 8: a&s International Nov 2014(Trial version)

34 NOV 201422 www.asmag.com 22

INDUSTRY REPORT

34 NOV 201422 www.asmag.com 22

ProPhecy from Security 50 :

Time SoluTionS! for

eligibility • Electronicsecurityequipmentandsystemsproviders,includingvideosurveillance,accesscontrol,

intrusiondetection,andmultipleproductsegments• Securitycompaniesorpuremanufacturerswiththeirownproducts,brands,orsolutions• Publicly-listedandprivately-ownedsecuritycompanies• AbilitytoprovideFY2013andFY2012&firsthalfof2014financialstatements,audited/endorsedbya

certifiedaccountantoraccountingfirm• Distributors,systemsintegrators,resellers,dealers,installers,guardserviceproviders,information

security,andfiresafetycompaniesorrelatedrevenueswereexcluded

n By Jill lai

14B12P0403.034-040.indd 34 2014/11/13 下午9:28

Page 9: a&s International Nov 2014(Trial version)

35NOV 201422 www.asmag.com 22

2014 sEcuRiTy 50

2013 was another rewarding year for the winners of Security 50. even though the average growth rate was comparatively moderate compared to

the past two years, the top 50 still contributed uS$16.9 billion in total sales revenue in 2013. top 10 companies, honeywell, Bosch, hikvision, Safran, ASSA ABLoy, Dahua, fLir, Axis, Samsung, and tyco Security Products, remain the same as last year’s rankings. however, due to the explosive growth of two chinese giants, the top 10 rankings have slightly changed. hikvision has been ranked third, with 2013 being the first time it produced over $1 billion in turnover. Dahua, who had the most obvious growth, beat Axis, Samsung, and fLir, and has been ranked sixth. these two chinese companies’ outstanding performance again impressed the whole security industry.

Steady Growth From 2012 to 2013

the average turnover growth rate for the Security 50 was 8.2 percent in 2013. the 8.2 percent growth rate also corresponds to current researchers’ predictions on the global security market growth — 8 to 10.8 percent in 2013, according to ihS and marketsandmarkets. the result proves that the top 50 companies grew quite steadily in 2013. however, the figure shows a slight slowdown, compared to the average 12 percent growth in Security 50 reports, per year, after 2010.

multinationals among the top 50, which mostly develop multiple security systems, ranging from video surveillance, access control, and alarm, grew exponen-

Time SoluTionS! INDUSTRY REPORT

About the rankingWerankglobalmanufacturerssolelybyproductsales.Participantsrangefromexclusivemanufac-turerstoend-to-endsolutionproviders.Again,weurgereadersnottofocusontherankingoftheparticipants,buttofurtherexploretheunderlyingcausesfortheirsuccess.

Note: a&sbearsnoresponsibilityforthefinancialinformationprovidedbyanyindividualcompany.Forfaircomparisons,non-UScurrencieswereconvertedusingmidmarketexchangeratefromXE.comonJuly14,2014.Thisisanunbiasedlistbasedonthewillingnessofparticipantstosharetheirsalesperformance.

Acknowledgements

14B12P0403.034-040.indd 35 2014/11/13 下午9:28

Page 10: a&s International Nov 2014(Trial version)

42 NOV 201422 www.asmag.com 22

INDUSTRY REPORT

Security 50 SetS trendS for 2015

Axis Communications also see this trend towards solutions. We have broadened our offering for small and medium-sized installations. Axis network cameras and software can now be offered as an overall solution adapted to end user needs. For an overall solution for mid-sized installations, for example in school environments and in the retail segment, Axis recently launched

video recorders. The recorder includes three different server solutions, which are pre-installed with management software and configured to seamlessly match Axis’ wide range of network cameras.

Also, the physical access control market is well-suited to Axis’ long-term growth strategy. The investment is part of our ambition to broaden the global offering in security solutions and advance cooper-ation with partners around the world. The solution is offered in the U.S. and Europe through Axis’ well-established network of distributors and partners.

Migration froM Device to SySteMS Systems/solutions are an

important element to our roadmap. FLIR has been investing significantly into a cloud-based service that brings all of our products together into a powerful management and search tool. This is not the only example though.

We constantly evaluate how we can bring more value to our largest verticals, whether through internal resources or our partners. A simple example that we have used for years: a fixed thermal imager is a great 24/7 surveillance tool, but coupled with intelligent analytics it is a powerful pro-active security tool that greatly increases the customer’s return on investment. We continue to look for ways on how we can build upon that solution.

For the box moving business, the trend is going toward solutions type of business. In the past, there were many different vendors in the market, such as camera manufacturers, VMS providers, and systems integrators. However, since the margin has been squeezed, there

is no room for multiple vendors. So, the trend is that we need to build total solutions for customers. It should be easy to use, have lower total cost of ownership, be very easy to install and very easy to maintain. That is what we are planning right now — we have cameras, we have software, NVRs, and PoE switches, so that installers can buy a total system from us.

SimonsVoss has launched a new digital access management system in building solutions. With this, we consequently pursue solution integration and cooperation with partners in access control. We will open up entirely new customer groups that have long wished to have SimonsVoss as a lock system with all of its strengths. The configuration of the system has

been kept extremely simple, e.g., with self-configuring online routers to establish the optimum network. For installation, this is extremely simple and reduces costs. By providing this new system, SimonsVoss will enter SOHO users market. These solutions are expendable to high-end systems and will grow with the users need.

Matt Bretoi, VP, North America Field Sales, FLIR Systems

Johan Paulsson, CTO, Axis Communications

Steve Ma, EVP, VIVOTEK Bernhard Sommer, CEO, SimonsVoss Technologies

14B12P0403.042-045-TOP 50 Security 檔案夾.indd 42 2014/11/13 下午9:32

Page 11: a&s International Nov 2014(Trial version)

43NOV 201422 www.asmag.com 22

2014 sEcuRiTy 50

Within the last year, we’ve increased compatibility between two systems, enabling higher-end commercial end-users to have access to a technology that’s used to support critical infrastructure sites — places like military bases, government installations, etc. — around the world. So the same type of high-tech system you see protecting a military base can now be used to protect large commercial sites like

shopping malls, airports, and such. One of our security management systems can integrate intrusion, video and access systems, and this year we added more support for wireless locks to allow for users to protect more doors. For another Honeywell’s integrated solution, we also added new compact surveillance radar capabilities that will allow sites to detect intruders along perimeters when traditional ground surveillance radar systems are not practical.

Milestone open platform integrations with third-party solution partners constantly bring new innovations for more vertical or expanded market needs. For example, Milestone’s video management software integrates GuardTrax mobile video alerts for roving officers, SICK and Optex laser scanners for critical perimeter protection and challenging physical barrier require-

ments, and Inovonics panic button interoperability for emergency communication.

The connected home is a great example where traditional security systems are now being used for non-security applications, like simple awareness and comfort control. One recently introduced Honeywell control

panel can control everything from security to lighting, garage doors and more was one our most-important product launches this year in the Americas because it embodies that type of design; it features the ability to stream four IP camera feeds directly on a touchscreen and it can be controlled remotely from a Honeywell app.

Milestone sees the healthcare industry using video surveillance for patient monitoring, schools are using it for parents to be able to see how their children are doing in class and on the

playground, universities are using it for student training and teacher evaluations, utilities are using it to monitor equipment and operations including solar and wind farms overseeing remote operations, retail is using it to track customer flow and product areas of interest for improving floor layouts accordingly.

There’s no single vendor out there offering best of breed across all disciplines including intruder, fire, access, surveillance, etc. Most corporate enterprises have a complex jumble of disparate and proprietary systems and that

causes gaps in security. A control room with alarms and alerts from multiple disparate systems can result in alarms simply being ignored, through to chaos as operators jump from screen to screen as they try, and often fail, to verify each alarm.

To address these challenges, IDIS recently announced the integration with Maxxess (event management), SureView (alarm monitoring) and Lenel (access control management) particularly addressing the corporate enterprise market. This integration delivers IDIS IP video surveillance systems functionality through single security management platforms to enhance resilience through event and video correlation to increase operator effectiveness, and turn streamlines operations to reduce cost. It also helps those customers integrate their legacy video surveillance and develop an easy migration path rather than needing to rip and replace everything immediately.

David Gottlieb, Director, Global Marketing Communications, Honeywell Security

Karl Erik Traberg, Head of Corporate Communications and Business Development, Milestone Systems

David Gottlieb, Director, Global Marketing Communications, Honeywell Security

Karl Erik Traberg, Head of Corporate Communications and Business Development, Milestone Systems

Brian Song, MD, IDIS Europe

integrateD SySteMS, Well-DeSigneD for applicationS

neW applicationS, neW MarketS

14B12P0403.042-045.indd 43 14/11/13 上午4:22

Page 12: a&s International Nov 2014(Trial version)

INDUSTRY

REP

OR

T2

01

4 s

Ecu

RiT

y 5

0

2014

Top

Secu

rity 5

014

Ra

nking

13

Rank

ingCo

mpa

nyHe

adqu

arte

rsPr

oduc

t Gro

up20

13 (i

n US

$Milli

on)

2012

(in

US$M

illion

)

Reve

nue

Grow

th

2013

-201

2

Gros

s Pro

fit

(in U

S$ M

) 201

3Gr

oss P

rofit

(in

US$

M) 2

012

Prof

it Gr

owth

20

13-2

012

Gros

s M

argin

2013

2014

1st

half

(US$

M)

2013

1st

half (

US$M

)

2014

1s

t half

Re

venu

e Gr

owth

(US$

M

)

2014

1st

half G

ross

Prof

it

(US$

M)

2013

1st

half G

ross

Prof

it

(US$

M)

2014

1st

half P

rofit

Gr

owth

2014

1st

half G

ross

Mar

gin

11

Hone

ywel

l Sec

urity

USM

ultipl

e27

00.0

25

00.0

8.0%

22

Bosc

h Se

curit

y Sys

tem

sGe

rman

yM

ultipl

e20

39.9

20

18.1

1.1%

34

Hikv

ision

Dig

ital T

echn

olog

yCh

inaVid

eo

Surve

illanc

e16

56.2

10

97.9

50.9%

545.5

372.8

46.3%

32.9%

943.3

61

8.7

52.5%

275.2

18

1.0

52.1%

29.2%

43

Safra

n (S

ecur

ity P

rodu

cts

Only

)Fra

nce

Acce

ss Co

ntrol

1614

.2

1648

.2 -2

.1%

55

ASSA

ABL

OY (G

loba

l Te

chno

logi

es)

Swed

enAc

cess

Cont

rol &

Lo

cks

954.

6 92

3.6

3.4%

478.0

46

2.7

3.3%

69

Dahu

a Tec

hnol

ogy

China

Video

Su

rveilla

nce

871.

6 56

8.9

53.2%

181.3

121.6

49.1%

20.8%

490.2

32

7.3

49.8%

89.5

69.6

28.54

%18

.26%

77

FLIR

Syst

ems (

Ther

mal

Vi

sion

& M

easu

rem

ent)

USVid

eo

Surve

illanc

e72

7.9

628.0

15

.9%

86

Axis

Com

mun

icatio

nsSw

eden

Video

Su

rveilla

nce

694.

4 61

3.3

13.2%

365.1

30

8.6

18.3%

98

Sam

sung

Tech

win

Korea

Mult

iple

659.

2 65

8.4

0.1%

1010

Tyco

Secu

rity P

rodu

cts

USM

ultipl

e65

0.0

500.0

30

.0%

11NE

WAl

legi

on (E

lect

roni

c Pr

oduc

ts &

Acc

ess C

ontro

l)US

Acce

ss Co

ntrol

&

Lock

s43

9.6

1211

Aiph

one

Japa

nAc

cess

Cont

rol41

9.7

364.2

15

.2%

1312

TKH

Grou

p (V

ision

& Se

curit

y Sy

stem

s)Ne

therl

ands

Mult

iple

325.

8 23

9.9

35.8%

59.6

65.7

-9.2%

1413

Neda

pNe

therl

ands

Acce

ss Co

ntrol

207.

7 20

9.2

-0.7%

1514

NICE

Syst

ems (

Secu

rity

Solu

tions

)Isr

ael

Mult

iple

193.

9 18

5.9

4.3%

1623

Avig

ilon

Cana

daM

ultipl

e16

7.6

94.2

77.9%

90.9

46.4

95.7%

54.2%

113.7

67

.0 69

.7%63

.8 34

.9 82

.89%

56.10

%

1722

Opte

x (Se

nsin

g Pr

oduc

ts

Busin

ess)

Japa

nInt

rusio

n De

tectio

n16

1.5

138.1

16

.9%87

.1 76

.8 13

.4%

1817

Infin

ova

USVid

eo

Surve

illanc

e15

4.8

122.0

26

.8%8.6

1.263

8.3%

5.6%

59.5

69.0

-13.8

%-0

.4 1.1

-1

32.17

%-0

.62%

1919

VIVO

TEK

Taiw

anVid

eo

Surve

illanc

e13

0.0

107.5

21

.0%58

.6 65

.0 -9

.9%

2024

Tam

ron

(Com

mer

cial &

In

dust

rial)

Japa

nVid

eo

Surve

illanc

e (Le

ns)

121.

7 90

.4 34

.7%60

.8 51

.7 17

.6%

2118

Verin

t Sys

tem

s (Vi

deo

Inte

llige

nce)

USVid

eo

Surve

illanc

e12

0.4

119.5

0.8

%55

.5 60

.9 -8

.9%

2220

Mob

otix

Germ

any

Mult

iple

117.

5 11

1.0

5.8%

8984

.45.5

%75

.8%

2315

IDIS

Korea

Video

Su

rveilla

nce

115.

4 14

9.5

-22.8

%56

.1 60

.6 -7

.4%

2427

Com

max

Korea

Mult

iple

99.3

86

.9 14

.3%24

.323

.43.6

%24

.4%49

.9 43

.4 15

.0%9.6

11

.9 -1

9.42%

19.25

%

2521

Hitro

nKo

reaVid

eo

Surve

illanc

e95

.0

114.7

-1

7.2%

4.88.6

-44.7

%5.0

%38

.3 50

.2 -2

3.7%

2.4

3.2

-26.2

3%6.2

0%

2629

KOCO

MKo

reaM

ultipl

e93

.5

81.8

14.3%

22.5

21.2

5.8%

24.0%

48.0

34.4

39.6%

12.2

8.5

43.12

%25

.33%

2725

AVTE

CHTa

iwan

Video

Su

rveilla

nce

87.2

10

8.4

-19.5

%32

.840

.9-1

9.6%

37.7%

30.7

46.0

-33.4

%9.7

17

.5 -4

4.71%

31.47

%

2844

ITX S

ecur

ityKo

reaVid

eo

Surve

illanc

e81

.0

44.3

82.8%

17.2

12.8

34.7%

21.2%

40.4

34.0

18.8%

7.8

8.0

-1.73

%19

.43%

2934

Geut

ebru

ckGe

rman

yVid

eo

Surve

illanc

e78

.7

71.5

10.1%

3030

Syne

ctics

UK

Video

Su

rveilla

nce

76.7

66

.7 15

.0%29

.528

.43.9

%38

.5%

3133

Dyna

Colo

r Ta

iwan

Video

Su

rveilla

nce

75.6

69

.4 8.9

%30

.727

.810

.7%40

.7%39

.3 34

.4 14

.0%15

.8 14

.3 11

.16%

40.37

%

3235

GeoV

ision

Taiw

anVid

eo

Surve

illanc

e74

.7

66.6

12.1%

4138

.17.8

%55

.0%18

.0 16

.5 9.3

%10

.0 9.1

10

.26%

55.49

%

3337

Mile

ston

e Sys

tem

sDe

nmark

Video

Su

rveilla

nce

74.3

58

.0 28

.0%

3436

Sim

onsV

oss T

echn

olog

ies

Germ

any

Acce

ss Co

ntrol

73.2

66

.4 10

.3%

3528

Ever

Focu

s Ele

ctro

nics

Taiw

anM

ultipl

e72

.1

76.4

-5.6%

20.4

25.2

-19.2

%28

.2%26

.7 36

.8 -2

7.3%

8.7

10.8

-19.8

4%32

.50%

3631

Napc

o Sec

urity

Syst

ems

USM

ultipl

e71

.4

70.9

0.6%

21.7

21.1

2.7%

30.4%

3732

HDPR

OKo

reaVid

eo

Surve

illanc

e69

.9

76.7

-8.9%

12.8

14.4

-11.2

%18

.2%

3826

CNB

Tech

nolo

gyKo

reaVid

eo

Surve

illanc

e64

.6

95.1

-32.1

%9.7

23.8

-59.1

%15

.1%24

.2 35

.1 -3

1.0%

3.8

5.4

-30.7

9%15

.50%

3916

RCG

China

(HK)

Acce

ss Co

ntrol

60.2

13

2.0

-54.4

%29

.482

.8-6

4.6%

48.8%

4041

Indi

goVi

sion

UKVid

eo

Surve

illanc

e54

.8

51.9

5.7%

31.1

30.6

1.5%

56.7%

31.5

27.6

14.2%

17.8

15.0

18.87

%56

.43%

4138

Ferm

ax

Spain

Acce

ss Co

ntrol

54.1

53

.1 1.8

%30

.531

.2-2

.1%56

.5%

4240

Supr

ema

Korea

Acce

ss Co

ntrol

51.1

50

.9 0.4

%25

.824

.36.3

%50

.4%34

.6 21

.5 60

.8%17

.0 11

.0 54

.51%

49.06

%

4342

Dali T

echn

olog

yCh

inaVid

eo

Surve

illanc

e42

.1

43.9

-3.9%

5.85.8

0.5%

13.8%

21.5

18.6

15.5%

2.9

1.5

97.82

%13

.73%

4446

Win

4Net

Korea

Video

Su

rveilla

nce

41.1

39

.4 4.1

%13

.410

.825

.0%32

.7%15

.5 19

.3 -1

9.6%

4.3

6.6

-34.5

4%27

.75%

4539

Vico

nUS

Video

Su

rveilla

nce

39.8

49

.7 -1

9.7%

15.1

19.6

-22.9

%38

.0%15

1.1

19.8

663.9

%5.6

7.5

-2

4.62%

3.72%

4643

C-Pr

o Ele

ctro

nics

Korea

Video

Su

rveilla

nce

38.9

44

.9 -1

3.2%

7.17.8

-8.8%

18.3%

4748

Mag

al Se

curit

y Sys

tem

s (P

erim

eter

Pro

duct

s)Isr

ael

Intru

sion

Detec

tion

30.6

33

.9 -1

0.0%

4849

Hunt

Elec

troni

cTa

iwan

Video

Su

rveilla

nce

29.9

28

.6 4.5

%10

.88.5

26.8%

36.2%

11.7

14.7

-20.4

%4.3

5.0

-1

4.05%

36.98

%

4947

Hi Sh

arp

Elec

troni

csTa

iwan

Video

Su

rveilla

nce

29.7

33

.7 -1

1.9%

4.63.8

21.0%

15.5%

13.3

16.0

-16.6

%2.5

2.5

-0

.58%

18.59

%

5050

Ever

sprin

g In

dust

ryTa

iwan

Intru

sion

Detec

tion &

HA

29.0

30

.5 -4

.7%7.8

8.3-5

.2%27

.0%22

.6 14

.7 53

.8%7.2

4.2

72

.85%

31.85

%

1693

2.4

Aver

age

8.2%

48.7

40

.9

5.9%

32.9

%

Prod

uct S

ales

Rev

enue

Prod

uct S

ales

Rev

enue

14B12P0403.048-052.indd 48 2014/11/13 下午9:36

Page 13: a&s International Nov 2014(Trial version)

14

Rank

ing13

Ra

nking

Com

pany

Head

quar

ters

Prod

uct G

roup

2013

(in

US$M

illion

)20

12 (i

n US

$Milli

on)

Reve

nue

Grow

th

2013

-201

2

Gros

s Pro

fit

(in U

S$ M

) 201

3Gr

oss P

rofit

(in

US$

M) 2

012

Prof

it Gr

owth

20

13-2

012

Gros

s M

argin

2013

2014

1st

half

(US$

M)

2013

1st

half (

US$M

)

2014

1s

t half

Re

venu

e Gr

owth

(US$

M

)

2014

1st

half G

ross

Prof

it

(US$

M)

2013

1st

half G

ross

Prof

it

(US$

M)

2014

1st

half P

rofit

Gr

owth

2014

1st

half G

ross

Mar

gin

11

Hone

ywel

l Sec

urity

USM

ultipl

e27

00.0

25

00.0

8.0%

22

Bosc

h Se

curit

y Sys

tem

sGe

rman

yM

ultipl

e20

39.9

20

18.1

1.1%

34

Hikv

ision

Dig

ital T

echn

olog

yCh

inaVid

eo

Surve

illanc

e16

56.2

10

97.9

50.9%

545.5

372.8

46.3%

32.9%

943.3

61

8.7

52.5%

275.2

18

1.0

52.1%

29.2%

43

Safra

n (S

ecur

ity P

rodu

cts

Only

)Fra

nce

Acce

ss Co

ntrol

1614

.2

1648

.2 -2

.1%

55

ASSA

ABL

OY (G

loba

l Te

chno

logi

es)

Swed

enAc

cess

Cont

rol &

Lo

cks

954.

6 92

3.6

3.4%

478.0

46

2.7

3.3%

69

Dahu

a Tec

hnol

ogy

China

Video

Su

rveilla

nce

871.

6 56

8.9

53.2%

181.3

121.6

49.1%

20.8%

490.2

32

7.3

49.8%

89.5

69.6

28.54

%18

.26%

77

FLIR

Syst

ems (

Ther

mal

Vi

sion

& M

easu

rem

ent)

USVid

eo

Surve

illanc

e72

7.9

628.0

15

.9%

86

Axis

Com

mun

icatio

nsSw

eden

Video

Su

rveilla

nce

694.

4 61

3.3

13.2%

365.1

30

8.6

18.3%

98

Sam

sung

Tech

win

Korea

Mult

iple

659.

2 65

8.4

0.1%

1010

Tyco

Secu

rity P

rodu

cts

USM

ultipl

e65

0.0

500.0

30

.0%

11NE

WAl

legi

on (E

lect

roni

c Pr

oduc

ts &

Acc

ess C

ontro

l)US

Acce

ss Co

ntrol

&

Lock

s43

9.6

1211

Aiph

one

Japa

nAc

cess

Cont

rol41

9.7

364.2

15

.2%

1312

TKH

Grou

p (V

ision

& Se

curit

y Sy

stem

s)Ne

therl

ands

Mult

iple

325.

8 23

9.9

35.8%

59.6

65.7

-9.2%

1413

Neda

pNe

therl

ands

Acce

ss Co

ntrol

207.

7 20

9.2

-0.7%

1514

NICE

Syst

ems (

Secu

rity

Solu

tions

)Isr

ael

Mult

iple

193.

9 18

5.9

4.3%

1623

Avig

ilon

Cana

daM

ultipl

e16

7.6

94.2

77.9%

90.9

46.4

95.7%

54.2%

113.7

67

.0 69

.7%63

.8 34

.9 82

.89%

56.10

%

1722

Opte

x (Se

nsin

g Pr

oduc

ts

Busin

ess)

Japa

nInt

rusio

n De

tectio

n16

1.5

138.1

16

.9%87

.1 76

.8 13

.4%

1817

Infin

ova

USVid

eo

Surve

illanc

e15

4.8

122.0

26

.8%8.6

1.263

8.3%

5.6%

59.5

69.0

-13.8

%-0

.4 1.1

-1

32.17

%-0

.62%

1919

VIVO

TEK

Taiw

anVid

eo

Surve

illanc

e13

0.0

107.5

21

.0%58

.6 65

.0 -9

.9%

2024

Tam

ron

(Com

mer

cial &

In

dust

rial)

Japa

nVid

eo

Surve

illanc

e (Le

ns)

121.

7 90

.4 34

.7%60

.8 51

.7 17

.6%

2118

Verin

t Sys

tem

s (Vi

deo

Inte

llige

nce)

USVid

eo

Surve

illanc

e12

0.4

119.5

0.8

%55

.5 60

.9 -8

.9%

2220

Mob

otix

Germ

any

Mult

iple

117.

5 11

1.0

5.8%

8984

.45.5

%75

.8%

2315

IDIS

Korea

Video

Su

rveilla

nce

115.

4 14

9.5

-22.8

%56

.1 60

.6 -7

.4%

2427

Com

max

Korea

Mult

iple

99.3

86

.9 14

.3%24

.323

.43.6

%24

.4%49

.9 43

.4 15

.0%9.6

11

.9 -1

9.42%

19.25

%

2521

Hitro

nKo

reaVid

eo

Surve

illanc

e95

.0

114.7

-1

7.2%

4.88.6

-44.7

%5.0

%38

.3 50

.2 -2

3.7%

2.4

3.2

-26.2

3%6.2

0%

2629

KOCO

MKo

reaM

ultipl

e93

.5

81.8

14.3%

22.5

21.2

5.8%

24.0%

48.0

34.4

39.6%

12.2

8.5

43.12

%25

.33%

2725

AVTE

CHTa

iwan

Video

Su

rveilla

nce

87.2

10

8.4

-19.5

%32

.840

.9-1

9.6%

37.7%

30.7

46.0

-33.4

%9.7

17

.5 -4

4.71%

31.47

%

2844

ITX S

ecur

ityKo

reaVid

eo

Surve

illanc

e81

.0

44.3

82.8%

17.2

12.8

34.7%

21.2%

40.4

34.0

18.8%

7.8

8.0

-1.73

%19

.43%

2934

Geut

ebru

ckGe

rman

yVid

eo

Surve

illanc

e78

.7

71.5

10.1%

3030

Syne

ctics

UK

Video

Su

rveilla

nce

76.7

66

.7 15

.0%29

.528

.43.9

%38

.5%

3133

Dyna

Colo

r Ta

iwan

Video

Su

rveilla

nce

75.6

69

.4 8.9

%30

.727

.810

.7%40

.7%39

.3 34

.4 14

.0%15

.8 14

.3 11

.16%

40.37

%

3235

GeoV

ision

Taiw

anVid

eo

Surve

illanc

e74

.7

66.6

12.1%

4138

.17.8

%55

.0%18

.0 16

.5 9.3

%10

.0 9.1

10

.26%

55.49

%

3337

Mile

ston

e Sys

tem

sDe

nmark

Video

Su

rveilla

nce

74.3

58

.0 28

.0%

3436

Sim

onsV

oss T

echn

olog

ies

Germ

any

Acce

ss Co

ntrol

73.2

66

.4 10

.3%

3528

Ever

Focu

s Ele

ctro

nics

Taiw

anM

ultipl

e72

.1

76.4

-5.6%

20.4

25.2

-19.2

%28

.2%26

.7 36

.8 -2

7.3%

8.7

10.8

-19.8

4%32

.50%

3631

Napc

o Sec

urity

Syst

ems

USM

ultipl

e71

.4

70.9

0.6%

21.7

21.1

2.7%

30.4%

3732

HDPR

OKo

reaVid

eo

Surve

illanc

e69

.9

76.7

-8.9%

12.8

14.4

-11.2

%18

.2%

3826

CNB

Tech

nolo

gyKo

reaVid

eo

Surve

illanc

e64

.6

95.1

-32.1

%9.7

23.8

-59.1

%15

.1%24

.2 35

.1 -3

1.0%

3.8

5.4

-30.7

9%15

.50%

3916

RCG

China

(HK)

Acce

ss Co

ntrol

60.2

13

2.0

-54.4

%29

.482

.8-6

4.6%

48.8%

4041

Indi

goVi

sion

UKVid

eo

Surve

illanc

e54

.8

51.9

5.7%

31.1

30.6

1.5%

56.7%

31.5

27.6

14.2%

17.8

15.0

18.87

%56

.43%

4138

Ferm

ax

Spain

Acce

ss Co

ntrol

54.1

53

.1 1.8

%30

.531

.2-2

.1%56

.5%

4240

Supr

ema

Korea

Acce

ss Co

ntrol

51.1

50

.9 0.4

%25

.824

.36.3

%50

.4%34

.6 21

.5 60

.8%17

.0 11

.0 54

.51%

49.06

%

4342

Dali T

echn

olog

yCh

inaVid

eo

Surve

illanc

e42

.1

43.9

-3.9%

5.85.8

0.5%

13.8%

21.5

18.6

15.5%

2.9

1.5

97.82

%13

.73%

4446

Win

4Net

Korea

Video

Su

rveilla

nce

41.1

39

.4 4.1

%13

.410

.825

.0%32

.7%15

.5 19

.3 -1

9.6%

4.3

6.6

-34.5

4%27

.75%

4539

Vico

nUS

Video

Su

rveilla

nce

39.8

49

.7 -1

9.7%

15.1

19.6

-22.9

%38

.0%15

.1 19

.8 -2

3.4%

5.6

7.5

-24.6

2%37

.09%

4643

C-Pr

o Ele

ctro

nics

Korea

Video

Su

rveilla

nce

38.9

44

.9 -1

3.2%

7.17.8

-8.8%

18.3%

4748

Mag

al Se

curit

y Sys

tem

s (P

erim

eter

Pro

duct

s)Isr

ael

Intru

sion

Detec

tion

30.6

33

.9 -1

0.0%

4849

Hunt

Elec

troni

cTa

iwan

Video

Su

rveilla

nce

29.9

28

.6 4.5

%10

.88.5

26.8%

36.2%

11.7

14.7

-20.4

%4.3

5.0

-1

4.05%

36.98

%

4947

Hi Sh

arp

Elec

troni

csTa

iwan

Video

Su

rveilla

nce

29.7

33

.7 -1

1.9%

4.63.8

21.0%

15.5%

13.3

16.0

-16.6

%2.5

2.5

-0

.58%

18.59

%

5050

Ever

sprin

g In

dust

ryTa

iwan

Intru

sion

Detec

tion &

HA

29.0

30

.5 -4

.7%7.8

8.3-5

.2%27

.0%22

.6 14

.7 53

.8%7.2

4.2

72

.85%

31.85

%

1693

2.4

Aver

age

8.2%

48.7

40

.9

5.9%

32.9

%

14B12P0403.048-050.indd 49 2014/11/14 下午9:31

Page 14: a&s International Nov 2014(Trial version)

Product ExPloration

58 NOV 201422 www.asmag.com 22

of the solutions employs a two-bin Kanban system where both bins are tagged with RFID tags and filled with medical supplies. When one of the bins runs out, the nurse can push a button on the RFID

tag, and an order is automatically generated and sent to the supplier. Status of the order can be written into the tag and displayed on a monitor on the tag. The supplies can be delivered

directly to the bin, which is kept at a department of the hospital, thus eliminating the need for central storage. “What happens typically by using this technology is a reduction of 40 percent of inventory room,” said Shlomo Matityaho, CEO of Logitag. “We see a reduction of labor and elimination of people who count and order.”

Another solution employs cabinets filled with medical supplies, each of which is tagged with an RFID tag. Each time a supply is taken out, a record

creative applications

rFidillustrate Wonders of

In many ways, RFID is like a paintbrush or building blocks, allowing users to be as creative as they can to solve a particular

problem or dilemma. Its technology is quite simple, consisting of only a reader and a tag.

But applications can be diverse, wide-ranging, and even wild. Regardless how the solutions are implemented, the goal is the same: to help users

save cost, reduce administrative waste, and manage and track items effectively. This article examines

some of the unique and special applications of RFID in different verticals.

n By William Pao

Product ExPloration

Hospitalslogitag solutions Make sure

How do hospitals keep track of medical supplies used by patients? How do they know when it’s time to reorder supplies? Logitag solutions address those needs with RFID solutions, which have

helped operators save on labor and management cost.Logitag’s solutions have been deployed in various medical facilities,

including Wyoming Medical Center and New York Hospital Queens. One

Shlomo Matityaho, CEO, Logitag

“We see a reduction of labor and elimination of people who count

and order.”

are always stocked

14B12P0403.058-062.indd 58 14/11/13 上午4:41

Page 15: a&s International Nov 2014(Trial version)

59NOV 201422 www.asmag.com 22

is generated on who took the supply and which patient received the supply, so that the patient can be billed accordingly. A third application is for protection of infants at hospitals. A baby and its mother are given a pair of RFID tags, and both tags must be present in order for them to exit the infants ward. ■

Currently, there is a trend of moving RFID towards NFC, where tags can be read by one’s mobile device. If implemented right, such a combination can work wonders for users. That’s exactly what happened at Argentina-based Bodega Norton Winery,

which uses a solution from HID Global to manage workers, pay them properly, and create an overall more pleasant working environment.

Before the implementation, the vineyard paid its grape harvesters by way of plastic chips of different shapes and colors to indicate the number of bins each worker filled. The workers would pocket the chips and then collect their pay at the end of the workweek. Several issues arose as a result of this. First, chips are easily lost or stolen during the week. Second, some workers would use the chips to settle their personal debts. A more efficient way to manage workers and pay them according to their workload was therefore needed.

With HID’s solution, the cumbersome chips were eliminated. Each harvester is assigned an armband tag. At the end of the day, the workers would put the grapes they picked into bins, each equipped with a tag. Now, the supervisor would take his NFC-enabled mobile phone, point it at a worker, and then point it at the bin that he is associated with. The system would automatically create a record for the amount of work that the harvester did and credit the payments to him.

Benefits of the solution are manifold. “Beginning with the grape harvest, HID can help Norton improve quality, optimize data accuracy, and streamline critical systems at every stage of the wine production and distribution process,” said Richard Aufreiter, Director Product Management at HID Global. ■

“We can help improve quality,

optimize data accuracy, and

streamline critical systems.”

at argentine Vineyard witH Hid solution

grapes satisfaction

of

solutionfirst of its kind

giga-tMs’

“The reader was strategically placed on the side of the vehicle door. Read accureacy rose to

87%.”

Imagine a shuttle bus picking up senior or disabled citizens from their homes and taking them to a

daycare center. Each time people get on, they need to sign a paper log to help the driver keep track. This was burdensome and ineffective, as many of the passengers have a hard time writing legibly.

The solution to this real-life problem in a major western city led to the world’s first RFID application for tracking passengers on a public shuttle system, according to Brian Ma, Sales Representative at GIGA-TMS, which created the UHF RFID application.

Since most citizens of this city already have RFID-enabled citizens cards, GIGA-TMS’ solution took advantage of that. Once people get on the vehicle, their cards would be

citizen tracking

14B12P0403.058-062.indd 59 14/11/13 上午4:41

Page 16: a&s International Nov 2014(Trial version)

Product ExPloration

64 NOV 201422 www.asmag.com 22

RFID, or radio-frequency identification, can trace its history to after the

Second World War, when devices transmitting and retransmitting radio waves carrying audio information were invented for covert operations. The first true RFID device, a passive transponder with memory, was unveiled in 1971 and patented in 1973.

While RFID is not a new concept, it has never gone out of style since its introduction in the last century. From parking lots to highways, factories to offices, RFID can now be found in various parts of our everyday life. According to IDTechEx, the RFID market is worth US$8.9 billion in 2014, a rise from $7.8 billion in 2013 and $7 billion in 2012. The figure is expected to rise to $27.3 billion by

rFid: More Varied and diverse than EverRFID first hit the market in the 1970s and has seen continued improvements over the years, making it an effective technology for tracking and managing goods with applications in a variety of vertical markets. RFID exists in different types and forms. Chief among them are LF, HF, UHF, active, and passive RFID, each with unique applications in different verticals. This article chiefly examines the technology behind long-range RFID.n By William Pao

2024. The market research firm also predicts 6.9 billion tags will be sold by the end of 2014 — versus 5.8 billion in

2013 — to retailers, event organizers, and animal farmers, among others.

RFID’s popularity has to do with its ability to effectively identify, manage, and track

goods, in the process saving businesses a huge amount of money in labor

and management costs. The technology works by way of communication between a reader and a tag and

generally

While RFID is nothing new, it has never gone

out of style. From parking

lots to factories to offices, RFID can be found in various parts of our everday life.

14B12P0403.064-067.indd 64 14/11/13 上午4:48

Page 17: a&s International Nov 2014(Trial version)

65NOV 201422 www.asmag.com 22

includes the following features:1. Read-Write: Data stored in the tag can

be read, without any contact, by the reader, which can read multiple tags at the same time. Meanwhile, data can also be written into the tag for operators to know the status of the order or delivery process.

2. Diversity in shapes and sizes: Unlike paper labels which come in specific sizes, RFID isn’t limited by the size of the tag, which can be in different shapes and be as small as possible.

3. Resistance to dirt/stains: Unlike paper labels, which become unreadable when dirtied or soiled, RFID tags don’t have this problem.

4. Reusability: Since data stored in the tag can be overwritten, the tag can be reused over and over again on different products.

5. Bigger memory: A barcode contains 50 bytes of data, while an RFID tag can contain several megabytes of data.

Diversity rulesRFID comes in many forms, each with

its special features and applications. The technology can be categorized in two ways: by the frequency of the signal transmitted (low-frequency, high-frequency, and ultrahigh-frequency RFID), and by whether there is power in the tag itself (active RFID vs. passive RFID).

LF RFIDThis technology employs the 9kHz

to 135kHz band of the radio spectrum. It is limited by the reading distance, which is approximately 1.5 meters. Limited memory capacity is another disadvantage with this type of RFID. However, there are several advantages as well, one of which is its immunity to metal or wet environments. Meanwhile, since this frequency band is open in most countries, there are fewer regulatory issues. Applications are

mostly in animal management on farms, access control, and theft prevention.

HF RFIDHF RFID uses the 13.56MHz frequency

band. It is also limited by the reading range of 1.5 meters, and there are different standards applied to this particular RFID. However, HF RFID is a highly accepted technology with different applications, for example access control payments, automation, asset tracking, library management, and electronic airline tickets. “HF RFID allows high flexibility as well as good stability and security,” said Klaus Klosa, MD at LEGIC Identsystems.

UHF RFIDUHF RFID signals range from 300MHz

to 1.2GHz. The reading distance is not limited by 1.5 meters and can go anywhere from 1 centimeter to 15 meters. The technology is also well-standardized. Disadvantages include susceptibility to the environment. Interference when overlapping with devices using the same frequency range may also happen. In fact, this frequency band is banned for commercial use in Japan.

Despite all this, UHF RFID has enjoyed strong growth, especially in areas, such as retail, where strong inventory visibility is needed. “UHF technology is strongly growing compared to other frequencies due to its high performance and good standardization,” said Richard Aufreiter, Director of Product Management at HID Global.

Active vs. PassiveThe method of powering the RFID tag

differentiates between active and passive RFID. Active RFID uses an internal power source, such as a battery, within the tag, which can transmit signals to the reader.

Frequency Advantages Disadvantages ApplicationsLow frequency(9-135kHz)

Immunity to metal or wet environments, fewer regulatory issues

Limited by reading distance of approxi-mately 1.5 meters

Animal management, access control, theft prevention

High frequency(13.56MHz)

High market acceptance, flexibility, and reliability

Limited by reading distance of 1.5 meters, different standards

Access control payments, automation, asset tracking, library management, and electronic airline tickets

Ultrahigh frequency(300MHz-1.2GHz)

Long reading distance from 1centimeter to 10 to15 meters, well-standardized

Susceptibility to the environment, interference when overlapping with devices of same frequency

Retail, logistics, toll collection, car park

Comparison of RFID of Different Frequencies

14B12P0403.064-067-Product Exploration-RFID-2 檔案夾.indd 65 2014/11/13 下午9:45

Page 18: a&s International Nov 2014(Trial version)

72 NOV 201422 www.asmag.com 22

Vertical Market

Hospitals are in the business of serving people and their families. Their primary goal is to provide patients with medical care, comfort, and peace of mind. Traditionally security systems in healthcare have been used for access

control, providing forensic video and personal alerts for staff in cases of violence, and monitoring at-risk populations such as infants or patients suffering from dementia to protect against kidnapping or wandering.

“The purpose of healthcare security management is to contribute to the protection and safety of all those delivering medical service and safeguarding public and private assets against loss, theft, fraud, damage, and disruption, which could be detrimental and a risk to the continuation of patient care. Patients, employees, and visitors assume that since hospitals take care of the community they are immune from local crime and the ills of society,” said Nick van der Bijl, an honorary president of the National Association for Healthcare Security in the U.K. and former healthcare security manager. However, by their nature, hospitals are violent places, some of which are of a clinical nature — post-operative trauma, serious mental health, and pain. But there are also instances when violence is of a criminal nature, such as violence against others.

Behind the scenes, hospital security teams face numerous challenges that involve the safety and security of employees, patients, visitors, and confidential personal information, as well as safeguarding dangerous materials, pharmaceutical supplies, and more. A breach in any of these areas can cause financial, legal, and reputational damages.

In addition, hospitals have to work under a strict regulatory environment complying with numerous standards. First and foremost is of course

Hospitals combine

ForcesandSecurity

When integrating hospitals and other healthcare facilities, sometimes the technology isn’t the problem as much as the psychology of the people involved and their different approaches to security.

Outlook of a clinic operation center. Image

courtesy of Mayco Clinic Health System.

14B12P0403.072-076.indd 72 2014/11/13 下午10:05

Page 19: a&s International Nov 2014(Trial version)

73NOV 201422 www.asmag.com 22

SystemsSecurityA recent change in the healthcare vertical is an increase in the number mergers and acquisitions. More and more healthcare facilities combine forces to reduce their costs. The need to integrate separate security systems is added to the existing challenges of securing healthcare facilities. PSIM solutions can be a good choice for multi-site security management.

n By Israel GoGol, Freelancer

safeguarding patients’ medical information. Many other regulations influence a hospital’s daily operations: from financial regulations (for example in case the hospital accepts credit card payments) to regulations regarding the storage of hazardous and radioactive materials. The need for compliance is a significant factor for the performance of healthcare providers.

“Healthcare by nature is a very open environment so any security systems put in place must work within this construct, providing a secure environment to patients, employees, hospital property, and regulated health information while having a negligible impact on the flow of patients, visitors, and staff,” explained Drew Neckar, Director of

Security Services at the Mayo Clinic Health System.

With many different departments, entrances, elevators, parking areas, etc., and a constant flow of staff, “hospitals are ultimate high-traffic sites,” explained Courtney Dillon Pedersen, Corporate Communications Manager at Milestone Systems. “Monitoring all of these scenarios can be aided by comprehensive video monitoring and access control, which today is in hot demand as a unified solution for greater efficiency.”

Frequent M&as createS new DeManD

Recent changes in the healthcare business environment in the U.S. have led to a series of mergers and acquisitions (M&As)between healthcare providers. These are

14B12P0403.072-076.indd 73 14/11/13 上午4:56

Page 20: a&s International Nov 2014(Trial version)

IntellIgent VIdeo SolutIon

78 NOV 201422 www.asmag.com 22

Video Analytics time to Check-in:

Automate

IntellIgent VIdeo SolutIon

78 NOV 201422 www.asmag.com 22

Airport Securi tyn By Israel GoGol, Freelancer

Airports are at the forefront of using

intelligent video analytics to automate their surveillance and

operational needs. Recent advances in video

footage search as well as better computing options at the edge

promise to show an even greater future use of

video analytics. However, market education is

still needed to fulfill its potential.

14B12P0403.078-083.indd 78 14/11/13 上午4:59

Page 21: a&s International Nov 2014(Trial version)

79NOV 201422 www.asmag.com 22

Video surveillance cameras have long been used in airports. The introduction of video content

analytics (VCA) is a power-multiplier for cameras. “The primary goal of analytics is to transform the cameras into intelligent detectors in order to provide more

reliable incidents detection and minimize human error factor,” said Denis

Castanet, Director of Business development for EMEA at

Bosch Security Systems.

“Video analytics is identified as a lead technology in the growing trend towards reliable, automated systems within airports,” said Bill Flind, CEO of Ipsotek. Flind named some of VCA‘s main benefits: a wise use of VCA reduces human error, reduces man-guarding costs, provides secondary support to other systems, and greatly improves reaction time from alert to action with the use of automated triggers and alerts.

Josh Phillips, Director of Marketing of Enterprise & Critical Infrastructure at Video

Intelligence Solutions, Verint Systems, also echoed that “VCA is used in areas where alternative sensors are not practical or reliable, or where maintaining security staff for live personnel monitoring is impractical or unreliable.”

New DevelopmeNts iN viDeo search

Apart from triggering alerts, VCA plays an important role in searching through the video feeds. The vast amounts of video footage collected daily in a busy

79NOV 201422 www.asmag.com 22

video analytics

airport securi ty

14B12P0403.078-083.indd 79 2014/11/14 下午9:35

Page 22: a&s International Nov 2014(Trial version)

IntellIgent VIdeo SolutIon

82 NOV 201422 www.asmag.com 22

further and actually forecasting with high confidence when a long line will develop, not after it has already happened,” added Phillips. This allows retailers the ability to maximize staff members who sit idle when lines are empty.

Information can be shared also between parties in the airport. Store owners in the airport will usually have their own video surveillance systems inside the store. Even though they are not connected to the airport’s system, information can still be shared through mobile applications (e.g., send a picture of a suspect from the store to the airport police), described Todd Brodrick, Director of Sales for South West USA at Pelco by Schneider Electric.

Future: VCA to InItIAte CAmerA trACkIng

Today, a major constraint is in making analytics work in a crowded environment. As VCA algorithms improve, so will the ability to overcome the crowded environ-ments at airports. The next challenges in line are successful tracking and hand over from camera to camera. Crowded scenes or obscured views can make reliable tracking across multiple cameras intricate to achieve. However combining other technologies and systems to assist tagging and tracking of individuals through busy scenes such as airport terminals can deliver better results.

“Beyond the analytics themselves the next step is automating the entire process — somebody leaves a bag and

the system will automatically jump back and look for the person who left it, recognize him from the database, follow him around as he passes through other parts of the airport, and alert the nearest police officer or guard on duty,” stated Dr. Rustom Kanga, CEO of iOmniscient. “Already we have started using multi-sensor technology — sound and smell in addition to the video. Humans use all their senses and analytics should too. For example, if the camera detects someone falling down and detects the sound of a gunshot it is a different situation than a simple slip and fall. In years to come

such multi-sensor analytics will become ubiquitous.”

VCA IS not A Cure-All SolutIon

Market knowledge levels are still a concern for vendors and systems integrators implementing VCA solutions. One of the major challenges facing vendors and systems integrators is explaining that VCA is not a panacea and explain its realistic expectations.

“The commercial challenge is for customers to understand what the technology can and cannot do,” explained

• Youneedtohaveadeepunderstandingofthecustomer’sbusinesstodecideinwhichwaytouseanalytics.

• Payattentiontothenetworkdesignwhenyoudeployananalyticssolution.

• Chooseaproviderwithrealsupport;eachdeploymentisdifferentandunique.

• Whenpossible,useanalyticsrunningattheedgeandvideocameraswithautomaticalertgeneration.

• Atalltimes,aproofofconceptwillbenecessarytofine-tuneandadjustthesolution.

• Choseavideoanalyticsapplicationthatfitsyourcurrentandfuturesituation.

• Carefullylookatthelicensingmodelforthevendorandseehowitispricedincameradeployments.

• Analyzetheabilityoftheapplicationtoextractthedataandtocreatereports.

• Ifyouhaveanexistingcamerainstal-lation,makesurethattheapplicationintegrateswiththetechnology.

• Checkandseeiftheapplicationisusedinsimilarinstallations.

��Jorge Heller, Technology Director, Redisul

��Mike Davis, President, Infax

Video analytics can be used for queue management at check-in areas and security lines, measuring the amount of time a person has to wait in line. Image courtesy of Bosch Security Systems.

14B12P0403.078-083.indd 82 14/11/13 上午4:59

Page 23: a&s International Nov 2014(Trial version)

83NOV 201422 www.asmag.com 22

Kanga. “We focus on educating the market. Most customers use a tender process for their purchasing. If the specifications in the tender are vague the customer may get something that meets the specification but does not work in practice. For instance, if the specification asks for ‘abandoned object detection’ they will get a different response than if they ask for ‘abandoned object detection in a very crowded place.’ Those few words can make a difference between whether the customer gets something that will work or not.”

“I think the challenge is always the culture. Video analytics is a real new thing in our market, so we spend a lot of time showing to our customers the power of the solution. After that, the solution’s technical needs must be redesigned. Usually the customers look at video analytics as a showcase, not as a real solution. We always take potential customers to visit actual customers in order to demonstrate the incredible power of the analytics solution,” explained Jorge Heller, Technology Director of Redisul, a Brazilian systems integrator that took part in securing some of Brazil’s airports prior to the last FIFA World Cup.

“We continue to witness a large variation in client knowledge for analytics from those procuring solutions from a zero base through to consultant experts. Even within procuring teams knowledge can vary significantly and it is not always those with the most knowledge that are permitted the most procurement authority,” added Neil Norman, CEO of Human Recognition Systems.

Norman too stressed that education is a critical element of the business development and delivery teams’ role for analytics is still to avoid disappointment or underuse of the systems.

Where to Run the Analytics?

Video analytics are generally built on two

different types of architecture: server-based

and edge-based, performed on the camera.

“Camera-side offers scalability and redundancy but lacks

in features, performance, and management, whereas

server-side offers enhanced performance, features, and

management capabilities, but lacks in scalability and has

high bandwidth requirements,” explained Zvika Ashani,

CTO of Agent Video Intelligence (Agent Vi).

Server-based analytics enjoy several advantages since the servers are all at one

central location: easier configuration, management, and maintenance. Since

power supply and cooling are less of a concern, it also allows for increased

processing power and support for complex video analytics algorithms that

provide high performance and easier integration with VMS and PSIM systems.

Running the analytics at the edge saves on bandwidth, as constant video

transmission over network is not required. It allows for direct control of PTZ

camera with minimum latency and since the uncompressed video is analyzed

directly at the camera the video analytics performance improves (the video feed

doesn’t change due to compression). Video can be transmitted on demand or

automatically when an event of interest is detected (black screen technology).

The major obstacle is the camera’s size, power consumption limitations, limited

computing power, limited storage space, and limited temperature tolerance

operating in direct sunlight or freezing conditions.

Industry professionals predict a trend towards more VCA-at-the-edge units

to overcome the limitations of the camera is via two approaches: sharing the

workload between edge-unit and server or adding computing power to the

camera with an external device.

“A distributed processing approach which utilizes both

camera and server processing provides the best of both

worlds in terms of scalability, performance, feature set,

manageability and bandwidth consumption,” noted Ashani.

��Zvika Ashani, CTO, Agent Video Intelligence

14B12P0403.078-083.indd 83 14/11/13 上午4:59

Page 24: a&s International Nov 2014(Trial version)

88 NOV 201422 www.asmag.com 22

SMAhome

a&s SMAhome magazine sat down with Thomas Knops, Head of Marketing & Sales, Connected Home to talk about Qivicon’s development, its benefits for users, and market trends. According to Knops, the market is still at an early stage of growth, but the commoditization of the smart home has already taken off.

By SMAhome

Qiviconevery possibility

1. How long has Qivicon been in existence?

Qivicon was launched in IFA 2013 as a B2B2C platform. When we started in 2013, we had just 6 business partners, but we've now increased this number to over 30. For example, Sonos and Osram are our latest partners. World-famous brands such as Miele, Samsung, Telekom, D-link, etc. are all part of the Qivicon family. More and more partners are expected to be included in the Qivicon platform.

2. Can you explain the relationship between Qivicon and its business partners?

Qivicon is a B2B2C platform. We do not sell to end-users directly. Every partner has their own smart home solutions, services, or mobile

opens its door to

applications with different focuses. The only thing they share is the Qivicon gateway as their central station and the technical platform itself.

Qivicon is an open platform designed to connect the whole ecosystem. For example, if you have a Deutsche Telekom solution, and you want to add a D-link camera, it is feasible; simply plug and play. All you have to do is check if the D-link camera is compatible with Qivicon and the Telekom App.

3. The 30 partners that you've thus far named are predominantly western brands. Is there any chance that Qivicon might add Asian companies to the family in the near future?

Yes, it is possible. As a matter of fact, we are now talking to an important Asian brand. The news will be soon released. Despite the fact that Qivicon is primarily focused in Europe at the moment, we are interested in other markets around the world. We would like to obtain powerful partners who can introduce Qivicon to local markets.

Qivicon works with the Eclipse community to seek potential partners or software developers. Eclipse is a community for individuals and

14B12P0403.088-089-Talk-Qivicon 檔案夾.indd 88 2014/11/13 下午10:08

Page 25: a&s International Nov 2014(Trial version)

89NOV 201422 www.asmag.com 22

organizations who wish to collaborate on commercially-friendly open source software.

4. Does Qivicon plan to launch own-brand hardware? A Qivicon camera, for example, or a Qivicon smart plug?

No. Qivicon’s role in the smart home industry is to provide an open platform to its partners and end users. Just as it is with Intel and PC, Intel won’t launch its own PC or laptop, as they may come into conflict with PC manufacturers who are also their clients. Qivicon is in a similar circumstance. We do not develop our own devices, as it may create tensions with our existing partners. And if we do so, no companies will partner with Qivicon.

5. Who are Qivicon’s primary competitors?

I haven’t seen any supplier quite like us in Europe, but from a global perspective, Google Nest, Apple, SmartThings (by Samsung Electronics) are also in very favorable positions. I won’t say that they are our competitors. Instead, Qivicon can hook up with them, just as we have done with SONOS and Philips.

Again, we are an open platform. Partnership is the driving force behind Qivicon's market strategy.

6. Is openness the major benefit that Qivicon brings to users?

Yes, I would say openness is one of the major attractions. Users are not bound to one particular provider.

Two more benefits should not be missed. First, users understand that Qivicon is backed by Deutsche Telekom, which has long history and a solid support base among its clients. Users do not need to worry about the credibility of Qivicon and its security. We can supply reliability to end users. Secondly, Qivicon-based solutions are very easy to use. They are designed for general users with no technical background. No complex settings are required. And if you relocate from one apartment to another, you simply move the device like a TV set.

7. If you were to compare the current smart home market with its conditions as of three years ago, what has been the most significant shift?

I will respond to this in four parts. Overall, more and more products have been launched in the market. Not

merely solutions. Many standalone products are available, and end-users are able to select from far more choices than they could before.

Pricing variety helps the industry. Starter-kits that cost a mere 199 Euros encourage new users to try smart home products. With the expansion of the pricing range from 199 to 300 or more, users can pick whatever suits their need.

Communication-wise, increasing demand has been pushing more products to solve basic problems for consumers. In Germany, the energy issue has been highlighted. Users demand better ways to manage their energy expenses, and smart home solutions can help with that.

Though, distribution-wise, there are no sales channels dedicated to the smart home, more channels in different industries have begun to be involved in smart home products. The market is still in its infancy, and it will take a few years to truly commoditize it. However, the smart home market is on a similar developmental track to that of the smart phone. And it has already taken off.

Qivicon partnersBrand Territory URL

EnBw Energy Management www.enbw.com

D-Link Home Networks & Security www.dlink.com

eQ-3 Home Automation www.eq-3.de

Miele Household Appliances www.miele.com

Samsung Consumer Electronics www.samsung.com

T-Mobile Telecommunications www.t-mobile.com

aetka Telecommunications Retail www.aetka.de

Belkin Connected Electronics www.belkin.com

Bernal Garage Door Automation www.bernal.de

BitronHome Home Automation & Security www.bitronvideo.eu

Cyberport Electronics Retail www.cyberport.de

Digitalstrom Energy Management www.digitalstrom.com

Digitus Computer Accessories www.digitus.info

E.G.O. Household Appliances www.egoproducts.com

Eno Telecommunications Distributor www.eno.de

Entega Energy Management www.entega.de

Euronics Electronics Retail www.euronics.co.uk

Herweck Electronics Retail www.herweck.de

Integrierte IT Solutions www.in-gmbh.de

Kärcher Vacuum Cleaners www.karcher.com

Osram Lighting Solutions www.osram.com

PaX Doors & Windows www.pax.de

Philips Consumer Electronics www.philips.com

Rheinenergie Energy Provider www.rheinenergie.com

Sonos Wireless Audio www.sonos.com

Tunstall Telecare Solutions www.tunstall.co.uk

Vattenfall Energy Provider corporate.vattenfall.com

Remark: The information above was obtained from the Qivicon website at https://www.qivicon.com/en/partners/ in November 2014. For the most up-to-date listing, please refer to the website.

14B12P0403.088-089-Talk-Qivicon 檔案夾.indd 89 2014/11/13 下午10:08

Page 26: a&s International Nov 2014(Trial version)

90 NOV 201422 www.asmag.com 22

n By Steve Chin

C

Up, Up and Away! Up, Up and Away! Up, Up and Away! “Supercloud” “Supercloud”

Rewrites SecurityRewrites SecurityRewrites Security

Special Feature

W hen some people think of the cloud, they might also think that it’s unnecessary, cumbersome,

unreliable, and/or slow. The reality is though, the cloud has already been with us for a number of years, and is now being utilized in many different forms. In fact, one of the most oft-cited examples is online banking, where we have already learned to trust the cloud with our money, proving that the cloud is definitely feasible and reliable.

Cloud solutions in the security industry are growing at a relatively fast pace, and adoption has become more and more widespread. No longer just a form of storage, the cloud can now be utilized in all forms of solutions, be it video analytics, or as part of a total solutions package. It is safe to say that the cloud will take an ever bigger role in security, and especially as cloud continues to technologically advance.

cloud BringS diStinct advantageS

As mentioned previously, different forms of cloud are being utilized in everyday life around the world now. In fact, the cloud can no longer be considered a new technology, having been around and improved upon for

a number of years already. Users are picking up on this trend as they realize the cloud will improve their existing systems on many aspects, including cost efficiency, near limitless storage space, easier backup and recovery, and easier integration across existing and new software. The security industry is no exception. Ivan Medved, Director of Global Business Development, Axis Video Hosting System at Axis Communications put it simply, “There has been significant increases in requests for cloud-based surveillance solutions. It is obvious that security installers have realized cloud can differentiate their offerings and increase value as well as lower maintenance costs.”

Mitigating concernS and QueStionS

While it is true that the cloud is not the perfect end-all solution, with issues with bandwidth, reliability, security, and safety being concerns that critics and users alike bring up, the cloud has come a long way. Indeed, David Ly, Chairman and CEO of Iveda brought up a good point in regard to

14B12P0403.090-096-Special Feature-Cloud.indd 90 2014/11/13 下午10:09

Page 27: a&s International Nov 2014(Trial version)

91NOV 201422 www.asmag.com 22

n By Steve Chin

C

Up, Up and Away! Up, Up and Away! Up, Up and Away! “Supercloud” “Supercloud”

Rewrites SecurityRewrites SecurityRewrites Security

14B12P0403.090-096-Special Feature-Cloud.indd 91 2014/11/13 下午10:09

Page 28: a&s International Nov 2014(Trial version)

109NOV 201422 www.asmag.com 22

Companies in This Issue�� Products of the

Month•� �Network�Video�

techNologies�•� �ot�sYsteMs•� �ViVotek

Industry Report •� �AXis�coMMUNicAtioNs•� �Bosch�secUritY�sYsteMs•� �dAhUA�techNologY•� �dYNAcolor•� �eVerFocUs�electroNics•� �Flir�sYsteMs•� �hdPro•� �hikVisioN�digitAl�

techNologY•� �hoNeYwell�secUritY•� �idis•� �itX�secUritY•� �MAgAl�secUritY�sYsteMs•� �MilestoNe�sYsteMs•� �NedAP�secUritY�

MANAgeMeNt•� �siMoNsVoss�

techNologies•� �sUPreMA•� �tAMroN•� �VeriNt�sYsteMs•� �ViVotek

Product Exploration •� �gigA-tMs•� �hid�gloBAl•� �legic�ideNtsYsteMs•� �logitAg�•��tYco�retAil�solUtioN•��NedAP�ideNtiFicAtioN�������sYsteMs

Intelligent Video Solution•� �AgeNt�Video�iNtelligeNce•� �Bosch�secUritY�sYsteMs•� �g4s�techNologY�UsA•� �hUMAN�recogNitioN�

sYsteMs�(hrs)•� �iNFAX�•� �ioMNiscieNt•� �iPsotek•� �MAgAl�secUritY�sYsteMs•� �Nice�sYsteMs•� �Pelco�BY�schNeider�

electric•� �redisUl

Vertical Market•� �AoN�gloBAl�risk�

coNsUltiNg�secUritY�PrActice

•� �hoNeYwell�secUritY�•� �MAYo�cliNic�heAlth�

sYsteM•� �MilestoNe�sYsteMs•� �VidsYs

Special Feature •� �geNetec•� �AXis�coMMUNicAtioNs•� �BriVo�sYsteMs•� �iVedA•� �PANAsoNic�cAMerA-

MANAger

Product Exploration eQUiPMeNt�For�criticAl�eNViroNMeNt

Vertical MarketBANkiNg�

Intelligent Video SolutionPeriMeter�secUritY�

Special FeatureYeArlY�gloBAl�MArket�reView/PreView

Next Issue

14B12P0403.109.indd 109 2014/11/14 下午9:40

Page 29: a&s International Nov 2014(Trial version)

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCEPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL

21 3S VISION IP CAMERA / NVR / VIDEO SERVER TAIWAN [email protected]

53 AIMETIS CORP. SOFTWARE CANADA [email protected]

15 AXIS COMMUNICATIONS AB NETWORK VIDEO SOLUTIONS SWEDEN [email protected]

39 BOSCH SECURITY SYSTEMS CCTV GERMANY [email protected]

28, 29 CNB TECHNOLOGY INC. CCTV KOREA [email protected]

41 COMMAX CO., LTD. SURVEILLANCE KOREA [email protected]

BARN DOOR, INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected]

8 DYNACOLOR INC. IP CAMERA / NVR TAIWAN [email protected]

51 EVERFOCUS ELECTRONICS CORP. CAMERA / DVR / IP CAMERA TAIWAN [email protected]

77 FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER CHINA [email protected]

9 GKB SECURITY CORPORATION IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR TAIWAN [email protected]

5 HDPRO CO., LTD. CCTV KOREA [email protected]

46, 47, BACK COVER HIKVISION DIGITAL TECHNOLOGY CO., LTD. DVR CHINA [email protected]

10 ICATCH INC. DVR TAIWAN [email protected]

97 ITE TECH. INC. ccHDtv TX / RX CHIPSETS TAIWAN [email protected]

FRONT COVER MERIT LILIN ENT CO., LTD. IP CAMERA / NVR TAIWAN [email protected]

75 MINRRAY INDUSTRY CO., LTD. SPEED DOME / CAMERA CHINA [email protected]

112 MINTRON ENTERPRISE CO., LTD. CAMERA TAIWAN [email protected]

6, 7 NEXTCHIP CO., LTD. CHIP KOREA [email protected]

77 OB TELECOM ELECTRONICS CO., LTD. FIBER OPTIC TRANSCEIVER CHINA [email protected]

INSIDE BACK COVER PANASONIC SYSTEM NETWORKS CO., LTD. DIGITAL SURVEILLANCE JAPAN ---

105 QIHAN TECHNOLOGY CO.,LTD. SURVEILLANCE CHINA [email protected]

23 QNAP SYSTEMS, INC. NVR / VMS TAIWAN [email protected]

2 RIFATRON CO., LTD. DVR KOREA [email protected]

63 SHENZHEN COMMANDER TECHNOLOGY CO., LTD. CASING CHINA [email protected]

70, 71 SHENZHEN SUNELL TECHNOLOGY CORPORATION CAMERA CHINA [email protected]

25 SHENZHEN TVT DIGITAL TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected]

56, 57 SHENZHEN ZNV TECHNOLOGY CO., LTD. SURVEILLANCE CHINA [email protected]

4 TAMRON CO., LTD. CAMERA JAPAN [email protected]

11 TVLOGIC CO., LTD. DVR KOREA [email protected]

19 VIVOTEK INC. IP CAMERA / SOFTWARE / VIDEO SERVER TAIWAN [email protected]

3 WEBGATE INC. DVR KOREA [email protected]

ACCESS CONTROLPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL

31 FINGERTEC WORLDWIDE SDN. BHD. FINGERPRINT MALAYSIA [email protected]

63 FUJICA SYSTEM CO., LTD. ACCESS CONTROL CHINA [email protected]

67 GIGA-TMS INC. RFID MODULE / LOCK / READER TAIWAN [email protected]

27 LI SHYANG TECH CO.,LTD ELECTRIC LOCKS TAIWAN [email protected]

17 SUPREMA INC. FINGERPRINT KOREA [email protected]

61 VOIM TECHNOLOGIES INC. FINGERPRINT KOREA [email protected]

OTHERPAGE NO. ADVERTISER MAJOR ITEM COUNTRY E-MAIL

32, 33 PIXELPLUS CO., LTD. SEMICONDUCTOR KOREA [email protected]

75 SCENE ELECTRONICS (HK) CO., LTD. ILLUMINATOR CHINA [email protected]

12, 13, 54, 55 SONY CORPORATION DSBG. SYSTEM LSI DIVISION SEMICONDUCTOR JAPAN -

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

AD111-廣告索引 檔案夾.indd 142 2014/11/13 下午10:26